You are here

README.txt in Paranoia 7

Same filename and directory in other branches
  1. 8 README.txt
  2. 6 README.txt
Description:
===========
Paranoia module is for all the sysadmins out there who think that
allowing random CMS admins to execute PHP of their choice is not
a safe idea.

What it does:
=============
- Disable the PHP module.
- Disable granting of the "use PHP for block visibility" permission.
  Save the permissions form once to remove all previous grants.
  (An error appears in the site status report if a role still has this
  permission.)
- Disable granting to Anonymous or Authenticated any permission that is
  marked "restrict access" in a module's hook_permission.
- Disable granting several permissions from popular contribs that are not
  marked as "restrict access" but are still important.
- Remove the PHP and paranoia modules from the module admin page.
- Provides a hook to let you remove other modules from the module admin page.


Using the feature to scramble the password for stale accounts
=============================================================
Paranoia includes a feature to scramble the password of an account that has not
logged in for a while. This feature uses a queue so that it can scalably handle
scrambling the password of thousands of accounts. The "scramble" does not set a
new password. It sets the password to an invalid string which will
always fail when compared to any user input. To use this feature:

1. Navigate to /admin/config/system/paranoia to configure how many days an
   account must be inactive before it's password will be scrambled. Also
   choose whether or not to email users letting them know their password was
   reset.

2. Use the Drush command to queue up accounts to be marked as stale:

  drush -v paranoia-reset-stale-accounts

3. Run the queue to process the stale expirations:

  drush -v queue-run paranoia_stale_expirations

Using the -v option on drush will show extra information about the operations.

You can also let cron handle processing the queue, though that may take a long time.

NOTE on disabling:
=====
The only way to disable paranoia module is by changing its status in the
database system table.  By design it does not show up in the module
administration page after it is enabled.

You can disable it with a database query:
UPDATE system SET status = 0 WHERE name = 'paranoia';

Or you can disable it with drush:
drush dis paranoia

Support
=======
View current issues:
http://drupal.org/project/issues/paranoia
Submit a new issue:
http://drupal.org/node/add/project-issue/paranoia

Development
===========
All development happens in branches like 7.x-1.x and 6.x-1.x

Maintainers
======
Gerhard Killesreiter
Greg Knaddison @greggles

File

README.txt
View source
  1. Description:
  2. ===========
  3. Paranoia module is for all the sysadmins out there who think that
  4. allowing random CMS admins to execute PHP of their choice is not
  5. a safe idea.
  6. What it does:
  7. =============
  8. - Disable the PHP module.
  9. - Disable granting of the "use PHP for block visibility" permission.
  10. Save the permissions form once to remove all previous grants.
  11. (An error appears in the site status report if a role still has this
  12. permission.)
  13. - Disable granting to Anonymous or Authenticated any permission that is
  14. marked "restrict access" in a module's hook_permission.
  15. - Disable granting several permissions from popular contribs that are not
  16. marked as "restrict access" but are still important.
  17. - Remove the PHP and paranoia modules from the module admin page.
  18. - Provides a hook to let you remove other modules from the module admin page.
  19. Using the feature to scramble the password for stale accounts
  20. =============================================================
  21. Paranoia includes a feature to scramble the password of an account that has not
  22. logged in for a while. This feature uses a queue so that it can scalably handle
  23. scrambling the password of thousands of accounts. The "scramble" does not set a
  24. new password. It sets the password to an invalid string which will
  25. always fail when compared to any user input. To use this feature:
  26. 1. Navigate to /admin/config/system/paranoia to configure how many days an
  27. account must be inactive before it's password will be scrambled. Also
  28. choose whether or not to email users letting them know their password was
  29. reset.
  30. 2. Use the Drush command to queue up accounts to be marked as stale:
  31. drush -v paranoia-reset-stale-accounts
  32. 3. Run the queue to process the stale expirations:
  33. drush -v queue-run paranoia_stale_expirations
  34. Using the -v option on drush will show extra information about the operations.
  35. You can also let cron handle processing the queue, though that may take a long time.
  36. NOTE on disabling:
  37. =====
  38. The only way to disable paranoia module is by changing its status in the
  39. database system table. By design it does not show up in the module
  40. administration page after it is enabled.
  41. You can disable it with a database query:
  42. UPDATE system SET status = 0 WHERE name = 'paranoia';
  43. Or you can disable it with drush:
  44. drush dis paranoia
  45. Support
  46. =======
  47. View current issues:
  48. http://drupal.org/project/issues/paranoia
  49. Submit a new issue:
  50. http://drupal.org/node/add/project-issue/paranoia
  51. Development
  52. ===========
  53. All development happens in branches like 7.x-1.x and 6.x-1.x
  54. Maintainers
  55. ======
  56. Gerhard Killesreiter
  57. Greg Knaddison @greggles