one blowfish secret is enough
This commit is contained in:
@@ -5,6 +5,11 @@ phpMyAdmin - Changelog
|
|||||||
$Id$
|
$Id$
|
||||||
$Source$
|
$Source$
|
||||||
|
|
||||||
|
2003-07-07 Marc Delisle <lem9@users.sourceforge.net>
|
||||||
|
* libraries/auth/cookie.auth.lib.php3, config.inc.php3, user_password.php3,
|
||||||
|
Documentation.html: only one blowfish secret is necessary for
|
||||||
|
all servers, thanks to Alexander M. Turek
|
||||||
|
|
||||||
2003-07-06 Michal Cihar <nijel@users.sourceforge.net>
|
2003-07-06 Michal Cihar <nijel@users.sourceforge.net>
|
||||||
* lang/czech: Updated.
|
* lang/czech: Updated.
|
||||||
* css/phpmyadmin.css.php3: url() should not contain quotes.
|
* css/phpmyadmin.css.php3: url() should not contain quotes.
|
||||||
|
@@ -402,6 +402,15 @@ $cfg['PmaAbsoluteUri'] = (!empty($_SERVER['HTTPS']) ? 'https' : 'http') . '://'
|
|||||||
<br /><br />
|
<br /><br />
|
||||||
</dd>
|
</dd>
|
||||||
|
|
||||||
|
<dt><b>$cfg['blowfish_secret']</b> string</dt>
|
||||||
|
<dd>
|
||||||
|
Starting with version 2.5.2, the 'cookie' auth_type uses blowfish
|
||||||
|
algorithm to encrypt the password.
|
||||||
|
<br />
|
||||||
|
If at least one server configuration uses 'cookie' auth_type,
|
||||||
|
enter here a passphrase that will be used by blowfish.
|
||||||
|
</dd>
|
||||||
|
|
||||||
<dt><b>$cfg['Servers']</b> array</dt>
|
<dt><b>$cfg['Servers']</b> array</dt>
|
||||||
<dd>
|
<dd>
|
||||||
Since version 1.4.2, phpMyAdmin supports the administration of multiple
|
Since version 1.4.2, phpMyAdmin supports the administration of multiple
|
||||||
@@ -517,14 +526,6 @@ $cfg['PmaAbsoluteUri'] = (!empty($_SERVER['HTTPS']) ? 'https' : 'http') . '://'
|
|||||||
<br /><br />
|
<br /><br />
|
||||||
</dd>
|
</dd>
|
||||||
|
|
||||||
<dt>
|
|
||||||
<b>$cfg['Servers'][$i]['blowfish_secret']</b> string<br />
|
|
||||||
</dt>
|
|
||||||
<dd>
|
|
||||||
If your are using "cookie" auth_type, enter here
|
|
||||||
a secret passphrase which will be used by the blowfish encryption
|
|
||||||
mecanism to protect the password stored in the temporary cookie.
|
|
||||||
</dd>
|
|
||||||
<dt>
|
<dt>
|
||||||
<b>$cfg['Servers'][$i]['user']</b> string<br />
|
<b>$cfg['Servers'][$i]['user']</b> string<br />
|
||||||
<b>$cfg['Servers'][$i]['password']</b> string
|
<b>$cfg['Servers'][$i]['password']</b> string
|
||||||
|
@@ -52,6 +52,12 @@ $cfg['PmaAbsoluteUri_DisableWarning'] = FALSE;
|
|||||||
*/
|
*/
|
||||||
$cfg['PmaNoRelation_DisableWarning'] = FALSE;
|
$cfg['PmaNoRelation_DisableWarning'] = FALSE;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The 'cookie' auth_type uses blowfish algorithm to encrypt the password.
|
||||||
|
* If at least one server configuration uses 'cookie' auth_type,
|
||||||
|
* enter here a passphrase that will be used by blowfish.
|
||||||
|
*/
|
||||||
|
$cfg['blowfish_secret'] = '';
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Server(s) configuration
|
* Server(s) configuration
|
||||||
@@ -71,9 +77,6 @@ $cfg['Servers'][$i]['controluser'] = ''; // MySQL control user settin
|
|||||||
$cfg['Servers'][$i]['controlpass'] = ''; // access to the "mysql/user"
|
$cfg['Servers'][$i]['controlpass'] = ''; // access to the "mysql/user"
|
||||||
// and "mysql/db" tables)
|
// and "mysql/db" tables)
|
||||||
$cfg['Servers'][$i]['auth_type'] = 'config'; // Authentication method (config, http or cookie based)?
|
$cfg['Servers'][$i]['auth_type'] = 'config'; // Authentication method (config, http or cookie based)?
