Hello!
I am about to publish a hack that convert's the default XMB password hash from MD5 to SHA256, and just wondering if anybody here had a suggestion on
handling existing user passwords that are hashed using MD5.
On our site, I simply required all users to change their password (and allowed them to re-use their existing one, for ease of use) although I'm
certain there is a better way to go about it.
Another issue I'm having is determining an appropriate value to salt the hash with. I suspect that using the member's username would be more than
sufficient, although I'm not sure what (if any) additional security in real-world terms would be derived from this. I do believe that modern IT
infrastructure should be more than capable of handling the additional computational requirements of SHA256 over MD5, and that the additional
protection afforded to passwords stored in the DB would be worth it.
I also considered using something like regdate + regip, since a username may change at the site admin's discretion.
From an XMB/session based perspective, this does nothing to prevent the traditional "pass the hash" type attacks, but it would certainly protect users
who insist on using the same password for all of their accounts.
As far as other changes go, I love the quarantine features, the variety of ReCAPTCHA options and much more. 1.9.12 is a major improvement over the
previous releases!