[wp-hackers] New password encription
viper at viper007bond.com
Tue Apr 15 07:39:29 GMT 2008
Indeed they were, that's one of the reasons you had to login again after
upgrading -- it needed your raw password so it could rehash it.
See also: http://wordpress.org/extend/plugins/md5-password-hashes/
On Tue, Apr 15, 2008 at 12:11 AM, Stefano Aglietti <steagl4ml at gmail.com>
> On Tue, 15 Apr 2008 09:28:54 +1000, DD32 <wordpress at dd32.id.au> wrote:
> >You can simply replace it with a md5 without having to enable any
> >WordPress can determine if the value is a md5 or a phpass hash, If its a
> >MD5, then it will validate you based on md5, and then update the password
> >hash to a phpass hash.
> >I had the same problems a few days ago, I needed access to a temp trunk
> >install, and i'd forgotten to change the password from the default, I
> >simply did an update wp_users set password = md5('test'); and everything
> >was up and running again (You might want to add a Where clause to that..
> >only had one user :))
> Oh ok, i supposed that password were recoded during upgrade and old
> MD5 didn't work anymore.. then the old Tanba method is still alive.
> Stefano Aglietti - StallonIt on IRCnet - ICQ#: 2078431
> Email: steve at 40annibuttati.it steagl at people.it
> Sites: http://www.40annibuttati.it (personal blog)
> http://www.wordpress-it.it (WordPress Italia)
> wp-hackers mailing list
> wp-hackers at lists.automattic.com
Viper007Bond | http://www.viper007bond.com/ | http://www.finalgear.com/
More information about the wp-hackers