From what I understand of it it was like that earlier but he extended it to passwords. Check the bottom of the page where it says "Pwned Passwords".That's not a password check -- all it could tell you is if the email (or maybe username) was in a compromised set of data. Taking action on that alone can actually be user hostile.
It appears that you are using a password that you also use on other sites and is listed in the www.haveibeenpowned.com database. More information here.
Please change your password now.
You want to send a users email address, then another request to check password, to a third-party during registration to make sure they aren't in the database? What's to stop that third-party from logging the requests? Then they would have the users login info. I wouldn't send the password. Display a message with a link if you want members to check if they're in there or not before they register.IF the member is in the HIBP database (email match) AND the password also matches one of the 3.6 million passwords in the database
I'd have to agree with this.You want to send a users email address, then another request to check password, to a third-party during registration to make sure they aren't in the database? What's to stop that third-party from logging the requests? Then they would have the users login info. I wouldn't send the password. Display a message with a link if you want members to check if they're in there or not before they register.
Which leads to user writing password on paper if he actually cares about community or always forgetting it if he doesn't, resulting in fewer users. I hate websites that have arbitrary password requirements and avoid them unless I really really need something from that website.There is increased risk and a need to increase security if the user is in HIBP. If a user is in the HIBP database (email address) then this should increase the password requirements in terms of complexity and expiration. It would also be useful to send the user a clear message explaining that they should not reuse the same password that was used on the breached website.
This suggestion is not necessarily about registration. But its not much different than StopForumSpam or ProjectHoneypot where you use the API to find email, name and IP. As @Fred. says passwords can be hashed.You want to send a users email address, then another request to check password, to a third-party during registration
This is correct, but I would not use their implementation as it will only confuse my members and erroneously lead them to think my website is hacked. I don't think the message to members is clear enough. I have their security addon and other functions in it are very good.I believe @DragonByte Tech uses something like this API in their security addon.
This is correct, but I would not use their implementation as it will only confuse your members and lead them to think your website is hacked.
Couldn't you just change the phrase though, to make it more clear?
No, its not just a phrase. Its a combination of text and data presented in a way that will confuse the average person a lot. Its important to let rhe person know exactly what the problem is without installing fear that their account is hacked.Couldn't you just change the phrase though, to make it more clear?
No, I reported this bug but changed to a feature request and Still Under Consideration ...
No, its not just a phrase. Its a combination of text and data presented in a way that will confuse the average person a lot. Its important to let rhe person know exactly what the problem is without installing fear that their account is hacked.
You want to send a users email address, then another request to check password, to a third-party during registration to make sure they aren't in the database? What's to stop that third-party from logging the requests? Then they would have the users login info. I wouldn't send the password. Display a message with a link if you want members to check if they're in there or not before they register.
I just noticed Troy Hunt has an API on HaveIBeenPwned.com so it would be possible to check new (or maybe even used?) passwords against the API and warn the user.
This would improve security and make the user aware his password is Pwned.
I suggest the following:
IF the member is in the HIBP database (email match) AND the password also matches one of the 3.6 million passwords in the database, then force the user to change their password and force high complexity.
Show the user a notice:
There's absolutely no way Troy stores passwords or potentially sensitive data of that kind. It would make him an even greater target than some of the other places that have been breached.
Yes, you can. The phrase is dbtech_security_account_breach_alert_bodyCouldn't you just change the phrase though, to make it more clear?
Changing the wording (which is something you can do yourself using the aforementioned phrase) is not a bug.No, I reported this bug but changed to a feature request and Still Under Consideration ...
The data returned is, IIRC, quite limited, which is understandable since you don't want to prove enough information that it actually becomes an exploit vector in and of itself.Sounds to me like @DragonByte Tech / Fillip needs to get to work on that, but it may be something returned from the API.
SiteTitle - SiteUrl
SiteTitle - SiteUrl
format cannot be changed at this time but the phrase absolutely can We use essential cookies to make this site work, and optional cookies to enhance your experience.