-
Notifications
You must be signed in to change notification settings - Fork 10
/
readme.txt
116 lines (66 loc) · 5.38 KB
/
readme.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
=== Passwords Evolved ===
Contributors: carlalexander, celsobessa, carstenbach, riper81, cornelraiu-1
Donate link: https://github.com/sponsors/carlalexander
Author URI: https://carlalexander.ca
Plugin URI: https://github.com/carlalexander/passwords-evolved
Tags: security, authentication, password, have i been pwned
Requires at least: 5.2
Tested up to: 6.6.2
Requires PHP: 5.6
Stable tag: 1.3.3
License: GPLv3
License URI: http://www.gnu.org/licenses/gpl-3.0.html
A reimagining of WordPress authentication using modern security practices.
== Description ==
**Important Notice:** This plugin is no longer supported on wordpress.org. Please open issues on [GitHub](https://github.com/carlalexander/passwords-evolved/issues).
The goal of this plugin is to shore up the WordPress authentication using standard security practice recommendations. At this time, the plugin improves WordPress authentication by doing the following:
= Enforcing uncompromised passwords =
This plugin prevents someone from using passwords that have appeared in data breaches. Whenever someone logs into a WordPress site, it'll verify their password using the [Have I been pwned? API](https://haveibeenpwned.com/API/v2). If their password appeared in a data breach, the plugin will prevent them from logging in until they reset their password.
By default, this level of enforcement is only done on an account that has the "[administrator](https://codex.wordpress.org/Roles_and_Capabilities#Administrator)" role. You can change which roles have their passwords enforced from the settings page. For people that have a role where there's no password enforcement, the plugin will show a warning when they log in with a compromised password.
The enforcement of uncompromised password also extends to when someone resets or changes their password. That said, in those situations, using an uncompromised password is mandatory. Someone will never be able to reset or change their password to one that's appeared in a security breach. (As long as the plugin is able to contact the API.)
= Using stronger password hashing =
The plugin also encrypts passwords using either the [bcrypt](https://en.wikipedia.org/wiki/Bcrypt) and [Argon2](https://en.wikipedia.org/wiki/Argon2) hashing functions. These are the strongest hashing functions available in PHP. Argon2 is available natively starting with PHP 7.2, but the plugin can also encrypt passwords on older PHP versions using the [libsodium](https://libsodium.org) compatibility layer introduced in WordPress 5.2.
You don't have to do anything to convert your password hash to a stronger encryption standard. The plugin will take care of converting it the next time that you log in after installing the plugin. If you decide to remove the plugin, your password will continue working and remain encrypted until you reset it.
It's also worth noting that using a stronger hashing function is only important in the advent of a data breach. A stronger password hashing function makes decrypting the passwords from the data breach a lot harder to do. This combined with the enforcement of uncompromised passwords will help ensure that those passwords are never decrypted. (Or at least without significant effort.)
== Frequently Asked Questions ==
= Wait so are you sending my password to a 3rd party!? =
No, the plugin never sends your full password to a 3rd party for verification. The plugin only sends the first five characters of the [SHA-1](https://en.wikipedia.org/wiki/Sha1) hashed password to a 3rd party. The 3rd party then sends back all passwords with a hash that starts with those five characters.
The plugin then handles the rest of the password validation itself. It compares the SHA-1 hashed version of your password to the passwords returned by the 3rd party. We call this process [k-anonymity](https://en.wikipedia.org/wiki/K-anonymity). (You can read more about validating leaked passwords with it [here](https://blog.cloudflare.com/validating-leaked-passwords-with-k-anonymity/).)
== Changelog ==
= 1.3.3 =
*Released: 2022-09-25*
* Use different capabilities for admin pages so that they work when plugins directory isn't writeable [carlalexander]
= 1.3.2 =
*Released: 2022-04-19*
* Add missing echo on `settings_saved` [cornelraiu-1]
= 1.3.1 =
*Released: 2022-04-09*
* Add `es_MX` and `es_CR` translations [riper81]
= 1.3.0 =
*Released: 2021-03-21*
* Remove call to api on every request [carlalexander]
* Add informal (default) and formal german translations [carstenbach]
= 1.2.0 =
*Released: 2020-01-03*
* Fixed fatal error when installed as a mu-plugin [carlalexander]
* Added support for libsodium [carlalexander]
= 1.1.4 =
*Released: 2019-05-07*
* Bump minimum PHP version to 5.6 [carlalexander]
= 1.1.3 =
*Released: 2018-04-29*
* Fixed missing `settings_saved` string in English translation [carlalexander]
* Added missing echo when translating `settings_saved` string [carlalexander]
= 1.1.2 =
*Released: 2018-03-21*
* Added Brazilian Portuguese translation [celsobessa]
* Reworked how the plugin handles its default translation [carlalexander]
= 1.1.1 =
*Released: 2018-03-06*
Improved how the API client and password generator handled if the API was online or not.
= 1.1.0 =
*Released: 2018-03-01*
Reworked plugin to use the new version of the HIBP API (Have I been pwned? API) which supports k-anonymity. This allows the plugin to be used in production now.
= 1.0.0 =
*Released: 2017-08-24*
Initial release