Setting a password salt greatly reduces the risk of password theft.
-To set a password salt, add the following line to your config.php file:
-$CFG->passwordsaltmain = \'some long random string here with lots of characters\';
-The random string of characters should be a mix of letters, numbers and other characters. A string length of at least 40 characters is recommended.
-Please refer to the password salting documentation if you wish to change the password salt. Once set, do NOT delete your password salt otherwise you will no longer be able to login to your site!
'; -$string['check_passwordsaltmain_name'] = 'Password salt'; -$string['check_passwordsaltmain_ok'] = 'Password salt is OK'; -$string['check_passwordsaltmain_warning'] = 'No password salt has been set'; -$string['check_passwordsaltmain_weak'] = 'Password salt is weak'; $string['check_riskadmin_detailsok'] = 'Please verify the following list of system administrators:
{$a}'; $string['check_riskadmin_detailswarning'] = 'Please verify the following list of system administrators:
{$a->admins}It is recommended to assign administrator role in the system context only. The following users have (unsupported) admin role assignments in other contexts:
{$a->unsupported}'; diff --git a/report/security/locallib.php b/report/security/locallib.php index a4e16d688ae14..d6e6bef2a2c9a 100644 --- a/report/security/locallib.php +++ b/report/security/locallib.php @@ -48,7 +48,6 @@ function report_security_get_issue_list() { 'report_security_check_openprofiles', 'report_security_check_google', 'report_security_check_passwordpolicy', - 'report_security_check_passwordsaltmain', 'report_security_check_emailchangeconfirmation', 'report_security_check_cookiesecure', 'report_security_check_configrw', @@ -471,35 +470,6 @@ function report_security_check_configrw($detailed=false) { return $result; } -function report_security_check_passwordsaltmain($detailed=false) { - global $CFG; - - $result = new stdClass(); - $result->issue = 'report_security_check_passwordsaltmain'; - $result->name = get_string('check_passwordsaltmain_name', 'report_security'); - $result->info = null; - $result->details = null; - $result->status = null; - $result->link = null; - - if (empty($CFG->passwordsaltmain)) { - $result->status = REPORT_SECURITY_WARNING; - $result->info = get_string('check_passwordsaltmain_warning', 'report_security'); - } else if ($CFG->passwordsaltmain === 'some long random string here with lots of characters' - || trim($CFG->passwordsaltmain) === '' || preg_match('/^([a-z0-9]{0,10})$/i', $CFG->passwordsaltmain)) { - $result->status = REPORT_SECURITY_WARNING; - $result->info = get_string('check_passwordsaltmain_weak', 'report_security'); - } else { - $result->status = REPORT_SECURITY_OK; - $result->info = get_string('check_passwordsaltmain_ok', 'report_security'); - } - - if ($detailed) { - $result->details = get_string('check_passwordsaltmain_details', 'report_security', get_docs_url('report/security/report_security_check_passwordsaltmain')); - } - - return $result; -} /** * Lists all users with XSS risk, it would be great to combine this with risk trusts in user table, diff --git a/version.php b/version.php index b867e43de2a61..2c24264ab852d 100644 --- a/version.php +++ b/version.php @@ -30,7 +30,7 @@ defined('MOODLE_INTERNAL') || die(); -$version = 2013020800.00; // YYYYMMDD = weekly release date of this DEV branch +$version = 2013020900.00; // YYYYMMDD = weekly release date of this DEV branch // RR = release increments - 00 in DEV branches // .XX = incremental changes