I think for a while leading up to the recent session stealing hack, there has been a massive amount of positivity from Lemmy users around all kinds of new Lemmy apps, frontends, and tools that have been popping up lately.

Positivity is great, but please be aware that basically all of these things work by asking for complete access to your account. When you enter your Lemmy password into any third party tool, they are not just getting access to your session (which is what was stolen from some users during the recent hack), they also get the ability to generate more sessions in the future without your knowledge. This means that even if an admin resets all sessions and kicks all users out, anybody with your password can of course still take over your account!

This isn’t to say that any current Lemmy app developers are for sure out to get you, but at this point, it’s quite clear that there are malicious folks out there. Creating a Lemmy app seems like a completely easy vector to attack users right now, considering how trusting everybody has been. So please be careful about what code you run on your devices, and who you trust with your credentials!

145 points

permalink
report
reply
-14 points
*

Do another one, replace the last panels “alpha Lemmy app” to “password manager” lol

edit: for the record I’m not disagreeing with the first comment in this comment chain.

permalink
report
parent
reply
29 points

How many password managers have you been trying out this week?

permalink
report
parent
reply
2 points
*

I know we probably aren’t trying every sketchy password manager that is advertised, but the way people are gushing over them and missing the point of the post scared me. Password managers are ultra high risk programs if you aren’t careful. It’s ok if you guys don’t mind losing your identity from an account because of a password manager giving unique passwords to each, but the point of this post is to not lose accounts from letting your guard down with a sketchy app.

The password manager dudes are saying “My house insurance is the best! i can build a new house” and this poster is saying “Avoid putting flammable things in your house so it doesn’t burn down”. Also a high chance their insurance company wont pay out, if you guys mess up badly with a sketchy password manager.

permalink
report
parent
reply
77 points

This is why password managers are so heavily pushed. Imagine if you used the same password for Lemmy that you used for your email? Both are now compromised. A unique password for all accounts is the bare minimum you must do.

permalink
report
reply
41 points

Although it is worth noting that the recent Lemmy hack didn’t come from a password compromise, but from session token harvesting, which a password change would not really protect against.

permalink
report
parent
reply
5 points

Forgive me if I’m mistaken, but wouldn’t logging out of the compromised session be all it would take to end the attack in this case?

permalink
report
parent
reply
14 points

Only if logging out actively invalidates session tokens, which appears to have not been the case. https://github.com/LemmyNet/lemmy/issues/3364

permalink
report
parent
reply
15 points

Lol this is not how the hack worked. JWT cookies are encrypted. They don’t contain your password at all. There was no way to reverse engineer from your cookie to your password.

permalink
report
parent
reply
2 points

Correct me if I’m wrong, but Lemmys tokens have no expiration, right? So they are effectively username and password combined.

permalink
report
parent
reply
5 points

The decoding algorithm can change, which is exactly what happened, invalidating all previously generated tokens. They cannot be decoded to a password though since they are encrypted, meaning shared passwords wouldn’t be an issue (though you should use a password manager to not have this issue in the first place).

permalink
report
parent
reply

I literally just got one last week. It’s so nice! I guess I was hesitant because centralized passwords always put me off, but it’s not hard to setup 2FA on all your important stuff.

permalink
report
parent
reply
3 points

Now again, the key point of this post, but applied to random password managers lol

permalink
report
parent
reply
64 points

Sorry, but that’s literally every online service. For example if you buy a new virtual server it takes like 5 minutes till a Chinese IP starts to try root passwords.

If someone actually wanted to harm Lemmy they’d just DDOS the biggest instances for a month (which would be easy, it’s mostly single servers after all) or attack it with so much spam and large images that storage would break.

permalink
report
reply
10 points
*

We need moderation tools

Here’s hoping Sync and Boost lead the way

permalink
report
parent
reply
14 points

Here’s hoping Sync and Boost lead the way

Or better yet, let’s hope Free Software apps lead the way and ditch the proprietary ones.

permalink
report
parent
reply
4 points

Well, Sync and Boost were well established already. It’s probably gonna take some time for the new foss ones to catch up

permalink
report
parent
reply
2 points

I’m getting CS-nerd excited about how this is all going to play out. Federated moderation is hard and so many awful, clunky things have been tried before. Are we actually going to see a web-of-trust or reputation system that reaches widespread adoption? It’s gotta be silent and noninteractive as there’s no way to expect normal people to put up with the complexity.

permalink
report
parent
reply
5 points

The difference is that when you buy a vps you aren’t handing over all your access creds to random developers.

