• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

mattupstate / flask-security / 874 / 6
28%
develop: 28%

Build:
DEFAULT BRANCH: develop
Ran 06 Oct 2017 11:09AM UTC
Files 20
Run time 0s
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

06 Oct 2017 11:02AM UTC coverage: 93.646% (+0.008%) from 93.638%
REQUIREMENTS=release

push

travis-ci

Jiri Kuncar
Fix timing attack on login form

As detailed in #357 the time it takes to process a login request is
considerably less if the user specified doesn't exist than if the
password is incorrect. This can be used as a user enumeration attack,
even if the login error messages were customized to avoid this.

I fixed it by increasing the response time of a non-existing user
request by hashing the given password anyway (if using good
password hashing algorithm this is what takes a relatively
large amount of time and makes the attack possibly).

closes #357

1356 of 1448 relevant lines covered (93.65%)

0.94 hits per line

Source Files on job 874.6 (REQUIREMENTS=release)
  • Tree
  • List 0
  • Changed 1
  • Source Changed 1
  • Coverage Changed 1
Coverage ∆ File Lines Relevant Covered Missed Hits/Line
  • Back to Build 874
  • Travis Job 874.6
  • 59c0fb7b on github
  • Prev Job for REQUIREMENTS=release on develop (#873.6)
  • Next Job for REQUIREMENTS=release on develop (#875.2)
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc