Beefy Boxes and Bandwidth Generously Provided by pair Networks
laziness, impatience, and hubris
 
PerlMonks  

Re^2: Adjust bcrypt cost to prevent future password hash attacks

by andreas1234567 (Vicar)
on Jun 12, 2012 at 18:21 UTC ( [id://975859]=note: print w/replies, xml ) Need Help??


in reply to Re: Adjust bcrypt cost to prevent future password hash attacks
in thread Adjust bcrypt cost to prevent future password hash attacks

.. when the user tries to log in, a hash of his password is sent
No. When the user tries to log in, the password is sent (encrypted in transit, then decrypted (in memory only) to clear text on the server).
Given this, how do you propose the password is re-hashed without having the original password to work from?
At next successful login. Add password expiry functionality (i.e. max 30 days), and we can ensure that all passwords are either
  • invalid, or
  • re-hashed with increased cost over the next 30 days.

--
No matter how great and destructive your problems may seem now, remember, you've probably only seen the tip of them. [1]
  • Comment on Re^2: Adjust bcrypt cost to prevent future password hash attacks

Log In?
Username:
Password:

What's my password?
Create A New User
Domain Nodelet?
Node Status?
node history
Node Type: note [id://975859]
help
Chatterbox?
and the web crawler heard nothing...

How do I use this?Last hourOther CB clients
Other Users?
Others wandering the Monastery: (6)
As of 2024-04-24 09:36 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?

    No recent polls found