Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The time of day is known to both the client and the server right? So they check to see that they get the same hash.


And how do you propose to do that when the clocks arent synchronized? Clock drift is exceptionally common. Not everyone runs ntp or ptp. Probably even fewer use ptp. Desktop/laptop clients it's typically configurable on whether or not to attempt clock sync, and ive never seen where the level of synchronization is documented for PCs. High precision ptp usually requires very expensive hardware, not something to be expected of home users or even a startup depending on the industry.


Well how do you think TOTP works?


TOTP works by having huge margins of errors (minutes worth). The original post is suggesting using time of day as seed.


The point was you could do similarly here. Just have a margin of like 30 seconds (or whatever). I never said you have to do this to nanosecond precision.


But the password is only known to the client?


Only if the server only keeps around the hash -- which is why I said there are trade-offs to be made. The point I was making was that the mere fact that you're sending a hash does not trigger the "hash-becomes-password" issue; that's a result of secondary constraints imposed on the problem.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: