Changeset 551913
- Timestamp:
- 06/01/2012 05:08:56 PM (14 years ago)
- Location:
- limit-login-attempts/tags/1.7.1
- Files:
-
- 2 edited
- 1 copied
-
. (copied) (copied from limit-login-attempts/tags/1.7.0)
-
limit-login-attempts.php (modified) (4 diffs)
-
readme.txt (modified) (2 diffs)
Legend:
- Unmodified
- Added
- Removed
-
limit-login-attempts/tags/1.7.1/limit-login-attempts.php
r546512 r551913 7 7 Author URI: http://devel.kostdoktorn.se 8 8 Text Domain: limit-login-attempts 9 Version: 1.7. 09 Version: 1.7.1 10 10 11 11 Copyright 2008 - 2012 Johan Eenfeldt … … 86 86 */ 87 87 88 add_action(' init', 'limit_login_setup');88 add_action('plugins_loaded', 'limit_login_setup', 99999); 89 89 90 90 … … 103 103 add_action('wp_login_failed', 'limit_login_failed'); 104 104 if (limit_login_option('cookies')) { 105 add_action('plugins_loaded', 'limit_login_handle_cookies', 99999);105 limit_login_handle_cookies(); 106 106 add_action('auth_cookie_bad_username', 'limit_login_failed_cookie'); 107 107 … … 240 240 241 241 /* 242 * Action:called in plugin_loaded (really early) to make sure we do not allow242 * Must be called in plugin_loaded (really early) to make sure we do not allow 243 243 * auth cookies while locked out. 244 244 */ -
limit-login-attempts/tags/1.7.1/readme.txt
r546524 r551913 4 4 Requires at least: 2.8 5 5 Tested up to: 3.3.2 6 Stable tag: 1.7. 06 Stable tag: 1.7.1 7 7 8 8 Limit rate of login attempts, including by way of cookies, for each IP. Fully customizable. … … 83 83 3. Administration interface in WordPress 3.0.4 84 84 85 == Upgrade Notice == 86 87 = 1.7.1 = 88 Users of version 1.6.2 and 1.7.0 should upgrade immediately. There was a problem with "auth cookie" lockout enforcement. Lockout of normal password login attempts still worked as it should. Please see plugin Changelog for more information. 89 85 90 == Changelog == 91 92 = 1.7.1 = 93 This version fixes a security bug in version 1.6.2 and 1.7.0. Please upgrade immediately. 94 95 "Auth cookies" are special cookies set at login that authenticating you to the system. It is how WordPress "remembers" that you are logged in between page loads. 96 97 During lockout these are supposed to be cleared, but a change in 1.6.2 broke this. It allowed an attacker to keep trying to break these cookies during a lockout. 98 99 Lockout of normal password login attempts still worked as it should, and it appears that all "auth cookie" attempts would keep getting logged. 100 101 In theory the "auth cookie" is quite resistant to brute force attack. It contains a cryptographic hash of the user password, and the difficulty to break it is not based on the password strength but instead on the cryptographic operations used and the length of the hash value. In theory it should take many many years to break this hash. As theory and practice does not always agree it is still a good idea to have working lockouts of any such attempts. 86 102 87 103 = 1.7.0 =
Note: See TracChangeset
for help on using the changeset viewer.