But it kinda works tho...
But it kinda works tho...
But it kinda works tho...
Even worse the silent invalidation of a correct password.
Use password manager.
Can't log in, because "password is incorrect"... Fuck you! It is not! I copied in the same fucking thing as months before! If you want to force me to change it then say it! Asshole!
sorry, but your new password cannot be the same as your current one.
I swear Microsoft does that.
How does this 'kinda work'?
It rejects the first [correct] login attempt (it’s worded poorly). It assumes that a brute force attacker will try any given password once and move on, while a human user will think they made a typo and try again. This works until the attacker realizes that it takes two attempts, in which case it merely doubles the attempts required to breach the account, and simply requiring an additional password character would be vastly more effective.
All tools that bruteforce passwords attempt each password only once, and if it doesn't work, discard it. Nobody really runs 2 identical attacks back to back (they're incredibly slow when done over the internet), so the password would seem uncrackable at first glance.
This approach wouldn't work with hash cracking, vault breaking or file encryption, because once they get their hands on the hash/vault/file, the attacker can use their own code for hashing/checking a password candidate.
They'll change the correct password every time because they are told it is wrong.
Don't worry, a not-insignificant number of users probably use "Forgot Password?" every time because they can't keep track of the correct one. Lol
I suspect this is why we started to see all those "use a temporary password instead" options lately. XD
It doesn't. Cracking programs don't use the user login form repeatedly. They use the same algorithm that creates the publicly encoded password to generate encoded passwords and keep going until they have a match. Besides getting the encoded password and salt, everything is done offline.
This just creates a really bad user experience.
If they actually use the real login form, most websites block an account after X attempts. Sometimes for 1-24 hours, sometimes until you do a PW reset
At least make it if !isPasswordCorrect || isFirstTry
guard isFirstAttempt { return LoginError(); }
Center guy's hair got visibly lighter from the stress
You are very confident in your ability to not make a typo.
Is this Tron: Ares?
The only part that works is that I get to keep my trust issues.
Removed by Moderator — Modlog
isFirstSuccessfulLoginAttempt
Important distinction.
Yeah, as it is it only works if the brute force algorithm gets it on the first try.
Or the variables are terribly named
Boho sort is O(1) in the best case scenario
Not even then. Brute force cracking programs don't rely on the server to indicate if the attempted password is correct.
No, it just means you have to type in the correct password twice in a row.
SessionSuccessfulLogins == 1