. */ /* User interface display or not ciphered passwords. Set to false avoid database leakage by user interface (but not by raw HTTP request). */ $VIEW_CIPHERED_PASSWORDS=true; /* Allows user creation */ $ADMIN_MODE=true; /* Number of iterations for PBKDF2 algorithm. Minimum recommended level is 1000, but you can increase this value to have a better security (need more computation power). !! Warning !! This impact master keys. So if you change this value with existings masterkeys, they will unusable ! */ $PBKDF2_LEVEL=1000; /* This is a security feature : It protects from database dump and database purge without authentication. When get all entries, instead of returning logins/passwords, it returns "shadow logins". These are random values. Shadow logins must be encrypted using masterkey and salt (to generate a unique PBKDF2 derivation) that result in an access tokens. With this access token, user has the right to get encrypted login/password values and remove them. It's a kind of challenge but requires more cpu bandwidth (one derivation + two decryption for each password !). This option is backward compatible with old version < 0.6 */ $USE_SHADOW_LOGINS=1; /* Protection against DDoS. Each request can contains multiple password combinations (to support wildcards for example) and multiple names. Currently only two passwords are sent from addon : www.example.com *.example.com But, on future we may also consider 'www.example.*', '*.example.*' and lower case username. For maximum security, you can set it to 2 or 4 if you want to be backward compatible with addons/extions <= 0.7. */ $MAX_PASSWORDS_PER_REQUEST=10; /* Protection against brute force. Minimum delay (in milliseconds) between two requests. */ $REQUESTS_MIN_DELAY=1000; /* Clear master keys and reset passwords after 15 minutes of inactivity */ $CLEAR_TIME=15*60*1000; ?>