Drupal.org User Accounts Compromised 60
An anonymous reader writes "The Drupal.org team released a bulletin this evening notifying users of a breach in their infrastructure.
From the bulletin: 'The Drupal.org Security Team and Infrastructure Team has discovered unauthorized access to account information on Drupal.org and groups.drupal.org.
This access was accomplished via third-party software installed on the Drupal.org server infrastructure, and was not the result of a vulnerability within Drupal itself. This notice applies specifically to user account data stored on Drupal.org and groups.drupal.org, and not to sites running Drupal generally.
Information exposed includes usernames, email addresses, and country information, as well as hashed passwords...
All Drupal.org passwords are both hashed and salted, although some older passwords on some subsites were not salted.'
Users are encouraged to update their Drupal.org passwords and the passwords of any accounts that could be linked via the compromised information."
Re: (Score:3, Funny)
Re: (Score:3)
Anyone else sick to death of Drupal-related security issues?
Trolling as AC ... and making it clear you really didn't RTFA ... ;-)
The breach was in a 3rd party module installed on the servers, and is totally unrelated to the Drupal codebase.
Trolling fail! :-)
Re:third-party software? (Score:4, Interesting)
They probably don't know what happened.
If I was a hacker, attempting to gain user account passwords - here's how I'd do it:
1. I'd breach the server and install something that would capture newly submitted raw passwords prior to them being salted/hashed
2. I'd inform the site owner that I'd hacked them and provide some proof. The site owner then warns everyone to change their passwords.
3. New, fresh, raw, non-salted, non-hashed passwords come flowing in.
Rainbow tables and brute-force password cracking is resource intensive. Why not grab 'em while they're in the clear?
Re: (Score:1)
Who on Earth would find out that a system has been compromised and not immediately reinstall or reimage it before doing anything else?
Re:third-party software? (Score:5, Informative)
This is why you rebuild your compromised environment. Which is exactly what the bulletin says they did.
Re: (Score:2)
Why not do #1 and leave it at that?
Slower but far less fuss and it could stay there for years instead of hours.
Re: (Score:1)
Re: (Score:3)
Re: (Score:3)
Re: (Score:1)
Re: (Score:1)
The security strategy I suggested (Federated SSO) would allow the compromised identity provider (e.g. Drupal.org) to have its federation membership trust revoked (either voluntarily or involuntarily) plus allow unaffected identity providers to take proactive measures to all related accounts (e.g. Example.com sending a warning [or simply resetting their access rights]
Re: (Score:2)
Probably the fault of Windows, or some other Microsoft product.
Cross viral contamination is always a possibility.
Passwords? More like passsentences. (Score:5, Funny)
As a recent Ars Technica article has uncovered, it is possible for a dedicated and knowledgeable attacker to reveal as many as 90% of passwords in a database. The sophistication of password cracking has never been higher, and common advice such as "use a mix of numbers, symbols, and uppercase letters" is no longer sufficient to fully ward a salted and hashed password from either compromise or ultimate flavor.
While brute force cracking is rendered useless by any properly implemented password system, hackers have responded by tailoring dictionary attacks using techniques such as the following:
So, how to keep your password safe in this age of uncertainty? Well, there is no sure way. But consider the following to stay one step ahead of the bad guys:
Once compromise happens, you have to assume your passwords will be known by the attackers before you do. Regularly changing your password is part of good Internet hygiene, so you may want to look for software that can automatically do this for you every minute or so. You may also want to consider two factor verification, typically a password and an application on your cellphone that gives you an access code, or three factor verification, which includes with the preceding an application on your friend's cellphone that gives a second access code that he'll send you on request. You cannot be too safe these days.
MOD PARENT INSIGHTFUL (Score:1)
Re: (Score:2)
Your post is almost totally plausible. Where it particularly falls down though is that Japanese doesn't have any conception of capital and lower case letters. The kanji are just Chinese characters (by and large), and the kana only have one form for most (there are small versions of some kana, but they play a different role in words to the large versions, unlike in English where the capitals still play the same role in the word, but affect grammar). (Though there are two types of kana, the point still stands
Re: (Score:3)
Combinations of words, such as the famous "horsebatterystaple" or the lesser known "walruspusflange", while suggested to extend the length of a password and reduce its susceptibility to brute forcing techniques, may nevertheless leave it vulnerable to directory combining attacks. Common passwords attached to each other sometimes reveal other passwords.
A silly and false assertion. Assume standard passwords in use. Your "dictionary" would consist of a list of characters ([A-Za-z]), digits ([0-9]), and punct
Re: (Score:1)
Re: (Score:3)
why I need to pick a "secure password" again?
