After much research I found the trigger to replicate the issue : db.auth_user.password.widget = lambda k,v: SQLFORM.widgets.password.widget(k , v, _id="login_password", _class="input-basic input-200")
If you type a password longer than 8 characters and the validation fails, your password will be replaced with '********' in request.vars.password. On Friday, July 25, 2014 4:12:06 PM UTC+2, Anthony wrote: > > I still cannot replicate the behavior you observe. Can you show your code > or attach a minimal app that demonstrates the behavior? > > Anthony > > On Friday, July 25, 2014 9:56:38 AM UTC-4, Louis Amon wrote: >> >> @Anthony: Indeed, I forgot to add that I’m using auth forms through ajax >> via LOAD. The problem may be due to ajax's JSON conversion of request.vars. >> >> Le 25 juil. 2014 à 15:52, Anthony <[email protected] <javascript:>> a >> écrit : >> >> I think common practice is to leave password fields blank after a login >> failure so the password must be re-entered. >> >> In any case, I cannot replicate either behavior you describe using the >> standard web2p Auth forms. When I have a failed login, the entire login >> form is reloaded emtpy. When I enter the second password incorrectly on a >> register form, the form reloads, and I only have to correct the second >> password, not re-enter the first. >> >> Can you show the code you are using for your forms? >> >> Anthony >> >> On Friday, July 25, 2014 9:32:03 AM UTC-4, Louis Amon wrote: >>> >>> We’re all developers here so I couldn’t agree more. >>> >>> Still, I’m running a commercial website so I’m a slave to what my users >>> want. >>> As far as my customers are concerned, security comes second after ease >>> of use… >>> >>> Anyway, you have to admit that the examples I gave in the first post are >>> misleading in terms of user experience, right ? >>> >>> Isn’t there a way to improve it without compromising security too much ? >>> I can see one : erasing input fields after each validation failure >>> (blank fields are less misleading). Do you see other ? >>> >>> >>> Le 25 juil. 2014 à 15:19, Willoughby <[email protected] <javascript:>> >>> a écrit : >>> >>> A simple google search will yield people complaining about their host >>> accounts getting hacked on airbnb. >>> Just because someone or something large 'does it that way' doesn't mean >>> it's a best practice! >>> >>> On Friday, July 25, 2014 9:08:00 AM UTC-4, Louis Amon wrote: >>>> >>>> I don’t see much of a security threat here. >>>> What’s the worst-case scenario ? >>>> >>>> If you take a look at airbnb.com <http://www.airbnb.com/>, their >>>> registration form keeps your typed password even if you fail validation on >>>> other fields. >>>> >>>> If a website that big can do it then surely my small website will pull >>>> though, don’t you think ? >>>> >>>> Le 25 juil. 2014 à 14:47, Niphlod <[email protected]> a écrit : >>>> >>>> so you really want the webpage to return the actual password instead of >>>> asterisks ? it's a big security risk, no matter what user experience >>>> says..... >>>> >>>> On Friday, July 25, 2014 10:53:40 AM UTC+2, Louis Amon wrote: >>>>> >>>>> I'm trying to improve user exprerience on my website and I noticed a >>>>> rather annoying behavior on password fields : >>>>> >>>>> If I type a password longer than 8 characters and somehow my form >>>>> fails (some other field didn't validate), my password gets replaced by >>>>> "********" in request.vars.password. >>>>> >>>>> For example : >>>>> I try to login and misstype my username --> login form fails. >>>>> I correct the mistake in the username and press the submit button >>>>> again --> login still fails, because the password got replaced by >>>>> '*********' under the hood. >>>>> >>>>> Another example: >>>>> I try to register and type my password but mistyped my password >>>>> verification (password_two) --> register form fails. >>>>> I focus the password_two field and retype my password --> register >>>>> still fails because the original password field got replaced... >>>>> >>>>> This behavior is extremely frustrating for users as they can't print >>>>> request.vars.password like a developper would. All they see is obfuscated >>>>> passwords. >>>>> I cannot have this on my commercial website. >>>>> >>>>> >>>>> Is there any way to fix this ? >>>>> >>>> >>>> -- >>>> Resources: >>>> - http://web2py.com >>>> - http://web2py.com/book (Documentation) >>>> - http://github.com/web2py/web2py (Source code) >>>> - https://code.google.com/p/web2py/issues/list (Report Issues) >>>> --- >>>> You received this message because you are subscribed to a topic in the >>>> Google Groups "web2py-users" group. >>>> To unsubscribe from this topic, visit >>>> https://groups.google.com/d/topic/web2py/T1vfDXDgsmE/unsubscribe. >>>> To unsubscribe from this group and all its topics, send an email to >>>> [email protected]. >>>> For more options, visit https://groups.google.com/d/optout. >>>> >>>> >>>> >>> -- >>> Resources: >>> - http://web2py.com >>> - http://web2py.com/book (Documentation) >>> - http://github.com/web2py/web2py (Source code) >>> - https://code.google.com/p/web2py/issues/list (Report Issues) >>> --- >>> You received this message because you are subscribed to a topic in the >>> Google Groups "web2py-users" group. >>> To unsubscribe from this topic, visit >>> https://groups.google.com/d/topic/web2py/T1vfDXDgsmE/unsubscribe. >>> To unsubscribe from this group and all its topics, send an email to >>> [email protected] <javascript:>. >>> For more options, visit https://groups.google.com/d/optout. >>> >>> >>> >> -- >> Resources: >> - http://web2py.com >> - http://web2py.com/book (Documentation) >> - http://github.com/web2py/web2py (Source code) >> - https://code.google.com/p/web2py/issues/list (Report Issues) >> --- >> You received this message because you are subscribed to a topic in the >> Google Groups "web2py-users" group. >> To unsubscribe from this topic, visit >> https://groups.google.com/d/topic/web2py/T1vfDXDgsmE/unsubscribe. >> To unsubscribe from this group and all its topics, send an email to >> [email protected] <javascript:>. >> For more options, visit https://groups.google.com/d/optout. >> >> >> -- Resources: - http://web2py.com - http://web2py.com/book (Documentation) - http://github.com/web2py/web2py (Source code) - https://code.google.com/p/web2py/issues/list (Report Issues) --- You received this message because you are subscribed to the Google Groups "web2py-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. For more options, visit https://groups.google.com/d/optout.

