Note:

If you want to create a new page for developers, you should create it on the Moodle Developer Resource site.

Moodle 1.9.7 release notes

From MoodleDocs

Release date: Not yet released

Highlights

Security issues

This release contains a lot of security and privacy fixes related to the handling of user data and passwords in Moodle backups (MDL-20851)

  1. MDL-20838 We have changed the former default of saving hashed user passwords in backups that contain user data, for all versions of Moodle. The main scenario that this will affect is when people are copying a course including userdata into a site different from the original (which is not that common a use case). Those that really need it and know what they are doing can add $CFG->includeuserpasswordsinbackups in config.php (only).
  2. MDL-20846 Restore has been fixed to cope with missing user password hashes in backups containing new user data. It will set the password to a special value that prevents login. The next time that user tries to log in with their username on this new site they get an explanation and are led through the standard password recovery process.
  3. MDL-20844 We no longer include course+group enrolment keys in backups, unless 'includecoursepasswordsinbackup' is set. Instead, put in a marker to show that there was a key at some point.
  4. MDL-20866 Restore is fixed to cope with missing course+group enrolment keys. The restore routine will now inform the user about it and ask them to type in new keys.
  5. MDL-18807 We try to ensure that $CFG->passwordsaltmain is set in config.php, so that passwords are stored more securely in the database. (We can't save the salt itself in the database, in case it got hacked and changed, so we need the admin to add it manually). We do this during install in the automatic config.php, and also by annoying the admin to add it to config.php, via messaging, security report, upgrade notice etc. I'd stop short of making the site dead until it's added, though it's an option.
  6. MDL-20834 For privacy, we now allow admins to choose whether teachers can export user data. We implemented a new capability to allow teachers to include any user data in backups at all, called moodle/backup:userinfo. This is not allowed by default, so that admin needs to turn it on explicitly. It should be labelled with risks, and the security report should also warn about roles that have it.
  7. MDL-20849 We have implemented a new capability to allow teachers to restore user data (including creation of new users if required), called moodle/restore:userinfo. Not allowed by default, as above.
  8. MDL-20854 To remove possible passwords hidden in existing backups, we have implemented a cleanup script to process existing backup files in moodledata and delete all password hashes from them.
  9. MDL-18006 To improve password quality and reduce the chance of md5 lookup attack, password policy is now turned on by default in new installs, and switched on during upgrade to 1.9.7.
  10. MDL-20853 To protect sites from old backups that are not accessible to Moodle, all admins are forced to recreate their passwords after upgrade to 1.9.7 or later. This is done by setting auth_forcepasswordchange of those users, so that they are prompted to change their passwords on the next login (with the new password policy and hopefully salt).
  11. MDL-19608 To assist admins who might want to force their users to reset their passwords, we have added a feature to the bulk user action screen to do this.

New language pack

  • Dhivehi - Ahmed Shareef, Moosa Ali, Amir Hussein

(See Translation credits for additional details.)

See also