https when? I can’t believe such important site still does not have https.
Good to know
it was logging me out when I was switching between marketplaces(its not anymore) just a heads up if anyone else was having the issue
- Has been a member for 5-6 years
- Author was Featured
- Contributed a Tutorial to a Tuts+ Site
- Community Moderator
- Envato Studio (Microlancer) Beta Tester
- Sold between 10 000 and 50 000 dollars
- Repeatedly Helped protect Envato Marketplaces against copyright violations
- Exclusive Author
oo how do you track that? edit: ah. pulled apart _fd_sesion – hmm wonder if chrome syncs cookies between computers? * end random babbling *
Seems like an edge for cookiethieves Then again, I don’t really see the brute-force issue to begin with. As long as the server implements a delay of say 1 or 0.5 second per login attempt (which is hardly noticable for a legitimate user), that would cause as much as a 7 character password to be quite infeasible to crack. Can anyone enlighten me? Or it a parallel request attack that makes this feasible regardless of the millions of required requests? Or would that cause an effect similar to a DDoS and backfire on the attackers?
ah I was wondering why I was logged out
Same It’s for a good cause though
Then again, I don’t really see the brute-force issue to begin with. As long as the server implements a delay of say 1 or 0.5 second per login attempt (which is hardly noticable for a legitimate user)
when you get a bot farm set on cracking a password with brute force, a delay might not do much. you can still fire off multiple requests at once, just have to wait slightly longer for the response.
if there are 10,000 current password guesses getting fired at the server, then the server has to keep those 10,000 requests open while the delay runs. it wouldn’t really achieve anything with the delay other than putting more load on the server. your question actually fired me off for a half hour googling session about the different types of server limits when talking about concurrent connections, quite interesting stuff!
I have put delays on login failures in my little php scripts in the past. Not sure why, never really researched it. Don’t bother any more with it as we have recaptcha and the like
Or would that cause an effect similar to a DDoS and backfire on the attackers?
haha probably. set bot farm to crack password. oh noes the datacentre is now off the grid.
Signing in is so much more comfortable now… Although it is reasonable that it makes things a little safer, but it was sometimes really painful to enter all those captures thousand times a day