And “harming lemmy” may be an intent that sparks a DDoS but there are other intentions that should make users wary. Harvesting creds of people who reuse passwords across accounts is an easy example that could have more serious implications to the individual user.

permalink
report
parent
reply
6 points

Dude, you can’t trust any Lemmy instance at all. It doesn’t even matter that the code is open source, the instance owner could just compile their own version that sends them every password in plaintext. There is zero guarantee that your password is safe.

Anyone who reuses passwords has been pwned a dozen times already. Just check your own logins here: https://haveibeenpwned.com/

If you reuse passwords online you have a problem, it’s simple as that. Even big companies had breaches that leaked user data, no company is safe. For example one of my old passwords got stolen from Adobe. One from Unreal Engine. And my old logins are currently shared in 2,844 separate data breaches. Not using a password manager with a random password per service nowadays is madness.

permalink
report
parent
reply
38 points
*

Using open source apps, especially with more than one contributor, is currently the best option to be safe from this kind of attack.

Edit: I’m not saying that FOSS is 100% secure because it’s FOSS. I’m just saying it’s the best option we currently have.

permalink
report
reply
48 points

It helps, but it’s still not a silver bullet. For example, a Lemmy app could contain no malicious code in its open source repository, but malicious code could still be added to a binary release in an app store.

permalink
report
parent
reply
8 points

Voyager (formerly wefwef) is a self-hostable web app, so it doesn’t have this problem. Of course this only means you can inspect the code you’re running. You still have to able to understand the code to be sure it’s not doing anything malicious.

permalink
report
parent
reply
3 points

Vojager can be easily modified and deployed. It is actually quite riskier than others if you don’t use trusted deployments

permalink
report
parent
reply
6 points

That’s why F-Droid is the safest Android app repository. If I’m not mistaken, every app they offer is rebuilt from the public source code by the repo package maintainer.

permalink
report
parent
reply
2 points

Also if it’s a desktop app they could just put the malicious code in the binary download 99% of people will use, or if it’s a web app, they just put it in their hosted version, etc.

permalink
report
parent
reply
2 points

Yeah, downloading from fdroid or izzyondroid kinda solves that.

permalink
report
parent
reply
5 points

Izzy directly sends over the APKs from GitHub releases. F-Droid does their own builds which is partly why they’re so slow to update.

permalink
report
parent
reply
29 points

The safest option would be for Lemmy to implement OAuth and apps that aren’t in some “official front end for xyz website mode” to authorize via OAuth with the backend instead of via credentials.

permalink
report
parent
reply
10 points

Most if not all Mastodon/Pleroma apps already use OAuth by default. I’m surprised that Lemmy hasn’t implemented it yet. I wonder if KBin does already?

permalink
report
parent
reply
22 points

No, because open source apps need to have enough eyes on them to spot malicious code. And highly complex ones need proper audits and even that might not be enough to catch every fancy vulnerability.

permalink
report
parent
reply
8 points

I doubt a malicious actor would open source their app tho

permalink
report
parent
reply
8 points

That’s fair, but sometimes a malicious actor will attempt to covertly contribute code that introduces a security vulnerability.

permalink
report
parent
reply
2 points

It has happened before. Or somewhat more likely, a contributor provides code that the maintainer merges without looking too hard.

permalink
report
parent
reply
6 points

How can an idiot like me tell though, everything is pretty new. I just assume every account I make is a throwaway for now.

permalink
report
parent
reply
2 points

Well I recommend to stay away from any closed source apps. Also make sure your password is unique to lemmy and use an email address that is not your primary email.

Be careful of clicking links and DMs. If using the browser use noscript and block scripts by default.

permalink
report
parent
reply
1 point

Well I recommend to stay away from any closed source apps. Also make sure your password is unique to lemmy and use an email address that is not your primary email.

Be careful of clicking links and DMs.

permalink
report
parent
reply
4 points

OSS does not guarantee security, ever. Please let’s not fall into false sense of security.I

permalink
report
parent
reply
3 points

But in this case, if an app is open source, there is a higher chance of discovering that it sends your credentials somewhere else than in closed source app

permalink
report
parent
reply
1 point

That assumes people are looking at that and know what they’re doing and aren’t malicious actors. None of this is guaranteed. Famous examples of major OSS security vulnerabilities have already shown this.

permalink
report
parent
reply
25 points

Oauth2 login support for apps would certainly be very welcome.

permalink
report
reply
3 points

I really want this. I haven’t tried any of the apps (other than the one I made) yet because I don’t want to give anyone my password. Oauth support would be so nice.

permalink
report
parent
reply

Lemmy

!lemmy@lemmy.ml

Create post

Everything about Lemmy; bugs, gripes, praises, and advocacy.

For discussion about the lemmy.ml instance, go to !meta@lemmy.ml.

Community stats

  • 315

    Monthly active users

  • 1.1K

    Posts

  • 14K

    Comments

Community moderators