3
Before you call it paranoic and exaggarated, let me tell you a little story:
A site running with XOOPS 2.0.10 and autologin hack is hacked. How? Because of a hacker being able to construct a cookie that resembles the autologin cookie of an administrator. How did he do that? He used the password hash of the administrator, which he got from the database through an SQL injection hole in the XML-RPC interface. How did he get the password hash? He knew the username of the administrator.
So what is the solution to making sure this doesn't happen again? We first closed the hole in the XML-RPC interface, but is that enough? I don't think so. If another hole appears somewhere else in the core or in a module, we have the whole problem once again.
Usually, security problems in XOOPS have been fixed before they got serious, but this time XOOPS sites got HACKED!
I don't know about you, but XOOPS sites getting hacked is serious business for me - and whatever I can do to ensure that XOOPS sites are difficult to hack, I will do. You may think that the web equivalent of putting a blanket over your head is adequate - but I don't.
Instead of protesting against this change, you should rather focus your efforts on how it should be communicated so that your users will understand it. Help texts, explanations etc.
Quote:
to protect nothing more than an email address
All content on your site, all forum threads in your forums, deletion of all users on your site is NOT "nothing more than an email address". Just think about all the things you can do on your website - and think about the what-ifs of someone else gaining that access.
"When you can flatten entire cities at a whim, a tendency towards quiet reflection and seeing-things-from-the-other-fellow's-point-of-view is seldom necessary."
Cusix Software