how secure authentication model?


i have user comment 'member center' shows customer's subscriptions memberships have company. during .



i have another site tangible member site. during . ( any site opposite domain, nonetheless same dedicated server.



i wish yield easy login membership site, but including user's username evidence link.



so i've adult this:



when user clicks 'login' couple membership, i emanate an md5 crush userid + unix timestamp, supplement database list along userid timestamp.



i following route hash).



the login book example2 takes crush looks adult same table. crush present, i collect username evidence fan database controlling userid stored hash, pass site's pre-existing login function, logged in.



when crush login book runs, initial deletes any rows comparison 5 minutes, following checks crush value passed. finds hash, logs user in, following deletes crush used table. means there never any hashes list comparison 5 minutes. wholly there (should) any hashes left over list user somehow doesnt secure.example1.com www.example2.com after clicking couple ( say, internet goes down during only right second, dns problems solution example2.com, etc ). 5 footnote genocide means lay there reload redirected url until in, until 5 mins have left by.



when user redirected, crush value.



every login couple clicked secure.example2.com, new crush value distributed stored.



my doubt is... am i blank something obvious? smack penetrate this? i only emanate gaping confidence hole site(s)?



thanks hive mind!



edit: offer normal denote opening www.example2.com logging form controlling your username / password.



edit2: response tobyhede re: sniffing hash. assailant have also stop user reaching login book www.example2.com crush deleted once used. means stop that, following also have crush within 5 mins automatically deleted.



edit3: re: assailant generating possess hashes: hacker have insert those hashes database consolidate current userid ( users know userid ). that? given crush used wholly once following deleted immediately, i'm positive any next attacks work.



Comments

Popular posts from this blog

list macos calm editors formula editors

how i practical urls indicate .aspx pages asp.net deployed an iis? (preferably but iis)

jaxb - xjc - reworking generated typesafe enum category members