Replies: 2 comments 4 replies
-
related to the topic (I'm trying to keep the number of discussions small), I tried the following code, modeled after the suggestion in https://groups.google.com/g/rodauth/c/5TToghHFvG4:
... and I notice that I seem to be getting 2 flashes. For whatever reason, my flash becomes Is this a bug? If I do |
Beta Was this translation helpful? Give feedback.
0 replies
-
FYI, there is more discussion around that here – https://groups.google.com/g/rodauth/c/U-xxqes-ur4/m/Z2xZ2TaEGgAJ. |
Beta Was this translation helpful? Give feedback.
4 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
(NOTE: this is a semi-philosophical question. I am looking for opinions, thoughts, and feedback.)
This started out with me noticing that I get different error messages for different errors for the login page, revealing the specific error field ("no matching login" vs "invalid password"). I've read the response in https://groups.google.com/g/rodauth/c/5TToghHFvG4, which is related, but for reset password request.
Is it not possible to basically make any sort of attack constant-time? Leaving the architecture of the application server aside, what if we were to approach the target of constant-time by:
Is this not feasible? I was glancing through another article, and one of the suggestions was to do account lockouts (so ceding enumeration then, in this case)... except that doesn't really help with password spraying. And I'm not sure that monitoring is a real solution either (you'd have to set up the infrastructure, plus hire the team to do the monitoring; and hope that they are that alert / good / conscientious).
Beta Was this translation helpful? Give feedback.
All reactions