top | item 19456165

(no title)

johnnyRose | 7 years ago

I have looked into this in the past and came to the same conclusion. Essentially, the "password" sent to the website is the client-side salted/hashed version of the user's actual password. The server could then salt/hash the "password" another time before storing it. This could result in the same issue if the "password" is logged, but it protects the user's true password from being discovered. Maybe a security expert can weight in on this, because I don't understand why this wouldn't be the standard.

discuss

order

lixtra|7 years ago

Ideally the server doesn’t need to remember the salt it sent to the client, so it should be signed together with a timestamp to avoid reuse.

While you’re at it you can also add some hash puzzle to be solved by the client increasing difficulty with failed logins.