Password Tools 3.12.2

XF 2.1 / 2.2 / 2.3 Password Tools 3.12.2

Add-on xenforo 2

Ressources et modules complémentaires pour XenForo 2

Styles xenforo 2

Styles / Thèmes et apparence pour xenforo 2

Templates xenforo 2

Codes pour modifier les templates sur xenforo 2

Section Premium

Add-on et Styles pour membre Premium
Password Tools 3.12.2

XF 2.1 / 2.2 / 2.3 Password Tools 3.12.2

Catégorie Catégorie Add-Ons
Titre du sujet Titre du sujet Password Tools 3.12.2
Auteur de la discussion Auteur de la discussion laurent68
Date de début Date de début
Réponses Réponses 29
Affichages Affichages 1 610
Réaction Réaction 1
Dernier message par Dernier message par Mikay

laurent68

Fondateur

Staff
fondateur
Réputation: 100%
Discussions
4 647
Messages
12 059
Solutions
81
J'aime
7 615
Points
198
Description :

geu.png



Source

This modification mostly follows the principles of Dan Wheelers password strength estimator zxcvbn. It does not weight password strength by their combination of upper/lower letters, special characters and numbers, but on how easy they are to crack in reality.

To increase the safety of your users account, you can force them to use passwords of a minimum length, minimum strength and even force them to exclude certain words from their passwords (like your site name, the topic your site refers to, etc.).

But the other side of the equation, is no matter how secure the password is, if it has been compromised not password strength estimator will help make it better. As such NIST has the following guidance: check passwords against those obtained from previous data breaches. Pwned Password integration does that.

zxcvbn Readme said :

zxcvbn is a password strength estimator inspired by password crackers. Through pattern matching and conservative entropy calculations, it recognizes and weighs 10k common passwords, common names and surnames according to US census data, popular English words, and other common patterns like dates, repeats (aaa), sequences (abcd), keyboard patterns (qwertyuiop), and l33t speak.

Consider using zxcvbn as an algorithmic alternative to password policy — it is more secure, flexible, and usable when sites require a minimal complexity score in place of annoying rules like "passwords must contain three of {lower, upper, numbers, symbols}".

Pwned password said :
Password reuse and credential stuffing

Password reuse is normal. It's extremely risky, but it's so common because it's easy and people aren't aware of the potential impact. Attacks such as credential stuffing take advantage of reused credentials by automating login attempts against systems using known emails and password pairs.

NIST's guidance: check passwords against those obtained from previous data breaches

The Pwned Passwords service was created in August 2017 after NIST released guidance specifically recommending that user-provided passwords be checked against existing data breaches . The rationale for this advice and suggestions for how applications may leverage this data is described in detail in the blog post titled Introducing 306 Million Freely Downloadable Pwned Passwords. In February 2018, version 2 of the service was released with more than half a billion passwords, each now also with a count of how many times they'd been seen exposed.

Click to expand...

Features :
  • Show password feature, allow users to toggle to see what they have actually entered.
  • Show users how strong their passwords really are when it comes to crack-attempts
  • Deliver instant feedback if password and password-confirm match and/or certain requirements are not met
  • Force users to choose passwords with a minimum strength
  • Force users to choose passwords with a minimum length
  • Force users to chooce a password not containing words from a blacklist you define
  • No cheating: This modification also controls users passwords on server side with Ben Jeavos php-implementation of zxcvbn.
  • Easy styling through XenForo Style Properties
Options :

hsz.png


Télécharger V3.2.2 :
Vous devez répondre avant de pouvoir voir le contenu des données cachées.
Version 3.3.0 - XF2.2 compatibility update :

Requires php 7.0+
Now depends on Standard Library by Xon
Supports XF2.2+

Télécharger V3.3.0 :
Vous devez répondre avant de pouvoir voir le contenu des données cachées.
Version 3.4.0 php 8 compatibility update :

Require php 7.2+
Fix php 8 compatibility

Télécharger V3.4.0 :
Vous devez répondre avant de pouvoir voir le contenu des données cachées.
Version 3.5.0 Feature update :

