Hellbound
Merchant of Doom
Working on VAX/VMS system years ago the login procedure introduced longer and longer pauses between failed login attempts. Is this not a solution to the brute-force methods of cracking passwords? Let's say the system recognises the IP address of the failed login and forces increasing delays on further attempts from that IP address - how would the hacker get around that? Change IP addresses for each attempt? There are only so many proxies, I'd have thought.
Yes, it is effective against brute force. But brute force is only one method; dictionary or hybrid attacks are more common, and as people tend to use variants on words (i.e.- P@ssw0rd! or similar) the dictionary attacks can be highly effective. And they're usually carried out over a span of months, often an automated process that will make attempts every 30 minutes, or even every few hours, or even every 8 hours (not often enough that the failed login attempt counter increments). And they'd often do this against a whole range of usernames; so if they knew, say, 20 usernames, and attempted each only once every 4 hours, that's still 120 guesses/day against passwords. And with botnets available for rent, even looking for the same IP isn't as effective as it used to be (still a good idea, just noting there are ways around it).