• Anirudh Mangipudi's avatar
    Bug #17357535 BACKPORT BUG#16241992 TO 5.5 · 18079ac9
    Anirudh Mangipudi authored
    Problem:
    COM_CHANGE_USER allows brute-force attempts to crack a password at a very high
    rate as it does not cause any significant delay after a login attempt has
    failed. This issue was reproduced using John-The-Ripper password
    cracking tool through which about 5000 passwords per second could be attempted.
    
    Solution:
    The non-GA version's solution was to disconnect the connection when a login
    attempt failed. Now since our aim to to reduce the rate at which passwords 
    are tested, we introduced a sleep(1) after every login attempt failed. This
    significantly increased the delay with which the password was cracked.
    18079ac9
sql_parse.cc 228 KB