zlacker

[parent] [thread] 1 comments
1. kadoba+(OP)[view] [source] 2021-06-06 02:35:15
You could try to do a more difficult hash or something (bcrypt maybe?) but I don't know if it's a very good idea. I think you'd spike your latency, open yourself to DoS attacks or only minorly inconvenience anyone reversing the hashes, or some combination of those.
replies(1): >>xxs+tv
2. xxs+tv[view] [source] 2021-06-06 10:51:01
>>kadoba+(OP)
>(bcrypt maybe?) but I don't know if it's a very good idea

b/scrypt and all other password grade hashes are slow on purpose but they are slow per each use. Imagine the processing takes 0.1s (which is on the low side of hardness) per each request - you just killed all your servers w/o any designated DoS. If you abandon the nonce and use the same salt multiple times (so the computation is amortized), it'd take a replicated cache of IP->hash and even then it still doesn't accomplish much...

[go to top]