The topic says it. I dont really see a difference between encpass and encrypt, the only one is that using encrypt you can give a password for the encryption.
What password encpass use? Or is it a one way encryption?
Passwords are encrypted in a one-way fashion (use encpass for this).
"encrypt" however allows you to encrypt a string with a key, to later decrypt it using "decrypt" and that same key.
And no, encpass does'nt use a hardcoded key.
edit: This behaviour of course completely depends on the encryption-module you've chosen to use (most ppl stick with blowfish.mod).
You might wanna check the source of above mentioned module for further/deeper knowledges
nml375 wrote:Passwords are encrypted in a one-way fashion (use encpass for this).
"encrypt" however allows you to encrypt a string with a key, to later decrypt it using "decrypt" and that same key.
And no, encpass does'nt use a hardcoded key.
Thanks exactly what I search for, but I was not sure if it is really one-way or only faked hardcoded
True... Tho I'd like to see anyone using those to decrypt the passwd hash (without bruteforcing it).
Does anyone remember why we don't use random salts and prepend it to the hash? (*nix-style)
Not that it makes it that much harder to bruteforce, just takes alittle longer..
nml375 wrote:True... Tho I'd like to see anyone using those to decrypt the passwd hash (without bruteforcing it). ;)
This won't help to decrypt but definatelly allow you to brute force it ;)
Does anyone remember why we don't use random salts and prepend it to the hash? (*nix-style)
Probably because you would have to recreate your userfile (password mainly) once again after you update your bot in current state. Eggheads never drastically redesigned project and never liked to break compatibility with previous version (they did it once) so it have to be done like now ;)
I also remember that it's possible to have diffrent HASHes even for different user's passwords in 1.9 ;)