Hi David,
4.2.3 changed the way authenticate hooks are altered by the plugin. Before, AIOWPSF replaced one of default hooks added by WordPress core with its own version and this implementation unfortunately failed to support login via email.
Since 4.2.3, all default WordPress hooks attached to authenticate method are retained and AIOWPSF adds extra hooks before (to check if user IP is locked) and after (to perform all other checks). So I would actually expect less friction between AIOWPSF and other plugins that hooks into users authentication process.
I don’t know Simple LDAP Login, so if you can investigate the issue further, it would be great. Anyway, I might have a look on it when I have some time.
Cheers,
Česlav
I’ve fix the error and create a pull request:
https://github.com/Arsenal21/all-in-one-wordpress-security/pull/68
The problem appear if somebody use a plugin that must remote validate a users, es: ldap,ad,openid ecc…
I think that will be correct if you release this fix asap, as other users might facing this blocking problem.
Thank you,
Regards
Hi,
The problem appear if somebody use a plugin that must remote validate a users, es: ldap,ad,openid ecc…
I would not generalize too much. The problem appears with “Simple LDAP Login”, because it hooks to authenticate filter with priority 1 (ie. very, very early). The problematic AIOWPSF routine that you patched is hooked with the same priority, but for a reason: if an IP is locked, the login attempt should be terminated as soon as possible to spare system resources in case of brute-force attack.
Your patch is fine and I would merge it if I could, but I think an even better solution is to issue a PR to “Simple LDAP Login” requesting modification of their hook priority to a value slightly higher than 1. This way, AIOWPSF will be able to block login attempts from locked IPs before LDAP authentication is performed.
Cheers,
Česlav
We will incorporate this change in the next release of the plugin.