You wouldn’t believe how many people can’t make a simple login system and have to resort to using a bad and confusing external service.
HTML DB is a site where people can register a login DB for free and use it effortlessly in their code.
The devs can also see who has registered while also being cabable to ban people who abuse their site.
HTML DB is currently in bad need of an update, which means developers who help code and contribute to it.
DM me or @Jonyk56 if you’re interested in helping with HTML DB.
Does that mean the passwords aren’t hashed (and salted), as I would never ever ever use a login/signup system with a db while not hashing (and salting) the password. Anyone who could get into the db (e.g. with brute force) could see the passwords
You should not let devs see the passwords. That would be a horrifying idea for the visitors, and would be for the devs. Hackers can just swoop in and steal the passwords which would result in less visitors.
The data will be hashed and salted. Only the site creator can see the data and only the site creator can register (you have to append a certain piece of code to your home page) to be registered.
What’s the point of showing them the data if it is hashed and salted? They won’t be able to make anything out anyway. Just let them ban visitors and leave it be. Don’t need to give them actual access the DB
I don’t think developers can trust you with all the hashed passwords for their projects.
Even if they’re hashed, a data breach can have horrible results. If people signed up for the developer’s service using basic credentials - they could be decoded.
I love The Park Bench with him and Matt. He said once on there that he only learnt to code to get a well-payed job whilst he was working on his languages (not coding - like how people speak and stuff ) at university. He likes his speaking stuff much more than his coding. I find that really interesting
the database package is coming along very well! We decided to instead of make an entirely new database package, to branch off of an old project which we all used to know as html-db ( which is still named that, but, that was solo me ), so, progress is going good on this!
We may still do it, the web side of things is the only difficult part of this huge project, and the only reason why it is huge, is because of the web side of things
But anyone could get into the devs account by guessing their password! It should be against the Glitch ToS to not hash passwords, it’s really simple and not doing it is just a security risk
Yes @RA80533. bcrypt is really easy and you can hash the password by just doing about a line of code that you can just copy from the npm readme! Simples!
Remember: when you deal with encryption, you’re dealing with munitions according to U.S. law (see this thread). You should respect its implementation accordingly.
I suggest that someone from @glitch_support closes this, if the OP want to store plain-text passwords go ahead, I’m not using this, I doubt others will too.
It won’t be openly storing them, lordy, is it this hard to get a point through to some of y’all?
we don’t have all the plans figured out yet, but YES, they will be encrypted, NO they will not be easy to acces, AND NO! openly storing anything sensitive is a dumb af idea, I’m not dumb to let it slide by in any project i’m involved in
We alreaady have partially planned this out, it will interact with an off-site api that stores all of these keys, and whenever html-db is downloaded, it will reach out to this api, and generate a key, the key will be saved on the api, and then be given to the person who install html-db once and once only, they can generate a new key by re-installing html-db, and that about wraps it up…
almost forgot to mention, we do have a w.i.p. site where you can access all keys, but that is not yet done, nowhere near in fact
The part where it gives the key to the person who installs html-db would be subject to the same complaints people had against letting the developer see the cleartext passwords. In the design you described, the site owner/developer/person who installs has access to the encrypted passwords and the key, which would allow them to decrypt and view the passwords.
Here’s my module I just made for hashing. I recommend using this because it is idiot simple. Meaning that any javascript beginner should be able to use it without issues.
Why would you ever want to know the users password? That is a major security risk.
Let me tell you something that actually happened:
A couple of years ago, Adobe did the exact same naive thing, they encrypted their passwords. What happened is that their database got hacked, and then a bunch of hackers leaked everything. So now a bunch thousands hackers and programmers have a HUGE list of encrypted passwords and their password hints.
Story short, over 10GB worth of passwords was leaked. Think about that before you publish this.
data recovery, and plus, every management system needs an admin account, so, technically, this is that admin account, but instead, just a key to manage everything
What you would do instead is just allowing the user to request a password reset, you simply don’t ever store the user’s password in plain text or encrypt it. Even just hashing isn’t good enough. You should hash and salt. All other ways of storing passwords are naive and insecure approaches and just should not be used.
that is exactly what it should be used for, more or less, private things/ large projects, using it server side only, and not served as a web page for large things, it has multiple combinations…
server side only ( recommended for starter projects )
server side + database management ( private projects )
server side + client side ( private projects/large projects )
client side only ( large projects )
also, docs are being developed, i am with taking the slow time consuming task atm
Passwords should not be stored unhashed, let me put you through this scenerio.
We can agree that people tend to use their password on most of their stuff, for instance, a person might use the same password on Youtube, as they do on their email account. Let’s be honest, you probably also do the same.
We now have established that most people use the same password across multiple places.
A sudden glitch server administrator decides to go rogue, they just access your project with no implications what so ever. They find your encryption key within seconds, they now have a database with a lot of encrypted passwords, but since this rogue system administrator has the key, they decrypt all the passwords. The rogue system administrator now has all the passwords.
He tests all the passwords and users and etc, and he appears to have found a google account using the same credentials, this is just after 10 minutes of getting access to your project, decrypting the passwords and testing a few accounts.
He realizes that the google account has a credit card linked to it, he saves this account for later use.
He continues to test usernames, emails and passwords, and he now has a lot of personal information, all because of how you stored the passwords.
You shouldn’t just assume that just because only you have access to the key, your system is secure, it isn’t. If you do just one small mistake, it can be at the cost of others. I consider the fact that you don’t take security seriously as disrectful upon the users who use your services. And it makes you plently less trustworthy. Just saying.
And most of them used VERY STRONG AND ADVANCED ENCRYPTION, which is something I doubt you know much of, sorry.
P.S. I’m not trying to be rude, I’m trying to point out the fact that passwords should be treated with utterly respect and measures of security. Encrypting passwords is just something you don’t do. Think of it like this, would you like me having a picture of your credit card details (if you hav any)? You don’t know what I do with it, but I have them and can share them worldwide if I feel like it. That wouldn’t be fun, would it?
also just as feedback I think many people would rather use their own login systems rather than using someone else’s where security cant always be guaranteed.
Edit: also if lets say i had my own login, I could fix it as soon as I found an issue or if a hired professional found an issue. With a database like this you will have to wait for the dev to fix this error and hope that your site wasn’t impacted.
It mentions Elasticsearch but glitch uses Agolia. It could have been someone who thought it’d be funny to use glitch’s email to sign up for a service or the person who owned glitch.com previosuly
Hold on. Is your project aiming to be, more or less, a keychain library? If so, you should’ve made it clear from the start that it’s explicitly for third-party credentials and would not be used as authentication in any way. I’m hoping that’s what you meant to describe it as.
I believe that’s what the user was referring to by noting of the master password, etc. Still, it’s quite easy to have a vulnerable implementation of such a library.