TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

The Database Programmer: Advanced Table Design: Secure Password Resets

15 点作者 pbnaidu超过 16 年前

3 条评论

jwilliams超过 16 年前
This may be useful in the database domain, but I don't think it applied to most web contexts.<p>Most web applications don't bother with database security - it muddles the logic and prevents things like pooling, scale, etc<p>For more traditional web apps - typically you have two sources accessing the database - the Web Application and the Administrators. Both of which have access to nearly everything anyway.<p>This might stop some malicious code from accessing the database improperly - but the fact is, if someone can manipulate the code you've already lost anyway (they could simply just capture the passwords at entry for example).
ars超过 16 年前
He's fighting the wrong battle.<p>He's sending the hash by email! And then working so hard at securing the wrong part of the process - with SSL of course, when email is not encrypted.
trezor超过 16 年前
<i>The technique presented today makes full use of database server abilities to create a password reset system that is highly resistant to forgery, interception, and </i><i>evil-admin meddling</i><i>.</i><p>If you for a second honestly believe that this design will stop admins from being able to tamper with the process, you should be fired on sight.<p>If you are going to design a secure process, I'd say you should focus more on security outside your system, and worry less about keeping admins out. If you're an admin, you have full access, or the ability to give yourself the full access needed to tamper with this system.
评论 #298550 未加载
评论 #298485 未加载