The software is licensed under the GPL so that you are able to modify it. You can study, understand and modify the code. I won't help you with that because code customisation is not included in the support services we provide. We also won't provide support for modified versions of our software. We only provide support for using unmodified versions of our software. If you want to exercise the freedoms granted to you by the GPL you are free to do that, but now you're creating a derivative work which is no longer supported by us.
Side note: if you think that what you're doing is secure, just Google the term "rainbow tables". Or, if you're a little lazy, take a look
at this page. Using plain MD5 is just as good as using no encryption at all. Given the MD5 you can very easily come up with an equivalent password from the rainbow table. In order to mitigate RT attacks you need to salt the password before hashing it. Take a look at how Joomla! is doing it since 1.0.11.
Regarding Akeeba Backup, as I said, we
encrypt your entire configuration with AES-128 if your server has mcrypt installed. If not, the passwords are stored in cleartext. IMHO, if your server doesn't support mcrypt it's a crappy box anyway, so it's best to dump it and choose a decent host.Back to your question, if you produce MD5 of the passwords which Akeeba Backup needs... well, just try it and you'll see hell breaking loose. The thing is, all passwords stored are not being used to authenticate a user against Akeeba Backup. They are being used to authenticate Akeeba Backup against a remote server. IMPORTANT: we DO NOT have any saying as to how the remote server works!
So, Akeeba Backup needs to have access to the original password, not an irreversible MD5 sum or other hash. Example to help you think about it: if I asked you to give me your FTP credentials and you gave me the MD5 of your password, would I be able to login to your FTP server? No way I could. Likewise, if Akeeba Backup was storing the MD5 hash of your FTP password, would it be able to log in to the remote FTP server and upload the backup archives? Nope. MD5 sums are one-way hash functions. That's why we're using the industry-standard bidirectional AES-128 encryption algorithm in CBC mode to encrypt the configuration data whenever possible.
Nicholas K. Dionysopoulos
Lead Developer and Director
🇬🇷Greek: native 🇬🇧English: excellent 🇫🇷French: basic • 🕐 My time zone is Europe / Athens
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!