1. we use patch level 2, it has fixes for any XSS flaw of 3.8.4.
3.8.5 has only cosmetical updates and the security fixes of patch level 2 for 3.8.4 .
Forum isnt upgraded to 3.8.5 since it is a PITA to do all the patches again for our modifications. I'll upgrade if vbulletin releases an update with new security issues that arent patched already.
2. we force all connections to go to https , no http (port 80) is allowed, it's all mod_rewriten / directed to 443 and mitigates this. Changing more local code when we fix this already by the door seems kind of redundant. The insecure cookie is never transmitted over unencrypted channel, and if it was still read the user has worse problems (such as being hijacked locally).
3. we can be draconical about security and force people to login everytime with cookie timeout on each login. I dont think users will like this. If cookie is stolen while in transit , the user will still be hijacked and have worse issues.
This is mitigated by our ip-list feature, if new ip is listed which isnt "yours" user will still get a clue that they might be compromised. We also ask for password to some sections ( stored form password.
4. As you say, not likely to happen. All traffic is routed over ssl in any case, ssl is built with "eavesdroppers" in mind. Ways to mitigate SSL would be if browser has trusted root certs which compromise the original certificate. This is kind of common in business culture where business install the computer and have to monitor all traffic (even SSL). But if someone has access to computer the user is most likely compromised anyway.
All these listed exploits rely on local computer access for it to work.
Most of the security issues are mitigated by keeping good local computer security as well as keeping an eye on recent ips.
Оnе can always try to DRM ones way through every security issue or adding more obscure fixes‚ but in one step or another local access will always hijack access.
Changing the local codebase too much makes it hard to maintain, security fixes that "we" make might also introduce worse issues.
Оnе proposed fix was to turn off md5 hashing of transmitted password since you could login with md5has+vblicense. But the idea with md5 hashing is simply to prevent the password from being known‚ and to limit damage to only one ѕitе. This is a security measure to protect the user.
Lets say they are dumb and use same password on eve as on pl forums. If pass isnt md5 hashed and it's leaked we could be helping someone gain access to their eve accounts.
So I think it's better to leave md5 hashes as allowed login than just go cleartext.
If the hash is stolen (SSL transit)‚ they can ѕtill stеal the cleartext pass somehow.
|