lua-users home
lua-l archive

[Date Prev][Date Next][Thread Prev][Thread Next] [Date Index] [Thread Index]


On 25/01/14 11:06, Rob Kendrick wrote:
> On Fri, Jan 24, 2014 at 10:12:02PM -0800, William Ahern wrote:
[...]
>> Who in their right mind would allow their website authentication system to
>> spend 5 seconds (an eternity!) hogging a CPU? Especially when you could
>> instead mandate passwords just three or four characters longer for the same
>> benefit and without crippling your throughput?
> 
> Because verifying with a correct password is much faster than verifying
> with an incorrect one.  Plus, that 5 seconds is tunable.  Want it to be
> only a milisecond?  Fine.  You can do that, and make sure it's always a
> milisecond, regardless of how fast computers get.

Woah, woah, you're talking about two different things.

William's talking about it taking 5 CPU-seconds verifying passwords.
This is very bad because it makes the web server trivially DOSable (a
couple of thousand simultaneous access attempts will cause the server to
implode).

You're talking about a forced delay as punishment for submitting an
incorrect password. This is very good because it consumes no resources
(done right) and makes the server much harder to DoS. That's a totally
different thing.

-- 
┌─── dg@cowlark.com ───── http://www.cowlark.com ─────
│ "There does not now, nor will there ever, exist a programming
│ language in which it is the least bit hard to write bad programs." ---
│ Flon's Axiom

Attachment: signature.asc
Description: OpenPGP digital signature