Hi monks
I've been playing with a Firefox plug-in to encrypt my passwords, which I messed up, and I've just requested to have my password reset, and I was surprised to see my actual password being emailed to me. This means that my password is stored in clear text in the Perlmonks database.
As a security advocate, these kinds of observations make me somewhat nervous.
You may recall a recent scare where some Perlmonks passwords got out onto the web. This makes me think that an overhaul of the Perlmonks security module should be in order.
It will be a trivial task to hash the passwords in the database with MD5 or even better SHA1, so that the clear text password is never known to anyone except the account holder. Should a password reset be required, reset the password, and email a unique key.. Also something that is not difficult to do..
Lastly, I would like to see the use of OpenID, or technologies like the Yubikey for authentication. It is not difficult to implement, and I think that as a community we need to show that we are capable of running a well managed system.
Happy new year to all..
Massyn
In reply to Passwords not being hashed? by Massyn
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |