271
News / Re: TICalc POTY Starts!
« on: December 18, 2015, 05:42:21 pm »
Voting for the TI-84+CE is open now!
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to. 271
News / Re: TICalc POTY Starts!« on: December 18, 2015, 05:42:21 pm »
Voting for the TI-84+CE is open now!
272
Introduce Yourself! / Re: Hello!!!!« on: December 18, 2015, 04:13:22 pm »
Heya, welcome to omnimaga!
Do you know how to program yet? 273
News / Re: Cemetech Contest #15: Crypto Golfing« on: December 16, 2015, 09:35:42 pm »
This sounds like a lot of fun! Such a shame I don't have enough time due to university, though
274
Miscellaneous / [SPOILERS] Star Wars Episode VII - The Force Awakens« on: December 16, 2015, 09:34:25 pm »
Soooooo, the new Star Wars movie is out! (in Europe at least)
I already saw it and, I must say, I liked it quite some! I was surprised they said the movie was by lucasarts and not by disney It felt so....unreal to see star wars on the big screen, lol Expect spoilers in this thread! Anyhow, spoilery stuff: Spoiler For movie: 275
Computer Programming / Re: nBot - my own IRC Bot« on: December 14, 2015, 03:12:58 pm »
Yay, IRC bots are fun!
This is definitely way better than my first IRC bot...heehee. Well, since I already kinda followed along some of it's dev, I can already say that this bot is looking like quite some nice engine ^^ (I wonder how long it'll survive on efnet ) 276
Site Feedback and Questions / Re: So...« on: December 13, 2015, 12:51:45 pm »
We also have chrismas heading up, which usually keeps quite some users busy and thus the forum activity decreases.
277
News / Re: Downtime« on: December 12, 2015, 05:43:49 pm »Q: What is SMF?SFM is the forum software we use, Simple Machines Forum 278
Miscellaneous / Re: Birthday Posts« on: December 11, 2015, 09:13:10 am »
You have Thing Explainer? Nice!
Oh, also, have a birthday muffin: 279
News / Re: Downtime« on: December 09, 2015, 02:02:16 pm »
The password-mod is up now!
As soon as you log in your password will get re-hashed using bcrypt! Also, for anybody wanting to improve the security of their own SMF site, here's the mod: https://github.com/Sorunome/SMF-bcrypt 280
Web Programming and Design / Re: Login Security« on: December 08, 2015, 03:05:37 pm »Exactly, that's the pointIf the user has JS disabled the password will be sent as-presented to the server and will be handled there, the user still gets to log in.Sounds good. So it's just more secure to leave JavaScript enabled on the site 281
Web Programming and Design / Re: Login Security« on: December 08, 2015, 03:00:15 pm »
If the user has JS disabled the password will be sent as-presented to the server and will be handled there, the user still gets to log in.
282
Web Programming and Design / Login Security« on: December 08, 2015, 02:10:14 pm »
So yeah guys,
You probably noticed that due to the recent hacking stuff I started making an SMF mod to drastically improve login security. Well, how it goes with security it is best if it is discussed by multiple people, thus me making this thread (even though I believe my concepts to be secure currently, it's best to check back with others). The current code can be found here: https://github.com/Sorunome/SMF-bcrypt The concepts are: Storing passwords Using PHP's password_hash with PASSWORD_DEFAULT to hash+salt the passwords, storing the result in the DB. I chose this way as it currently uses bcrypt with the perspective to the future to automatically upgrade to a stronger alg without the need to change any code Transmitting passwords to server Even though this should be fairly simple as we use https, it's still a good idea to add some extra security to that, especially since I plan to release this mod to normal SMF people who may not have https. For that, as soon as the user hits login, there will be an AJAX request to fetch an RSA public key which was created in that instant and will only be valid for one min. The client will encrypt the password using that RSA public key, the server will then decrypt using the stored private key. Again, these temporary keys are only valid for one minute and can only be used once, they will be deleted right after being used. Login cookies For this I generate a random string (16 bytes) which gets hashed with password_hash using the PASSWORD_DEFAULT method. The actual random string will be set as cookie, the hash reaches the database. So each page load I check against that. In addition each hash/pwd goes along with an index so that multiple sessions are possible. So, any thoughts? 283
News / Re: Downtime« on: December 07, 2015, 10:48:45 am »It seems nothing ever changes until something goes wrongUnfortunately this is true for way too many things 284
News / Re: Downtime« on: December 07, 2015, 05:43:14 am »
why would they even use md5......you should report it to phpBB devs ^.^
285
News / Re: Downtime« on: December 06, 2015, 09:59:43 am »
The attachments should be all up now, if something is missing please tell me! Still need to upload the downloads
|
|