#21
Posted 13 January 2013 - 12:57 PM
..
Thunderwolf, lol
#22
Posted 13 January 2013 - 01:06 PM
#23
Posted 13 January 2013 - 02:20 PM
Also, sending files and a confirmation for deleting all your messages would be great.
#24
Posted 13 January 2013 - 05:24 PM
#25
Posted 13 January 2013 - 05:54 PM
#26
Posted 14 January 2013 - 09:15 AM
#27
Posted 14 January 2013 - 10:53 AM
Um, I found a problem..
Any time I attempt to message someone, it has a server error.
Edit: it worked. Gravityscore, check your inbox, LOL jk (but yes, it was sent to you, my test message.)
#28
Posted 14 January 2013 - 11:32 AM
So... dammit.
Expect downtime for the next few days while we re-write everything
#30
Posted 14 January 2013 - 11:44 AM
There is something very vital to strengthening your hashes that you need to do. That is use a salt. Although your system is rather strong against hackers and nothing you said was incorrect. You should be salting your hashes. That means adding some known garbage to the end of someones password, so even if the user types in 12345 as their password, It becomes 12345kjdfshafdksafkjsf before it is hashed, making it harder to brute force because you can't use pre-generated hashes to crack it.
On Topic: I like ThunderHawk, and this software looks very well done. Nice work.
#31
Posted 14 January 2013 - 11:45 AM
also; DEBIAN FTW! *doesn't need re-installation to update*
#32
Posted 14 January 2013 - 11:47 AM
What do you mean pielover?
#33
Posted 14 January 2013 - 12:04 PM
#34
Posted 14 January 2013 - 03:21 PM
#35
Posted 14 January 2013 - 08:50 PM
NeverCast, on 14 January 2013 - 11:44 AM, said:
There is something very vital to strengthening your hashes that you need to do. That is use a salt. Although your system is rather strong against hackers and nothing you said was incorrect. You should be salting your hashes. That means adding some known garbage to the end of someones password, so even if the user types in 12345 as their password, It becomes 12345kjdfshafdksafkjsf before it is hashed, making it harder to brute force because you can't use pre-generated hashes to crack it.
On Topic: I like ThunderHawk, and this software looks very well done. Nice work.
Thanks
I know what salting a password is
#36
Posted 14 January 2013 - 08:58 PM
NeverCast, on 14 January 2013 - 11:44 AM, said:
#37
Posted 15 January 2013 - 05:49 AM
#39
Posted 15 January 2013 - 12:37 PM
Edit: Edited for ungratefulness.
Edited by MudkipTheEpic, 15 January 2013 - 12:38 PM.
#40
Posted 15 January 2013 - 01:53 PM
- Salting has been implemented. The password is first hashed in SHA-256 client side, which is then sent to the server. The server adds a unique (to the account), randomly generated salt to the password, and the whole thing is then hashed again in SHA-512. Dictionary attacks are now useless
- A new system to better identify what is sending the request has been implemented (should help us in locking out hacking clients)
- Lieudusty has gotten Linux iptables to work, and I've implemented an IP address blocking system in the PHP
- Usernames, passwords, subjects, tos, etc... are now limited to letters and numbers only
- A new folder system has been implemented (only in the PHP at the moment)
Yet to do:
- Rate limiting of accounts and IP addresses.
Thanks for the support everyone! We're getting there...
1 user(s) are reading this topic
0 members, 1 guests, 0 anonymous users


This topic is locked









