This thread is frustrating. Everyone seems more interested in nitpicking the specifics of what OP is saying and are ignoring that a forum sends you your password (not an automatically generated one) in an email on registration.

  • jormaig@programming.dev
    link
    fedilink
    arrow-up
    8
    arrow-down
    1
    ·
    9 months ago

    But the thing is that you should never have access to the plaintext password and thus you should never be able to receive it in an email. You should store the salted hash of the password instead of the password itself.

    • 8ace40@programming.dev
      link
      fedilink
      arrow-up
      4
      ·
      9 months ago

      These kind of forums don’t store the plaintext password, they send an email while in memory, and hash them afterwards. Still bad security, but it’s not storing it in plaintext.

      • Miaou@jlai.lu
        link
        fedilink
        arrow-up
        2
        ·
        edit-2
        9 months ago

        It’s storing it in plain text in at least one third party’s database. Indeed, it’s not stored in plain text locally, it’s doing something much worse

        • Tempy@lemmy.temporus.me
          link
          fedilink
          arrow-up
          1
          ·
          9 months ago

          But you are supposed to change that generated password as soon as you use it to login. Now I have no idea about these forums, but you’d expect the software to enforce that need to change

          • Miaou@jlai.lu
            link
            fedilink
            arrow-up
            1
            ·
            9 months ago

            It’s still stupid because people reuse password. They shouldn’t, but they do. If it’s one time login, make it a token. There’s zero reason to ever email a password, period

      • jormaig@programming.dev
        link
        fedilink
        arrow-up
        1
        arrow-down
        1
        ·
        9 months ago

        But your password should never reach the server. It should be hashed already at the client and then salted at the server with a random hash. Then you store the salted hash