I wan’t to know whether the admin has a way to view the forum user’s passwords & other info
Other info? Sure, all stored in the database. The passwords too, but hashed and salted - which boils down to a simple: “¡No way, señor!”
If any user forgot their password they can retrieve it on their own.
“I forgot my password” They can click that and go through the prompts.
No admin needs to know the passwords of their users.
s/retrieve/reset/
You really cannot “retrieve” it. But you can get the system to let you choose another one.
Very true. I would extend that to “No admin should know…”
So can the admin decrypt it?
Is there a way to view the database in a readable format?
No
Only in as much that hashes are readable
You would need to brute force the hashed password, its using http://en.wikipedia.org/wiki/PBKDF2 with a rather high number of iterations so you would probably be stuck only being able to test out a handful of passwords a second.
On current computing hardware if the user picked a reasonable password you are probably looking at a few centuries of computer work.
Sure, install Discourse in dev mode or, not recommended, export your production Discourse’s PostgreSQL’s port and poke a hole in your firewall, then connect with pgAdmin and have a look around.
Oh and just to illustrate @sam’s point:
This is my password. Have fun trying to decrypt that. 
Don’t tempt him. We might be dealing with a Super Elite Class I Hacker.

Awesome!
what a great challenge … 
It’s a hash, it’s not encrypted. Encryption is reversible, hashing is not.
Depends, if you know that the cleartext is shorter than the hash blocklength, the hash is reversible. We just hope that noone ever finds an efficient (i.e. deterministic polynomial) reverse function. 
Ok, “hope” is not exactly true. Cryptologists are fairly certain that for SHA2 no such function exists for current hardware.
Not exactly, minimum default password length today is 10 for regular users and 15 for staff. A weak 10 char password wouldn’t be terribly hard to break. See data at
We still need to create a password hash version and ramp up the hash difficulty a fair bit before 2020.
Not against ramping up hash difficulty by 2020 at all, but the most enormous risk will remain the “previously hacked list of passwords” that is constantly expanding, hopefully by 2020 we can go for 2fa by default and at least mitigate more of this long term
Parece que isso não aconteceu.
Para qualquer pessoa que esteja lendo: não altere o comprimento da senha da sua instância do Discourse para 8 dígitos, isso só levará a pessoas insatisfeitas. (Eu testei e, se eu consegui quebrá-la, qualquer um consegue.)
Na verdade, isso já está em grande parte concluído: a configuração enforce_second_factor está ativada por padrão em todas as novas instâncias para staff.
Instâncias existentes do Discourse podem alternar a configuração para staff.
