Closed slrslr closed 1 month ago
This insecurity exists only in theory, with a CAPTCHA and a limit on the number of failures, and a low likelihood of brute force cracking. Changing this piece requires all users to reset their passwords, which has a large impact. We will consider changing this in the next major release.
You are right that the brute-force login protection seems good. But I have not written this issue with a brute-force login concern in mind, but being concerned about the database leak of the members data (passwords in this case).
As said, currently used crypto per my understanding is insecure and a bad practice, see my initial post please. As such i think that this issue should remain open or being noted as a "milestone" for the next major release.
https://github.com/xiaomlove/nexusphp/blob/4d865384ddc43695950e17227fb29ed749730284/include/functions.php#L2997
https://github.com/xiaomlove/nexusphp/blob/4d865384ddc43695950e17227fb29ed749730284/public/takesignup.php#L151
Asking ChatGPT about this method of generating password results in:
md5: I have confirmed from other sources that md5 is bad practice nowadays. bcrypt: "Use scrypt when you can; bcrypt if you cannot." https://stackoverflow.com/questions/401656/secure-hash-and-salt-for-php-passwords salt: https://stackoverflow.com/questions/1645161/salt-generation-and-open-source-software/1645190