To create a password hash

User 351676 Photo


Registered User
6 posts

hi users
Anybody doing anything to create a hashed password?
in WFB is it possible in input password to change data in a hashed password before written in Mysql?
thx for your answers...
Best regards

AlainV
Sorry with my English i'm better with French !

User 187934 Photo


Senior Advisor
20,271 posts

I haven't looked at it but depending on the complexity of your form you maybe better off writing your own myformname.php to process the submissions to get what your after instead of hacking the existing files the form builder generates.
I can't hear what I'm looking at.
It's easy to overlook something you're not looking for.

This is a site I built for my work.(RSD)
http://esmansgreenhouse.com
This is a site I built for use in my job.(HTML Editor)
https://pestlogbook.com
This is my personal site used for testing and as an easy way to share photos.(RLM imported to RSD)
https://ericrohloff.com
User 351676 Photo


Registered User
6 posts

Hi Eric
Thx to your answer
i think perhaps it's better to do a little form to log in
and after use WFB to do an other form.
Best regards
Sorry with my English i'm better with French !

User 189085 Photo


Registered User
3 posts

If I may provide my two cents... if you have such requirements it would normally means you want a high level of security on your form. I would suggest using SSL so the connection between the browser and the server is encrypted. Both passwords and hashed passwords are visible on a non-encrypted encrypted connection, If you want to have a degree of security without SSL, there are libraries that will allow you to perform hashing from the browser http://www.movable-type.co.uk/scripts/sha256.html" class="bb-url"> http://www.movable-type.co.uk/scripts/sha256.html. However, sending a hashed string is as bad as sending a plain password. If it gets intercepted, the hacker will simply send the same hash to impersonate you.
A better alternative is to receive a hash from the server on a random number (do not use the session number, it would be too obvious) and then hash the password, add the two hashes together to form a very long string, and hash it again. Then send this hash to the server, where you will repeat the process and compare.
It may sound complex but it isn't. However, the SSL solution is much simpler.

Have something to add? We’d love to hear it!
You must have an account to participate. Please Sign In Here, then join the conversation.