Hello,

Doesn't most dictionary style attacks create a new request each time
therefore creating a new ASO? Kind of like closing your browser and
reopening it each time?

If not this is a much better idea than mine of delaying the IP.

--James

-----Original Message-----
From: Thiago H. de Paula Figueiredo [mailto:thiag...@gmail.com] 
Sent: February-11-09 8:14 AM
To: Tapestry users
Subject: Re: IoC question - introducing a time delay in an ASO

On Wed, Feb 11, 2009 at 9:49 AM, Peter Stavrinides
<p.stavrini...@albourne.com> wrote:
> I use an ASO as a token when signing users in, I use this small method to
introduce a time delay (if there are multiple failed attempts, I increase
the delay):

Your code doesn't delay the ASO, it delays the request processing. ;)
It prevents dictionary attacks against passwords, something everyone
should do.

> I haven't tested it much, but it seems to work great, I was just a bit
worried if it would be thread safe or if I was doing something stupid.

ApplicationStateManager (the Tapestry service that handles ASOs) is
already thread-safe (it uses ConcurrentHashMap), so I guess you don't
need to worry. ;)

-- 
Thiago

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tapestry.apache.org
For additional commands, e-mail: users-h...@tapestry.apache.org


---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tapestry.apache.org
For additional commands, e-mail: users-h...@tapestry.apache.org

Reply via email to