|
||||||
$cfg['Servers'][$i]['blowfish_secret'] = ''; // Secret key used by
|
|
||||||
// blowfish encryption
|
|
||||||
// (if auth_type='cookie')
|
|
||||||
$cfg['Servers'][$i]['user'] = 'root'; // MySQL user
|
$cfg['Servers'][$i]['user'] = 'root'; // MySQL user
|
||||||
$cfg['Servers'][$i]['password'] = ''; // MySQL password (only needed
|
$cfg['Servers'][$i]['password'] = ''; // MySQL password (only needed
|
||||||
// with 'config' auth_type)
|
// with 'config' auth_type)
|
||||||
@@ -127,7 +130,6 @@ $cfg['Servers'][$i]['compress'] = FALSE;
|
|||||||
$cfg['Servers'][$i]['controluser'] = '';
|
$cfg['Servers'][$i]['controluser'] = '';
|
||||||
$cfg['Servers'][$i]['controlpass'] = '';
|
$cfg['Servers'][$i]['controlpass'] = '';
|
||||||
$cfg['Servers'][$i]['auth_type'] = 'config';
|
$cfg['Servers'][$i]['auth_type'] = 'config';
|
||||||
$cfg['Servers'][$i]['blowfish_secret'] = '';
|
|
||||||
$cfg['Servers'][$i]['user'] = 'root';
|
$cfg['Servers'][$i]['user'] = 'root';
|
||||||
$cfg['Servers'][$i]['password'] = '';
|
$cfg['Servers'][$i]['password'] = '';
|
||||||
$cfg['Servers'][$i]['only_db'] = '';
|
$cfg['Servers'][$i]['only_db'] = '';
|
||||||
@@ -155,7 +157,6 @@ $cfg['Servers'][$i]['compress'] = FALSE;
|
|||||||
$cfg['Servers'][$i]['controluser'] = '';
|
$cfg['Servers'][$i]['controluser'] = '';
|
||||||
$cfg['Servers'][$i]['controlpass'] = '';
|
$cfg['Servers'][$i]['controlpass'] = '';
|
||||||
$cfg['Servers'][$i]['auth_type'] = 'config';
|
$cfg['Servers'][$i]['auth_type'] = 'config';
|
||||||
$cfg['Servers'][$i]['blowfish_secret'] = '';
|
|
||||||
$cfg['Servers'][$i]['user'] = 'root';
|
$cfg['Servers'][$i]['user'] = 'root';
|
||||||
$cfg['Servers'][$i]['password'] = '';
|
$cfg['Servers'][$i]['password'] = '';
|
||||||
$cfg['Servers'][$i]['only_db'] = '';
|
$cfg['Servers'][$i]['only_db'] = '';
|
||||||
|
@@ -242,7 +242,7 @@ input.textfield {font-family: <?php echo $right_font_family; ?>; font-size: <?ph
|
|||||||
|
|
||||||
// Displays the warning message and the login form
|
// Displays the warning message and the login form
|
||||||
|
|
||||||
if ($GLOBALS['cfg']['Server']['blowfish_secret']=='') {
|
if ($GLOBALS['cfg']['blowfish_secret']=='') {
|
||||||
?>
|
?>
|
||||||
<p class="warning"><?php echo $GLOBALS['strSecretRequired']; ?></p>
|
<p class="warning"><?php echo $GLOBALS['strSecretRequired']; ?></p>
|
||||||
</body>
|
</body>
|
||||||
@@ -435,7 +435,7 @@ if (uname.value == '') {
|
|||||||
$from_cookie = FALSE;
|
$from_cookie = FALSE;
|
||||||
}
|
}
|
||||||
$PHP_AUTH_PW = base64_decode($PHP_AUTH_PW);
|
$PHP_AUTH_PW = base64_decode($PHP_AUTH_PW);
|
||||||
$PHP_AUTH_PW = PMA_blowfish_decrypt($PHP_AUTH_PW,$GLOBALS['cfg']['Server']['blowfish_secret']);
|
$PHP_AUTH_PW = PMA_blowfish_decrypt($PHP_AUTH_PW,$GLOBALS['cfg']['blowfish_secret']);
|
||||||
|
|
||||||
if ($PHP_AUTH_PW == "\xff(blank)") {
|
if ($PHP_AUTH_PW == "\xff(blank)") {
|
||||||
$PHP_AUTH_PW = '';
|
$PHP_AUTH_PW = '';
|
||||||
@@ -507,7 +507,7 @@ if (uname.value == '') {
|
|||||||
// Some binary contents are now retrieved properly when stored
|
// Some binary contents are now retrieved properly when stored
|
||||||
// as a cookie, so we base64_encode()
|
// as a cookie, so we base64_encode()
|
||||||
setcookie('pma_cookie_password',
|
setcookie('pma_cookie_password',
|
||||||
base64_encode(PMA_blowfish_encrypt(((!empty($cfg['Server']['password'])) ? $cfg['Server']['password'] : "\xff(blank)"), $GLOBALS['cfg']['Server']['blowfish_secret'])),
|
base64_encode(PMA_blowfish_encrypt(((!empty($cfg['Server']['password'])) ? $cfg['Server']['password'] : "\xff(blank)"), $GLOBALS['cfg']['blowfish_secret'])),
|
||||||
0,
|
0,
|
||||||
$GLOBALS['cookie_path'], '',
|
$GLOBALS['cookie_path'], '',
|
||||||
$GLOBALS['is_https']);
|
$GLOBALS['is_https']);
|
||||||
|
@@ -55,7 +55,7 @@ if (isset($nopass)) {
|
|||||||
|
|
||||||
// Changes password cookie if required
|
// Changes password cookie if required
|
||||||
if ($cfg['Server']['auth_type'] == 'cookie') {
|
if ($cfg['Server']['auth_type'] == 'cookie') {
|
||||||
setcookie('pma_cookie_password', base64_encode(PMA_blowfish_encrypt($pma_pw,$GLOBALS['cfg']['Server']['blowfish_secret'])), 0, $cookie_path, '', $is_https);
|
setcookie('pma_cookie_password', base64_encode(PMA_blowfish_encrypt($pma_pw,$GLOBALS['cfg']['blowfish_secret'])), 0, $cookie_path, '', $is_https);
|
||||||
} // end if
|
} // end if
|
||||||
// For http auth. mode, the "back" link will also enforce new
|
// For http auth. mode, the "back" link will also enforce new
|
||||||
// authentication
|
// authentication
|
||||||
|
Reference in New Issue
Block a user