dl 0.11 is now officially available for download at:

  http://www.thregr.org/~wavexx/software/dl/releases/dl-0.11.zip

The Thunderbird Addon is now also publicly supported, and can be
downloaded here:

  http://www.thregr.org/~wavexx/software/dl/thunderbird.html

The extension/xpi is also contained in the full dl distribution (this
page is just a stand-alone download with a small installation tutorial
for Thunderbird users).

The "dl-wx" pre-built binary has also been refreshed for dl 0.11:

  http://www.thregr.org/~wavexx/software/dl/files/dl-wx-0.11-win32.zip

Release notes for this release:

dl 0.11: 05/07/2013
-------------------

* Fixed CSRF vulnerability of the admin interface (discovered by Dirk
Reimers).
* Mitigations against session fixation attacks (discovered by Dirk Reimers).
* Fixed CSRF vulnerability of the REST interface when used in
combination with HTTP/external authentication.
* Improved client-side validation of the forms (with HTML5/JS where
available).
* Password hashing for the user/ticket/grant DB switched to PHPass.
* Progress bar updating improvements.
* Thunderbird integration is now available through the new included
extension "Thunderbird-Filelink-DL", which converts attachments to links
automatically.
* Minor bug/cosmetic fixes.

Please note: DL 0.11 requires a database schema update! Please read the
database upgrade procedure in the README!

Upgrading to DL 0.11 has implication for existing users. The new hashing
scheme limits usernames to 60 characters and passwords to 72 to prevent
DoS attacks. Users having usernames/passwords exceeding these limits
won't be able to login after the upgrade, and can only be managed
manually through the command line.

The password hash of existing users is automatically rehashed using the
new scheme upon a successful login (no password change is required).

The optional password of tickets and grants is similarly affected and
upgraded transparently upon successful usage. Tickets/grants having
passwords longer than 72 characters though will require a manual
password reset.

To fully prevent CSRF attacks on the REST interface when used in
combination with HTTP authentication the protocol has been broken.
Clients (such as the supplied "dl-wx") require an upgrade, though new
clients can still communicate to an old server.

-------------------

Thanks again to all the testers, contributors and translators that made
this release possible.


Reply via email to