[wp-hackers] Client side password encryption
viper at viper007bond.com
Sun Mar 16 11:33:56 GMT 2008
It's combined with a one-time use nonce, so I don't believe that can happen.
DD32: Yeah, the new hashes are longer than 32 characters and MD5 sucks, so I
figured, but I'm still trying to figure out if I can get from MD5( $pass )
to $newHash somehow. I'll poke around the code some more.
On Sun, Mar 16, 2008 at 3:08 AM, howard chen <howachen at gmail.com> wrote:
> On Sun, Mar 16, 2008 at 5:27 PM, Viper007Bond <viper at viper007bond.com>
> > So I've been playing around with
> > http://wordpress.org/extend/plugins/semisecure-login/
> Personally, even if you encrypt the password at client side using md5,
> it is still subject to replay attack.
> A better system would be: http://pajhome.org.uk/crypt/md5/auth.html
> wp-hackers mailing list
> wp-hackers at lists.automattic.com
Viper007Bond | http://www.viper007bond.com/ | http://www.finalgear.com/
More information about the wp-hackers