Skip to content
Snippets Groups Projects
  1. Jan 24, 2023
    • BlackDex's avatar
      Re-License Vaultwarden to AGPLv3 · 9342fa57
      BlackDex authored
      This commit prepares Vaultwarden for the Re-Licensing to AGPLv3
      Solves #2450
      9342fa57
    • Daniel García's avatar
      50fc2296
    • Daniel García's avatar
      4fab4c74
    • BlackDex's avatar
      Validate note sizes on key-rotation. · e38e1a5d
      BlackDex authored
      We also need to validate the note sizes on key-rotation.
      If we do not validate them before we store them, that could lead to a
      partial or total loss of the password vault. Validating these
      restrictions before actually processing them to store/replace the
      existing ciphers should prevent this.
      
      There was also a small bug when using web-sockets. The client which is
      triggering the password/key-rotation change should not be forced to
      logout via a web-socket request. That is something the client will
      handle it self. Refactored the logout notification to either send the
      device uuid or not on specific actions.
      
      Fixes #3152
      e38e1a5d
    • sirux88's avatar
      include key into user.set_password · cc91ac6c
      sirux88 authored
      cc91ac6c
    • BlackDex's avatar
      Update KDF Configuration and processing · 2d8c8e18
      BlackDex authored
      - Change default Password Hash KDF Storage from 100_000 to 600_000 iterations
      - Update Password Hash when the default iteration value is different
      - Validate password_iterations
      - Validate client-side KDF to prevent it from being set lower than 100_000
      2d8c8e18
    • Daniel García's avatar
      Merge branch 'BlackDex-issue-3152' · b17e2da2
      Daniel García authored
      b17e2da2
    • sirux88's avatar
      include key into user.set_password · d121cce0
      sirux88 authored
      d121cce0
    • Daniel García's avatar
      0eba7a88
    • BlackDex's avatar
      Validate note sizes on key-rotation. · 34ac16e9
      BlackDex authored
      We also need to validate the note sizes on key-rotation.
      If we do not validate them before we store them, that could lead to a
      partial or total loss of the password vault. Validating these
      restrictions before actually processing them to store/replace the
      existing ciphers should prevent this.
      
      There was also a small bug when using web-sockets. The client which is
      triggering the password/key-rotation change should not be forced to
      logout via a web-socket request. That is something the client will
      handle it self. Refactored the logout notification to either send the
      device uuid or not on specific actions.
      
      Fixes #3152
      34ac16e9
  2. Jan 14, 2023
  3. Jan 13, 2023
  4. Jan 12, 2023
Loading