TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

The SCRAM Authentication Protocol

4 点作者 cleeus超过 7 年前

1 comment

davecridland超过 7 年前
Nice write-up of it, though I disagree that you can (or should) &quot;recover&quot; from a database breach in that way. If you detect a database breach, it&#x27;s likely considerably after the event, and you should enforce password changes (and TOTP resyncs).<p>Also, there&#x27;s no mention of Channel Binding, which adds considerable protection to MITM attacks aimed at obtaining the ClientProof off the wire.