You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We should have the ability to run the estimate method within a fixed timeframe.
If the algorithms within fail to calculate within the specified timeframe, we should still return a Result that contains a Match that specifies that this was timed out and the password will be rejected for that reason.
This should allow safer use within backend systems regardless of algorithmic complexity vulnerabilities existing with certain inputs.
The text was updated successfully, but these errors were encountered:
Shouldn't it return a full score for the password if the password strength check takes too long to calculate the strength of the password ?
Shouldn't this password be pretty strong?
It could be, or it could be a payload that is intended to exploit the algorithm in a complexity attack. I was erring on the side of caution here, but it could be argued either way.
We should have the ability to run the estimate method within a fixed timeframe.
If the algorithms within fail to calculate within the specified timeframe, we should still return a Result that contains a Match that specifies that this was timed out and the password will be rejected for that reason.
This should allow safer use within backend systems regardless of algorithmic complexity vulnerabilities existing with certain inputs.
The text was updated successfully, but these errors were encountered: