what do you guys think about hashing rcon passwords before sending them? So i can feel more save when using same pw for online banking and i auth in public wifi without vpn
00:37
it doesnt protect the actual tw server but at least the password
regarding the tokens being sent to the masterserver, how often do they need to be renewed? on every request or only once until the dawn of time? or maybe something in between?
@ChillerDragon first, please don't use reuse passwords, use a password manager
12:41
then, hashing the password with a standard hash like SHA256 doesn't actually do anything good for your weak password, the password hash is now known to the attacker and can be attacked offline
12:41
hashing it with something like PKBKDF2 would make the server prone to DoS if not guarded against
Ideally having a bunch of SHA keys would be ideal in Teeworlds :) you could automatically login to any server you have access to by sending your pub keys
@heinrich5991 I know performing a SHA256 is not perfect but better than nothing imo. Im sure in some cases it improves security at least a bit. We already have sha256 code so that should not add too much bloat. Or is sha256 also a dos vector already?
the user types in bunnybunny400 in his client and the client then performs a sha256 locally and sends c4a5d06e0307dc3dfc208216eb31e5ef73efedaffc0390c83d6925a59b8f66a8 to the server
13:42
so c4a5d06e0307dc3dfc208216eb31e5ef73efedaffc0390c83d6925a59b8f66a8 can be sniffed