Doh! Because if your password is "secure" it can't easily be decrypted in the exact scenario described here? :-)
All the weak passwords are the ones to fall first. If you used something along the lines of "sFr95y/Gfd0w2_z+3xnMCIr4yl,cdjEO" (and perhaps a password manager to keep track of it) this particular story wouldn't really matter to you at all... ;-)
- Jesper
what is the third party software? (Score:2)
Re: (Score:1)
They're currently conducting an investigation.
Re:what is the third party software? (Score:4, Insightful)
It is known, but they did not name it publicly because the investigation is still ongoing.
Let me be the first to post (Score:2)
stupid! (and I have many mod points that can't be used).
Re: (Score:2)
Big surprise... you know because Drupal is known for their excellent securely written software. ;)
Big surprise ... you know because you really didn't RTFA.
The problem was in a 3rd party module and is absolutely unrelated to the Drupal codebase itself.
Trolling failed! ;-)
- Jesper
The End of Passwords (Score:4, Insightful)
It's time to acknowledge that passwords are an idea that has come and gone. Too much hassle. Too many different password specifications from site to site. Too many to remember. Too many poorly constructed sites trying to tell users that bad security is their fault for not have super long and complex passwords. Too many sites where I actually now have three or four user IDs and passwords because I couldn't remember the last password I used there, or had changed my e-mail address since last visiting.
And too many sites, banks especially, that still demand to know my mother's maiden name, or worse yet, arcana from my youth that I don't even remember. My first pet's name? My favourite TV show? I have no idea. Or likely would answer that differently a month from now.
It's no wonder that most people ignore all of the password edicts that are thrown at them, and never change anything, and use the same password everywhere.
Surely we can develop some new way of confirming people's identity that allows us to abandon the idea of passwords? I vote for an RFID pinky ring with a plug in USB reader on my computer.
Re: (Score:1)
Re: (Score:1)
Re:The End of Passwords (Score:4, Insightful)
Sounds like you need a simple mechanism for unique passwords. I have a suggestion for you to consider.
Personally - I "salt" a standard password with the name of the website: the first initial of each of the words in a site's name for example. If my 'standard' password was for example "Aware20130530ness", and I was signing up for slashdot, I can simply add the letters to the start of the password, resulting in "sdAware20130530ness"
Right, clever boy, and now that you have revealed this, it will be trivial for any cracker to include this pattern in their decryption script ... if it isn't already there (which is not impossible at all). Commonly used patterns such as the one you describe can be identified mathematically and easily applied to the decryption process. The added work of even 100 patterns absolutely pales in comparison to real brute-force, so you should expect crackers to get past your "salt" real easy.
Making patterns like yours from the name of the website, or information in the usertable, is standard operating procedure when cracking.
Stop doing it. It does little to help you. At the very least you should use a pattern containing characters not present in the website name, and not present in your user properties on the site in question.
- Jesper
Re: (Score:2)
I've "given up" too. Until the pony is delivered, LastPass [lastpass.com] is a good solution. It supports Firefox, Chrome, and Dolphin on Android (have to subscribe to get the mobile support), which covers my needs, and uses local strong encryption so the LastPass people's can't get at your data. My first dog's name was jRffr9CDMNhD (I just generated that automagically with Alt-G - different for every site). It should be %6mjDYs*uwysVz%YYwTz2!7rcAt8!B%H, but too many websites don't sanitize input and have length limit
Re: (Score:2)
Please provide actual technical details that make sense so that there's a reason to invest in your hysteria.
From a technical standpoint he is totally correct, so what "hysteria" would that be exactly?
Salting does little other than prevent mass-cracking on large lists of userdata. So if someone takes the Drupal.org userlist and targets a few (2-5) individuals, rather than attempting to decrypt all passwords, the salt will have very little impact.
Calling this simple fact "hysteria" only makes your ignorance on the subject more clear - said with all possible respect and no trolling intended.
- Jesper
What method was used? (Score:3)
While current phpass implementations support bcrypt it has not always been so, and the framework support many different methods.
The article doesn't admit which method was used (suggesting they're not proud of their choice perhaps?). Does anyone know what method was used?
The articles at Ars mentioned by multiple ./ers here, were based on MD5 (which is totally unsuitable for passwords btw). So don't panic until the method used by drupal.org has been revealed.
- Jesper
Re: What method was used? (Score:2, Informative)
Nope. They're in the upgrade process. It's currently based on Drupal 6... Which is md5 by default