TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

The SCRAM Authentication Protocol

4 pointsby cleeusover 7 years ago

1 comment

davecridlandover 7 years ago
Nice write-up of it, though I disagree that you can (or should) &quot;recover&quot; from a database breach in that way. If you detect a database breach, it&#x27;s likely considerably after the event, and you should enforce password changes (and TOTP resyncs).<p>Also, there&#x27;s no mention of Channel Binding, which adds considerable protection to MITM attacks aimed at obtaining the ClientProof off the wire.