Force global namespace for functions which are known to be optimizable to bytecode in php, or known global functions to avoid a current namespace lookup for the function.
Add "On login; alert the user if they have a known compromised password" option (default enabled)
Add "Minimum time between triggering compromised password alerts on login" option (default 24 hours)

Télécharger V3.5.0 :
Vous devez répondre avant de pouvoir voir le contenu des données cachées.
Version 3.6.1 - Feature update :

Thanks to @NamePros for sponsoring this update.
Update compromised password alert text to be less awkward
On updating passwords, remove any compromised password alerts to avoid user confusion
Add "Force email two factor authentication on compromised password" option (default disabled)
Add "Pwned password minimum count (soft)" option.
This allows a user to change a password to a known compromised value which is under a given number of known hits. This still generates compromised password alerts

Télécharger V3.6.1 :
Vous devez répondre avant de pouvoir voir le contenu des données cachées.
Version 3.6.2 - Maintenance update :

Reduce queries when triggering forced email 2fa
Prevent rare DuplicateKeyException when forcing email 2fa and multiple tabs are being used.

Télécharger V3.6.2 :
Vous devez répondre avant de pouvoir voir le contenu des données cachées.
Version 3.6.3 - php 8.1 compatibility fix :

Dramatically reduce redistributable size by trimming unneeded files
php 8.1 compatibility fix

Télécharger V3.6.3 :
Vous devez répondre avant de pouvoir voir le contenu des données cachées.
Version 3.6.4 - Bugfix update :

Fix edge case where 32bit php would incorrectly report a very strong password was weak due to bad float to integer truncation.
Recommend ext-gmp (aka php-gmp) for optimized binomial calculations, which requires php 7.3+

Télécharger V3.6.4 :
Vous devez répondre avant de pouvoir voir le contenu des données cachées.
Version 3.6.5 - Bugfix update :

Switch back to upstream bjeavons/zxcvbn-php library as it should be fully php 8.1 compatible.
More 32bit php fixes, Thanks to NamePros

Télécharger V3.6.5 :
Vous devez répondre avant de pouvoir voir le contenu des données cachées.
Version 3.7.1 - Feature update :

Require XenForo 2.2+, drop XF2.1 support
Actually implement cron to prune the pwned password hash cache. Old entries where already being ignored, so this will hopefully just reduce MySQL table bloat
Fix denial of service attack by preventing too long password which can trigger factorial number of brute force password checks when using Zxcvbn
Update new install option defaults to more recommend values:
Enforce password complexity for admins
Enable "Length check by default, and set the "Minimum length" to 8
Enable "Pwned password password validation" by default

Télécharger V3.7.1 :
Vous devez répondre avant de pouvoir voir le contenu des données cachées.
Version 3.7.3 - Bugfix update : Improve detection of admin/automated edits for the "Enforce password complexity for admins" feature.

Télécharger V3.7.3 :
Vous devez répondre avant de pouvoir voir le contenu des données cachées.
Version 3.7.4 - Bugfix update : Fix password checks could incorrectly apply when resetting a user's password

Télécharger V3.7.4 :
Vous devez répondre avant de pouvoir voir le contenu des données cachées.
Version 3.7.5 Bugfix update :

- Fix "Minimum time between triggering compromised password alerts on login" operating in seconds instead of hours
- Fix cases where email 2fa would not be forced enabled on the first login request after a password is discovered as compromised
- Rename various options to be better searchable
- Adjust various option defaults to be more robust.
- 'Minimum password length' from 8 => 10 characters
- 'Minimum password strength' from 'very weak' to 'weak'
- 'Pwned password minimum count (soft)' from 1 to 0
- 'Pwned password minimum count (hard)' from 2 to 1
- 'Pwned password cache time' from 7 to 3 days

