On Wednesday, January 4, 2017 at 1:40:40 PM UTC+7, Jonathan Yu wrote:
>
>
>
> While I agree that client-side hashing is overkill, I think the threat 
> model it's intended to protect against is a compromised *server*, since 
> this would prevent the server from ever seeing the plaintext password.
>
> In practice, I think most sites use TLS as you describe, and use bcrypt or 
> similar on the server, along with rate limiting. This protects against 
> everything except an advanced persistent threat (APT).
>
> -- 
>

I fail to see the purpose of client-side hashing. If the attacker gets 
the client's username and hashed password, what good does hashed password 
do if the attacker can also send the same username and hashed password to 
the server pretending to be the real client? 

If the server is already compromised in such that the attacker can listen 
to clients' authentication process, there is no more value in obtaining the 
user's actual password. If the attacker compromises the server to such an 
extent, it is irrelevant whether the server receives the user's actual or 
hashed password. 

If you are talking about client-side encryption, I would think that TLS 
already does that for you.

-- 
You received this message because you are subscribed to the Google Groups 
"golang-nuts" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to golang-nuts+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to