passwords

If I increase the bcrypt cost do I have to rehash the users password already registered?

扶醉桌前 提交于 2019-12-02 02:45:18
问题 I'm just digging into Symfony2 and just got my own user-provider running. ATM I use brypt with a cost of 12. If I now increase the cost, bcrypt should rehash the password again!?! But how can I persist the new password to database? 回答1: You can change the cost in any moment because as you can read in the official symfony2 docs you don't need to rehash the old passwords because they are automatically handled with the old cost (and if you want you can force the users in the future to change

Query about Html <input type="password> tag…?

孤街浪徒 提交于 2019-12-02 02:15:43
问题 I have seen different Password masking characters in different logon screens instead of "a big black dot". How can I change the Password masking character in password field. I dont find an option to do this. Pls help. 回答1: There is no HTML attribute to stylize the password field mask characters. You need to use a combination of HTML, CSS and JavaScript to achieve the desired effect. 回答2: You could use this jquery plugin: http://blog.decaf.de/2009/07/iphone-like-password-fields-using-jquery/

Authentication with bcrypt hashed password

不想你离开。 提交于 2019-12-02 02:15:43
问题 In my C++ application, user must login in order to use the application. The user login data are taken from phpBB 3.1 database, which uses for password hashing bcrypt. However, I didn't found any suitable example for C++. So my question is: How I can auth user with bcrypt hashed password in C++? I know how to do authentication from external database in C++, I just need help with the bcrypt. Thank you! 回答1: BCrypt is really not as common as it could be, but there is a Stackoverflow question on

storing passwords in sql server database using ef core code first

自古美人都是妖i 提交于 2019-12-02 01:52:17
I have this class to represent my users: public class User { public int ID {get; set;} public string UserName {get; set;} [DataType(DataType.Password)] public string Password {get; set;} } A simplistic version of my register method looks like this: [HttpPost] Register(User newUser) { ... _context.add(newUser); await _context.SaveChangesAsync(); ... } So my question is: Should I alter the password type from a regular string before storing? If so, to what data type? YES YES YES Never store passwords as plain text While much of this is a security discussion rather than a programming one, you

Curl fails on sftp password authentication

半世苍凉 提交于 2019-12-02 01:46:43
When I manually sftp using username and password it works fine, when using curl it fails. The same script will successfully connect to other servers with no problem. Because I can manually log in and other clients don't have a problem the server admins aren't much help. Here is the curl failed attempt: curl -v --insecure --user username:password sftp://someurl.com * Trying 199.187.***.***... * Connected to someurl.com (199.187.***.***) port 22 (#0) * SSH MD5 fingerprint: 6831eae63f230952a1775e0f67f80e7b * SSH authentication methods available: publickey,gssapi-keyex,gssapi with-mic,password *

Python Fabric: Skip logins needing passwords

假如想象 提交于 2019-12-02 01:32:08
I have a similar issue to this: How can I skip Fabric connections that ask for a password? which has no answer. I'm looking for a way to get Fabric to consider bad any host asking for a password instead of an SSH key login, since this means the user I'm connecting as doesn't have an account on the server (and I'm iterating through a large list of hosts). I've tried setting env.password = None and env.password = 'none' as well as with setting(warn_only=True): but Fabric keeps asking for the password. Any way around this? I believe env.abort_on_prompts will achieve what you need, i.e. fail if

Is there a method to encrypt passwords stored in a VBS

送分小仙女□ 提交于 2019-12-02 01:23:05
I have a VBS script I use at work for automating tasks when connected to Cisco routers and switches, including automating the login process. Not unreasonably people are a little edgy about storing their password in a plain text VBS file, so I provide them with the option to prompt every time for the password or have it stored in the script. Is there a method by which I could call out to a Windows API which might be able to handle encryption for me? I would need a way to both a) encrypt the original password so it could be safely stored in the script, and b) provide a way of calling the decrypt

Regex to validate password

一世执手 提交于 2019-12-02 01:08:25
问题 I've looked on here for some ideas but I still seem to be struggling with coming up with a regular expression to meet my requirements. I need a regular expression to check a password format, the criteria are: At least 1 uppercase letter At least 1 number Only alphanumeric characters (no special characters) At least 8 characters long The regular expression I'm using is: ^(?=.*[a-z])(?=.*[A-Z])(?=.*\d).{8,}$ However this is also allowing characters like !$& . Is there a modification I need to

If I increase the bcrypt cost do I have to rehash the users password already registered?

删除回忆录丶 提交于 2019-12-01 23:22:20
I'm just digging into Symfony2 and just got my own user-provider running. ATM I use brypt with a cost of 12. If I now increase the cost, bcrypt should rehash the password again!?! But how can I persist the new password to database? You can change the cost in any moment because as you can read in the official symfony2 docs you don't need to rehash the old passwords because they are automatically handled with the old cost (and if you want you can force the users in the future to change their password like happens in many large sites). DevWL You can't reverse a hash function so you're left with

Is it safe to store (hashed) passwords in a cookie?

情到浓时终转凉″ 提交于 2019-12-01 22:38:40
I've read some articles and questions on SO (e.g. here ) that say you shouldn't store a user's password in a cookie. If the password is salted and hashed, why is this insecure? In particular, why is it less secure than using sessions, the alternative usually suggested? If the user wants to stay logged in then surely this new cookie (with a session ID/hash) is exactly as secure as the one with the user's password? If the cookie is "stolen" on some way the attacker can log in as the user in the same way. EDIT : The main crux of the question is the part about the user staying logged in, i.e. via