This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
1
Test board / Teeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
« on March 25th, 2018, 07:08 PM »
Testing really long subjects
2
Off-topic / Re: How is wedge displaying on Wap, Wap2 devices (Mobile phones)
« on May 30th, 2017, 06:02 PM »The Browser of the phone it came with the phone [Lenovo Tab ] :vQuote from CerealGuy on May 29th, 2017, 10:43 AM What browser do you use? Wedge works well on chrome. Other browsers tend to send different user agents, which makes things (at least in the way wedge handles this) more complex.
3
Off-topic / Re: How is wedge displaying on Wap, Wap2 devices (Mobile phones)
« on May 29th, 2017, 10:43 AM »
What browser do you use? Wedge works well on chrome. Other browsers tend to send different user agents, which makes things (at least in the way wedge handles this) more complex.
4
Off-topic / Re: How is wedge displaying on Wap, Wap2 devices (Mobile phones)
« on May 28th, 2017, 02:04 PM »yea i have like all letters lined up in vertically like that
H
e
l
l
o
W
o
r
l
d
.
Why that happen? :v
Than we can tell you what's maybe wrong.
5
The Pub / Re: Question about SHA1/256 (github issue #60)
« on May 21st, 2017, 02:13 AM »Finally found some time to do this.It was actually not that hard as you may thought.
The password_hash/verify functions are very nice, definetly a good thing!
Commit:
https://github.com/C3realGuy/wedge/commit/e1eb7f2129974cca89c3cd81c76e579b8f63922b
PR (WIP):
https://github.com/Wedge/wedge/pull/68
What still need's to be done:
- Update database so that passwrd field is a VARCHAR(255) (see https://github.com/ircmaxell/password_compat#usage)
- Remove sha1.js
- test it
Only thing we still need to think about is how we now want to create the cookies. Currently this is done by doing some sha1 hashing over the password concatenated with the salt. Because we don't have a salt anymore, this is maybe bad (or not).
And i'm still unsure about dropping client side hashing. Maybe I will just switch to sha256 on client side?!
What's not working yet:
- Admin login
6
Off-topic / Re: How is wedge displaying on Wap, Wap2 devices (Mobile phones)
« on May 4th, 2017, 11:31 PM »
Wedge works very good on chrome, but maybe not on other mobile browsers.
Maybe this could be solved by adding more user agents to wedge, but i didn't
look into it. @Nao ?
Maybe this could be solved by adding more user agents to wedge, but i didn't
look into it. @Nao ?
7
Off-topic / Re: How is wedge displaying on Wap, Wap2 devices (Mobile phones)
« on May 3rd, 2017, 07:23 PM »
Most people use the default skins for wedge, all of them you can try here on wedge.org. If you want to create your own skin, the wedge css preprocessor is very nice for mobile specific stuff ;)
8
The Pub / Re: Question about SHA1/256 (github issue #60)
« on May 1st, 2017, 04:45 PM »I pop up every once in a while and since I'm dealing with the same thing myself I chime in.
I wouldn't use bcrypt on the client side, too much of an issue and as far as I know it wasn't designed to do hashing but to encrypt. Besides, everyone is going towards https so client hashing will become less of an issue.
So, use bycrypt yes but on server side only.
need to pass costs and salts to client (if we use bcrypt). Or we use another algorithm on client
side, which could make things worse. Or we use stable values for this. Costs of 20, salt of blubb.
As long as we don't get hash collissions on the first round, this shouldn't be a big problem?
Besides that, client side hashing doesn't protect against mitm. Simply serving a evil js would
destroy all the benifits. Only scenario where this could help is if there's no ssl. But as soon
as an evil person can hook between server and user, this doesn't help anymore.
I looked into password_hash function, i think it's safe to use. Because in the resulting
hash there are information about the algorithm (bcrypt), the salt, and costs (some bcrypt
specific parameter which defines how many rounds of bcrypt shall be used to make brute
force attacks harder.) and therefore password_verify will take the right algorithm and parameters
to verfify the password.
Things to think about:
- how to define costs for bcrypt, Settings.php?
