John Mitchell wrote
Are you saying there is an issue with DNN because you can point more than one IIS website to the same binary files? If so, I don't see the risk. As Hooligannes pointed out, each application loads it's own copy into memory.
No, I'm saying that the problem is that all DotNetNuke installation articles and best practices discussed around the community are that a single installation and IIS website can provide the capability to support multiple portals, and that using this style if implementation is missleading in that it is not possible to provide SSL Security for more than one portal using this architecture.
It has been Identified in this thread that the only possible way to provide SSL Security for multiple portals in the same DNN application is actually to create multiple IIS websites that point to the same root DNN folder; but that this approach is not well tested (I had never even heard or thought of the approach before this thread) and that performance implications come along with it - in that now it's not really one application that is executing, but multiple - just to support SSL on more than one portal.
If we could overcome the performance issues by changing the architecture around a bit, this may remove the performance implication and then I feel that this way of hosting (one IIS configured website PER portal) is what should be used as a best practice because it is in fact the only way to provide ecrypted capabilities to more than one portal in a single DNN application; and that the general populous may overlook this if it is not address better in installation articles and how-tos.
I do agree about the sending passwords in clear text to the server though. I have SSL on my login for that,
If this is the case then you must only have SSL on your login for a single portal, is this correct? I'm just making sure we're in the same page.
but I think that all passwords should also be hashed and not encrypted so that the clear text password is not passed between db server and app.
Using encrypted passwords and not hashed passwords still means that clear text passwords are not passed between the db server and the app. DNN currently successfully does not send clear text passwords between the web server and the db server. I would agree with you that perhaps the DEFAULT implementation should use hashed passwords instead of encrypted passwords, as hashed passwords are stronger in that they are not reversible; One of the first things I do on all of my installations is to change the authorization provider settings to HASHED instead of ENCRYPTED.