On Aug 1, 2009, at 9:48 AM, mdipierro wrote:

> Mind that none of this has anything to do with the ability of an
> attacker to guess the passwords to access a web2py site. This is about
> protecting the users form the administrators who may decrypt their
> hashed passords and access the users's account using their decrypted
> passwords (of an attacker who is already in the system and can act as
> the web2py administrator).  But mind that the administrator does not
> even need to decrypt passwords to access them. He just log
> request.vars.password from the model file to get the login passwords
> before they are encrypted. This is true in web2py and in any other web
> based system.
>
> I am much more concerned about a different issue: when an attacker
> wants to enter a site and repeatedly guesses the password.
> Perhaps there should be an option in auth that locks accounts after
> many failed logins. We could have another system table to handle that.

How about a default STRONG as well as HMAC? If a developer wants to  
allow weaker passwords, let the burden be in that direction.

An account-locking policy is a good idea. If the table has a  
timestamp, the lock can be temporary, at least initially. Lock the  
account for a n seconds after n failures. Or something like that.

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"web2py-users" group.
To post to this group, send email to web2py@googlegroups.com
To unsubscribe from this group, send email to 
web2py+unsubscr...@googlegroups.com
For more options, visit this group at 
http://groups.google.com/group/web2py?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to