News in the WordPress world, October 2015
WordPress 4.4 Beta 2 is available for testing. The new version of WordPress will include 3 new important features:
- Responsive Images. All image sizes are now included in the HTML output of an image, allowing your browser to pick the best image for your screen resolution.
- The basics of the REST API infrastructure. It’s the first half of the REST API. You still need to use the separate plugin if you want to use the REST API on a site, but soon you won’t!
- WordPress becomes an oEmbed provider. You can now embed WordPress posts, pages, and post types in other WordPress sites.
If you’ve had to deal with plugin translations in the past, you know it used to be a cumbersome process: people who translated your plugin had to send you .po and .mo files, and you would commit those files into your plugin’s languages folder in the next release. Things are much easier now, thanks to WordPress.org. All translations happen on translate.wordpress.org. You can contribute to translations for just about any plugin, and as soon as your translations get approved, they’ll be shipped to everyone using the plugin.
Even the readme can be translated, so we’re slowly moving towards a fully localized plugin repository!
Not a WordPress news, but something that will affect everyone with a website. Let’s Encrypt is a new free SSL certificate authority, and is now trusted by all major browsers. Soon they’ll stat issuing free SSL certificates to everyone who’d need one. They contribute to a safer internet for everyone.
More XML-RPC news
XML-RPC is a feature allowing you to interact with a WordPress site. It’s used by the mobile apps, by plugins like Jetpack, by services like IFTTT, and by many other apps and services.
Since it can be used to publish posts remotely, it’s one of the points of entry hackers like to target. They’ll try to authenticate to your site via XML-RPC, and access your site through there.
Unfortunately, it can be abused, and the Sucuri security firm discovered that hackers had discovered a new way to abuse that feature. They now use a method named
system.multicallto execute multiple methods inside a single request. That means they can test several username / password combinations to get into your site in one single request. That’s consequently not enough to just block folks who do multiple requests to your site’s XML-RPC in a short period of time, you now have to look at what people do in these requests. We’ll cover how to protect yourself against those attacks in my talk, a bit later.