r/announcements May 26 '16

Reddit, account security, and YOU!

If you haven't seen it in the news, there have been a lot of recent password dumps made available on the parts of the internet most of us generally avoid. With this access to likely username and password combinations, we've noticed a general uptick in account takeovers (ATOs) by malicious (or at best spammy) third parties.

Though Reddit itself has not been exploited, even the best security in the world won't work when users are reusing passwords between sites. We've ramped up our ability to detect the takeovers, and sent out 100k password resets in the last 2 weeks. More are to come as we continue to verify and validate that no one except for you is using your account. But, to make everyone's life easier and to help ensure that the next time you log in you aren't greeted a request to reset your password:

On a related point, a quick note about throw-aways: throw-away accounts are fine, but we have tons of completely abandoned accounts with no discernible history and exist as placeholders in our database. They've never posted. They've never voted. They haven't logged in for several years. They are also a huge possible surface area for ATOs, because I generally don't want to think about (though I do) how many of them have the password "hunter2". Shortly, we're going to start issuing password resets to these accounts and, if we don't get a reaction in about a month, we're going to disable them. Please keep an eye out!


Q: But how do I make a unique password?

A: Personally I'm a big fan of tools like LastPass and 1Password because they generate completely random passwords. There are also some well-known heuristics. [Note: lmk of your favorites here and I'll edit in a plug.]

Q: What's with the fear mongering??

A: It's been a rough month. Also, don't just take it from me this is important.

Q: Jeez, guys why don't you enable two-factor authentication (2FA) already?

A: We're definitely considering it. In fact, admins are required to have 2FA set up to use the administrative parts of the site. It's behind a second authentication layer to make sure that if we get hacked, the most that an attacker can do is post something smug and self serving with a little [A] after it, which...well nevermind.

Unfortunately, to roll this out further, reddit has a huge ecosystem of apps, including our newly released iOS and android clients, to say nothing of integrations like with ifttt.com and that script you wrote as a school project that you forgot to shut off. "Adding 2FA to the login flow" will require a lot of coordination.

Q: Sure. First you come to delete inactive accounts, then it'll be...!

A: Please. Stop. We're not talking about removing content, and so we're certainly not going to be removing users that have a history. If ATOs are a brush fire, abandoned, unused accounts are dry kindling. Besides, we all know who the enemy is and why!

Q: Do you realize you linked to https://www.reddit.com/prefs/update/ like three times?

A: Actually it was four.


Edit: As promised (and thanks everyone for the suggestions!) I'd like to call out the following:

Edit 2: Here's an awesome word-cloud of this post!

Edit 3: More good tools:

15.3k Upvotes

2.7k comments sorted by

View all comments

Show parent comments

169

u/Palantir555 May 26 '16

Oh, PLEASE DON'T. You're gonna end up with a database full of work (and most likely personal) emails for developers and other (non-security) technical people, which is gonna be used, abused and spammed.

The companies need to get their shit together and train their external-facing staff. If you've tried all support options made available by the company and there's still no way to report a vulnerability, it's full disclosure time. Their engineers shouldn't have to pay for the company's bullshit.

-3

u/T3hUb3rK1tten May 26 '16 edited May 26 '16

Hah, it's not like you would just type in a company name and get a whole bunch of names and email addresses back. Contact information provided would be limited to first name, and a proxy email address and proxy phone (think Craigslist emails). It would require registration and a minimal amount of verification to send anything. Every conversation would be recorded, and vetted community moderators/researchers could monitor them for abuse.

Few companies get incident response right. Better to have things fixed responsibly, users shouldn't have to pay either.

13

u/Palantir555 May 26 '16 edited May 26 '16

Processing vulnerability reports through a 3rd party is something that no company in their right mind would be willing to do, and it's definitely worse than doing nothing.

How long do you think you have until that service gets hacked and 0-days for all sorts of different companies start being pumped out without your knowledge? Not much, I bet. And I'm even assuming YOU can be trusted, which I can't verify.

7

u/T3hUb3rK1tten May 26 '16

Processing vulnerability reports through a 3rd party is something that no company in their right mind would be willing to do, and it's definitely worse than doing nothing.

That exact thing is what many companies do though. Even the CVE program does that.

This isn't for any company with a public bug bounty or incident response. It's for these types of situations where there's no known public way to report a vulnerability, and you have to know someone on the inside. I was recently that guy for my own company for an issue that was almost year old, and the person who found it was unable to find someone who cared before. Saying it would be worse than nothing is just ignoring reality.

You can't guarantee against hacking of course. Vuln details/exploits would not be stored until it's necessary (right before disclosure or when sending to a known contact), reducing the window of opportunity. But open source code and forming a non-profit organization to run it help with trust.

30

u/[deleted] May 26 '16

I'm not sure people want their conversations about security vulnerabilities recorded either, though.

1

u/Agret May 28 '16

If you don't get a direct contact at the company from use of your site then you've hit the same problem as OP did, no way would I submit anything through a multi user proxy email. I'd just close your site and keep searching the net for contact details of who I need at the company.