• last updated 16 hours ago
Constraints
Constraints: committers
 
Constraints: files
Constraints: dates
Fix default name

  1. … 3 more files in changeset.
Refactored and streamlined of cluster infrastructure

- base the API new new cluster infrastructure (including memoize-flush, server_cluster_peer_hosts, etc.)

- improved handling for multiple IP addresses and IPv6

- removed assumptions of local vs. global network drivers

- server_cluster_httpget_from_peers not used anymore

  1. … 5 more files in changeset.
improve spelling in .info files

  1. … 5 more files in changeset.
fix typo

added support for SCRYPT (RFC 7914) as password hash function.

The use of scrypt requires NaviServer compiled with OpenSSL 3.0 or newer

  1. … 1 more file in changeset.
stick to the original names with the "-" since this is also the naming convention outside of OpenACS (e.g. "scram-sha-256")

  1. … 7 more files in changeset.
Complete reform introduced in https://cvs.openacs.org/changelog/OpenACS?cs=oacs-5-10%3Agustafn%3A20210928124647

- add datamodel change to the creation script

- refactor algorithm names in a way that the new procs will comply with acs-tcl.naming__proc_naming automated test

  1. … 6 more files in changeset.
Stronger password hashes for OpenACS

This change introduces the possibility to use either the classical

OpenACS password hash algorithm "salted-sha1" or the SCRAM passord

function "scram-sha-256". The latter can be used by (a) using the

most recent version of NaviServer (from Sept 28, 2021 or newer) and

(b) by configuring the password hash preferences via Kernel package

parameter "PasswordHashAlgorithm". The package parameter can contain a

list of multiple hash algorithms in preference order. The most

preferred available algorithm is chosen.

By default, the "PasswordHashAlgorithm" is "salted-sha1", and the

behavior is as before. After upgrading to the new version of acs-tcl

and acs-kernel, the preference list can be configured. When a user

logs in and the preferred available algorithm is different from the

previously used algorithm, the upgrade is performed for the user

automatically.

The usage of SHA1 in OpenACS is easily target of security audits (see

[1]). The biggest danger is that if somebody gets full access to the

"users" table (e.g. when decommissioning a hard disk). In this case

the hashes can be attacked with dictionaries by using some crypto

hardware (when someone gets raw access to the DB, one has usually some

other big problems). However, by using the "scram-sha-256" hash

function this danger is substantially reduced. This function computes

a password hash using PBKDF2 (Password-Based Key Derivation Function

2). This function is used to reduce vulnerabilities of brute-force

attacks against password hashes. The hash function of SCRAM is PBKDF2

[RFC2898] with HMAC as the pseudorandom function (PRF) and with dkLen

== output length of HMAC == output length of the digest function. So,

it uses a better hash algorithm (sha-256 vs. sha1) and applies this a

high number of times (15K times for a password hash computation).

NaviServer supports as well the even better SCRYPT algorithm, but this

is only available when NaviServer is compiled with OpenSSL 3.0 or

newer. On the contrary, scram-sha-256 (actually PKCS5_PBKDF2_HMAC) is

available since OpenSSL 1.0.0 (2015).

All the improved hash functions require NaviServer with its tight

integration to the crypto functions of OpenSSL.

[1] https://openacs.org/forums/message-view?message_id=5522562

  1. … 6 more files in changeset.
fix release dates in .info files

  1. … 82 more files in changeset.
release work

  1. … 204 more files in changeset.
bump version numbers of 5.9|5.10 packages to 5.10.0b1

adjust dependencies

  1. … 87 more files in changeset.
As we now enforce emails to be lowercase, also sanitize existing data

  1. … 2 more files in changeset.
Added constraint site_nodes_parent_id_ck to table "site_nodes" to avoid certain simple loops on parent_ids

  1. … 4 more files in changeset.
added constraint acs_objects_context_id_ck to avoid certain simple loops on context_ids

  1. … 2 more files in changeset.
Fix attribute datatype discrepancy

  1. … 1 more file in changeset.
address issue #3436: support for schema name in util__table_exists

TODO: Oracle version is missing

  1. … 2 more files in changeset.
Added index on foreign key column to reduce sequential reads on delete

operations, since the optimizer brain fart ((c)Don Baccus) that existed

17 years ago in pg 7.2 seems to be gone

(https://openacs.org/forums/message-view?message_id=142769)

  1. … 4 more files in changeset.
- Convert frequenty used functions from plpgsql

to strict and stable SQL functions, which allow

the PostgreSQL more optimizations

* acs_group__member_p/3

* site_node__url/1

- bump version number to 5.10.0d27

  1. … 3 more files in changeset.
Attribute discrepancy fix for object_types in OpenACS.

Some attributes are not created for new instances since 2006, but an upgrade

script deleting the already existing ones was never done.

Original datatype change:

https://fisheye.openacs.org/changelog/OpenACS?cs=MAIN%3Avictorg%3A20060727200933

https://github.com/openacs/openacs-core/commit/7e30fa270483dcbc866ffbf6f5cf4f30447987cb

  1. … 2 more files in changeset.
Fix attribute datatype discrepancy, introduced in 2006 but never fixed for already existing instances.

Original datatype change:

https://fisheye.openacs.org/changelog/OpenACS?cs=MAIN%3Avictorg%3A20060727200933

https://github.com/openacs/openacs-core/commit/7e30fa270483dcbc866ffbf6f5cf4f30447987cb

  1. … 3 more files in changeset.
Index acs_object's creation and modification date

  1. … 2 more files in changeset.
Redefine acs_group__member_p so that direct membership is checked in a way that is uniform with that of cascading membership: without any permission check (fixes acs_subsite_check_composite_group automated test)

  1. … 2 more files in changeset.
Define an acs_object schema and use it to redefine acs_object__name using dot notation

Goal is to further reduce code divergency between Oracle and Postgres

  1. … 2 more files in changeset.
Fix acs-kernel url

Bump 'acs-kernel' version number

Modernize logic for protecting against cached passwords from forms,

when users log out and other users use the back button (for Nora).

- switch to more modern caching prevention

- add CSRF protection to login form against forgery requests

- none of the cache-preventing mechanisms helps when the user

stores the password in the browser (no change to the past).

- For admins of existing sites: alter kernel parameter

"LoginPageExpirationTime" to 0 make use of this feature

  1. … 2 more files in changeset.
implementing feature request #3408: support for passing in null values to acs_object__set_attribute

  1. … 2 more files in changeset.
Use a german gender-neutral wording for "members"

  1. … 1 more file in changeset.
Move away portraits created as children of the -100 object that might be still around after acs-kernel/sql/postgresql/upgrade/upgrade-5.10.0d13-5.10.0d14.sql

  1. … 2 more files in changeset.
Fix typo