On Thu, Sep 29, 2011 at 8:00 PM, Dmitry Chestnykh
<dmi...@codingrobots.com>wrote:

> The more eyes the better, as it touches login code.
> ...COMPARE("AAAAAAAAA", "PASSWORD") returns FALSE in 0.1 msec, but
> COMPARE("PAAAAAAAA", "PASSWORD") returns FALSE in 0.3 msec, because it did
> two comparisons:
>

Given the relatively high overhead fossil has when it opens a db or runs a
query, and network latency, i cannot imagine that someone could accurately
time the difference of a memcmp() operation on 8 or 10 bytes. The number of
factors involved before and after COMPARE is called are just too great. As
was written in the post about sha1 collisions someone linked to earlier: the
chances are higher that all of the members of your dev team will be killed
by wolves in separate incidences on the same night.

If ALL fossil did was accept a request and run a memcmp on one GET
parameter, i might believe it, but given the huge number of variables,
especially network latency, CGI startup time, and db open/query time, the
only way i'll believe that these steps are necessary is if someone actually
breaks a password this way.

All that said - i wouldn't object to this being added (as if my vote
matters! ;), i just think it's overly paranoid.

-- 
----- stephan beal
http://wanderinghorse.net/home/stephan/
_______________________________________________
fossil-users mailing list
fossil-users@lists.fossil-scm.org
http://lists.fossil-scm.org:8080/cgi-bin/mailman/listinfo/fossil-users

Reply via email to