- How do we change the password values in running environments? We have to plan this for the future
(if the default hash algo changes) and for now.
EDIT:
Easiest thing would be to send the passwords always in plain text, on server side check if we have an old password saved with sha1, if so, hash it in the old way and verify it. If it's fine, hash it in the new way and update the value. If not, password's wrong, error message and so. If it's already with the new algo, just do password_verify.
9
Features / Re: Language revs
« on April 17th, 2017, 09:25 PM »
@Freñiçh If you need help with git, feel free to ask. Git has a steep learning curve but is absolutly worth learning it.
10
The Pub / Re: Question about SHA1/256 (github issue #60)
« on April 17th, 2017, 05:20 PM »If I do password_hash() with PASSWORD_DEFAULT, then it means I can't be sure what algorithm will be used to hash the password, right..?
So, how exactly can I hash the password on the client side if I don't know which kind of crypt system PHP will use to compare it with my own hash...?
11
The Pub / Re: Question about SHA1/256 (github issue #60)
« on April 15th, 2017, 11:10 AM »
On client side, if the browser supports js, the password gets hashed once without any salt and with sha1. If the browser doesn't support js, it doesnt get hashed. The hashed or unhashed password gets send to the server, if it's unhashed/plain, wedge hashes it first. Now it's in any ways hashed once with sha1. Now it gets hashed again with sha1 but this time with the salt connected to this user. If the hash is now the same as in the Database, it's the correct password.
This hashing on the client side was quite cool when you didn't had ssl in all places because you don't send your password in plain. Still if someone can hijack the Session (mitm attack) he/she can readout the hashed password and log in with that again at any time (until you Change your password).
I didn't dig through all the code, so not 100% sure it works exactly like this. Especially this 2x hashing + salting is interesting, it makes all of it a bit harder to crack.
This hashing on the client side was quite cool when you didn't had ssl in all places because you don't send your password in plain. Still if someone can hijack the Session (mitm attack) he/she can readout the hashed password and log in with that again at any time (until you Change your password).
I didn't dig through all the code, so not 100% sure it works exactly like this. Especially this 2x hashing + salting is interesting, it makes all of it a bit harder to crack.
12
The Pub / Re: Question about SHA1/256 (github issue #60)
« on April 9th, 2017, 10:35 PM »
Bcrypt would be the algorithm i would choose too. But I don't know what i should think of the password_hash() functions. It's always a bit critical if you change the password hashing algorithm. Because in the database you still have the hashes with the old algorithm, so you have to hash it once with the old algorithm to make sure it's the correct password and after that insert/update the hashed password with the new algorithm. It's getting even more complicated because wedge already hashes the password on client side to don't transfer the password in plaintext (which i like). I want to change it, but it's a bit critical and I'm not an expert for this. Therefore I want to do it well planned and with a bit more knowledge as i have in the moment. The thing I worry about with password_hash() is that if you use a database backup from a new php version on an old php version where the password_hash() function would use a different (less secure) algorithm, this would maybe break things. But I only scanned the documentation.
Besides that, it's not super important to change the hashing algorithm now, as we "only" use it for passwords. So if you don't have to fear NSA or something like that, your passwords aren't currently in danger.
Besides that, it's not super important to change the hashing algorithm now, as we "only" use it for passwords. So if you don't have to fear NSA or something like that, your passwords aren't currently in danger.
13
Plugins / [Plugin] Re: CountLikes
« on April 4th, 2017, 03:55 PM »
@Kian
do you get the error because of the CountLikes Plugin?
do you get the error because of the CountLikes Plugin?
14
Plugins / [Plugin] Re: CountLikes
« on April 2nd, 2017, 04:20 PM »
Updated the github repository.
https://github.com/C3realGuy/CountLikes
https://github.com/C3realGuy/CountLikes
15
Bug reports / Re: Couple things to look into...
« on March 30th, 2017, 01:29 PM »
And even some more:
- Mentions is sometimes not working. This is in my opinion something we could implement directly into wedge.
- Mentions is sometimes not working. This is in my opinion something we could implement directly into wedge.