Closed mattlorimor closed 5 years ago
@SQLDBAWithABeard
Any thoughts on merging this in so that PwnedPasswords can be checked again? Currently, calls to https://haveibeenpwned.com/api/v2/pwnedpassword/
are redirecting to https://haveibeenpwned.com/Error/PageNotFound
which, of course, responds with an HTTP 200
. The current code path takes that 200
and assumes that it means a password has been pwned when it hasn't. This PR fixes that.
https://haveibeenpwned.com/api/v2/pwnedpassword/
are probably failing. This PR changes the pwned password check to use the anonymous endpoint Troy has set up.IT IS NOT RECOMMENDED TO USE ACTIVE PASSWORDS WITH THIS SERVICE
warning since only the first five characters of a SHA1 hash are now sent. The API responds with ~500 hash suffixes that the requesting client can check against.