Télécharger V3.7.5 :
Vous devez répondre avant de pouvoir voir le contenu des données cachées.
Version 3.8.0 - Feature update :
This add-on is now avaliable on atelieraphelion.com
  • Require StandardLib v1.18.0+
  • Add new "User-group for compromised passwords" option, which adds uses to the selected user-group when it is detected they have a compromised password on login.
    Defaults to disabled. Useful for targeting with notices
Télécharger V3.8.0 :
Vous devez répondre avant de pouvoir voir le contenu des données cachées.
Version 3.8.2 - Bugfix & Maintenance update :
  • Fix changing user entity while a write is pending in some cases
  • Add "Use rejected password fragments in password meter" option (default disabled).
    Take rejected password fragments into consideration when showing the password strength meter to the user.
    Security note: this makes the full list of rejected password fragments visible to end users; ensure that there aren't any sensitive password fragments before enabling.
Télécharger V3.8.2 :
Vous devez répondre avant de pouvoir voir le contenu des données cachées.
Version 3.9.0 - Feature update :
  • Add "Force password reset on compromised password" option
    • This option is likely overkill for most sites, and is not generally recommended
Télécharger V3.9.0 :
Vous devez répondre avant de pouvoir voir le contenu des données cachées.
Version 3.10.0 : XenForo 2.3 support
  • Require standardLib v1.20.0+
  • Restore XF2.1 support, note front-end Zxcvbn requires XF2.2+
  • Support XF2.3+
  • php 8.4+ compatibility
Télécharger V3.10.0 :
Vous devez répondre avant de pouvoir voir le contenu des données cachées.
Version 3.10.1 - Bugfix update :
- Fix javascript error when using XF2.3

Télécharger V3.10.1 :
Vous devez répondre avant de pouvoir voir le contenu des données cachées.
Version 3.10.2 - Bugfix update :
- Fix javascript error for XF2.2

Télécharger V3.10.2 :
Vous devez répondre avant de pouvoir voir le contenu des données cachées.
Version 3.11.1 - Feature update :
  • php 8.4+ compatibility fixes
  • Rename option "Password check types" to "New password validation rules"
  • Add "On login; consider known-bad passwords as compromised" option (default false)
  • Add new password validation rule "Prevent passwords which contain the user's email or username, and the site's domain/name." (default false)
Télécharger V3.11.1 :
Vous devez répondre avant de pouvoir voir le contenu des données cachées.
Version 3.12.1 - Feature update :
  • Fix server error when a password is very long
  • Add "Force two-step verification" permission
    • If enabled for a user, prevents email 2fa from being disabled
  • For new installs add a "User has compromised password" user-group, and update the "User-group for compromised passwords" option to use it
  • Align defaults with NIST Password Guidelines for 2024
    • Update "New password validation rules" defaults. "Prevent passwords which contain the user's email or username, and the site's domain/name" defaults to true
    • Update "Minimum password length" default to 15
Télécharger V3.12.1 :
Vous devez répondre avant de pouvoir voir le contenu des données cachées.
Version 3.12.2 - Bugfix update : Fix internal server error when registering an account without an email address (requires 3rd party addon to trigger).

Télécharger V3.12.2 :
Vous devez répondre avant de pouvoir voir le contenu des données cachées.
 
Dernière édition par un modérateur:
Ajout de la version 3.3.0 :)
 
Ajout de la version 3.4.0 :)
 
Ajout de la version 3.5.0 :)
 
Ajout de la version 3.6.1 :)
 
Ajout de la version 3.6.2 :)
 
Ajout de la version 3.6.3 :)
 
Ajout de la version 3.6.4 :)
 
Ajout de la version 3.6.5 :)
 
Ajout de la version 3.7.1 :)
 
Ajout de la version 3.7.3 :)
 
Ajout de la version 3.7.4 :)
 
Ajout de la version 3.7.5 :)
 

Version 3.8.0​

This add-on is now avaliable on atelieraphelion.com
  • Require StandardLib v1.18.0+
  • Add new "User-group for compromised passwords" option, which adds uses to the selected user-group when it is detected they have a compromised password on login.
    Defaults to disabled. Useful for targeting with notices
Télécharger V 3.8.0:

Vous devez répondre avant de pouvoir voir le contenu des données cachées.
@laurent68
 
Ajout de la version 3.8.2 :)
 
Sujets similaires Les plus vues Voir plus
Retour
Haut Bas