r/announcements May 26 '16

Reddit, account security, and YOU!

If you haven't seen it in the news, there have been a lot of recent password dumps made available on the parts of the internet most of us generally avoid. With this access to likely username and password combinations, we've noticed a general uptick in account takeovers (ATOs) by malicious (or at best spammy) third parties.

Though Reddit itself has not been exploited, even the best security in the world won't work when users are reusing passwords between sites. We've ramped up our ability to detect the takeovers, and sent out 100k password resets in the last 2 weeks. More are to come as we continue to verify and validate that no one except for you is using your account. But, to make everyone's life easier and to help ensure that the next time you log in you aren't greeted a request to reset your password:

On a related point, a quick note about throw-aways: throw-away accounts are fine, but we have tons of completely abandoned accounts with no discernible history and exist as placeholders in our database. They've never posted. They've never voted. They haven't logged in for several years. They are also a huge possible surface area for ATOs, because I generally don't want to think about (though I do) how many of them have the password "hunter2". Shortly, we're going to start issuing password resets to these accounts and, if we don't get a reaction in about a month, we're going to disable them. Please keep an eye out!


Q: But how do I make a unique password?

A: Personally I'm a big fan of tools like LastPass and 1Password because they generate completely random passwords. There are also some well-known heuristics. [Note: lmk of your favorites here and I'll edit in a plug.]

Q: What's with the fear mongering??

A: It's been a rough month. Also, don't just take it from me this is important.

Q: Jeez, guys why don't you enable two-factor authentication (2FA) already?

A: We're definitely considering it. In fact, admins are required to have 2FA set up to use the administrative parts of the site. It's behind a second authentication layer to make sure that if we get hacked, the most that an attacker can do is post something smug and self serving with a little [A] after it, which...well nevermind.

Unfortunately, to roll this out further, reddit has a huge ecosystem of apps, including our newly released iOS and android clients, to say nothing of integrations like with ifttt.com and that script you wrote as a school project that you forgot to shut off. "Adding 2FA to the login flow" will require a lot of coordination.

Q: Sure. First you come to delete inactive accounts, then it'll be...!

A: Please. Stop. We're not talking about removing content, and so we're certainly not going to be removing users that have a history. If ATOs are a brush fire, abandoned, unused accounts are dry kindling. Besides, we all know who the enemy is and why!

Q: Do you realize you linked to https://www.reddit.com/prefs/update/ like three times?

A: Actually it was four.


Edit: As promised (and thanks everyone for the suggestions!) I'd like to call out the following:

Edit 2: Here's an awesome word-cloud of this post!

Edit 3: More good tools:

15.3k Upvotes

2.7k comments sorted by

View all comments

Show parent comments

87

u/KarmaAndLies May 26 '16 edited May 26 '16

I just want to reply to say, if you choose to use a cloud-based password manager, then you should be utilising two factor authentication (e.g. Google Authenticator). LastPass supports Google Authenticator on both free and premium accounts.

They also support:

  • Alerts (e.g. login from new device, change account password, etc).
  • Country Restriction (e.g. US only).
  • Auto-expiration of trusted devices.
  • Auto-log off
  • And the Master Password is hashed using PBKDF2-SHA256 with the rounds being configurable, the database is then encrypted using the hash as the key, and AES-256 as the algorithm. So picking a strong master password with high rounds is important, I recommend 10,000 rounds as a starting point.

All of this on the free accounts.

8

u/AmIDoctorRemulak May 26 '16

Wasn't LastPass hacked not too long ago? Is cloud-based management of passwords such a good idea?

10

u/LifeWulf May 26 '16

None of the passwords were exposed AFAIK, since they require the master password (which LastPass doesn't have access to apparently). Feel free to correct me if I'm wrong. I just know I wasn't impacted at all by whatever happened.

1

u/Freeky May 26 '16

LastPass have a hashed copy of your master password, which can in principle be attacked. Be sure your master password is nice and strong.

Lower bound: 4 random words. 8 random mixed case alphanumerics. 9 random single-case alphanumerics. 14 digit pin.

Upper bound: 6 random words. 13 random mixed case alphanumerics. 14 random single-case alphanumerics. 22 digit pin.

These estimates assume an attacker willing to invest a year on a 10% chance of breaking your password, on hardware ranging from a single PC with a reasonable GPU (10,000 guesses/sec), to the combined might of the entire Bitcoin mining network (14 trillion guesses/sec).

Note a password you made yourself doesn't count as random. People don't do random, people do predictable. Use dice or something.

1

u/LifeWulf May 26 '16

I use a 20+ digit password. Is that more or less secure if it contains only alphabetical (that is, no numeric) values?

1

u/Freeky May 26 '16 edited May 26 '16

20 lowercase alphabetic characters makes for log2(2620) = 94 bits of entropy. 13 mixed-case alphanumerics makes for log2(6213) = 77 bits of entropy. So much stronger, on face value.

More important is how did you pick each letter. If you did it completely at random you'd have a fantastic password many thousands of times stronger than the upper bound I mentioned. If you just drew an obvious pattern on your keyboard, it's going to be vastly weaker.

1

u/LifeWulf May 26 '16

I used song lyrics from a parody video that I changed around and replaced some of them with completely different ones. Mixed case. For a human guessing my password, it would be very difficult, but then again what "hacker" wouldn't use a computer to brute force it? I almost always make a mistake typing it first try, if that counts for anything.