Right guys?

  • Mic_Check_One_Two@reddthat.com
    link
    fedilink
    arrow-up
    23
    ·
    1 year ago

    Yup. Changing your password or 2FA wouldn’t help here, because they’re not actually logging into your account. Rather, they’re simply telling the server that they’re already logged in, using your auth token as proof. You know that little “Keep me logged in” checkbox that everyone clicks when they log in? That stores an auth token on your browser, which is tied to your account.

    The next time the browser starts a session on the site, it sends that auth token instead of going through the regular login process. And since the site knows that auth token belongs to your account, it logs you in automatically without needing to go through the regular login process.

    So basically, they’re stealing a cookie from your browser, with your name on it. Then they’re able to tell the server that they’re you, by presenting that cookie as proof.

    Proper procedure should be to deauthorize any auth tokens when you change your password. But even big sites get lazy about this sometimes, so it may not be the default. If this is the case for Lemmy, even changing your password won’t help because it doesn’t automatically deauth that token.

    • spiderplant@infosec.pub
      link
      fedilink
      arrow-up
      3
      ·
      1 year ago

      Really curious to see how they kill the existing tokens, and whether admins have tools to easily clear all sessions. On one of the Matrix chats someone suggested that the tokens have a one year expiry date!

      • Mic_Check_One_Two@reddthat.com
        link
        fedilink
        arrow-up
        2
        ·
        1 year ago

        Tokens are signed with a secret string, which basically tells the server that it is legitimate. They could change that secret, and the server would immediately distrust any tokens signed with the old secret. This would be a pretty nuclear option though, because it would require every single user to log back in.

        You’re not the first person to say that the expiration time is a year, which is hilariously long if true. A shorter expiration time is more secure (because it specifically limits attacks like this to a specific timeframe) but it also increases server load by requiring token requests more often. For instance, if the expiry was set at 5 minutes, you’d have requests every 5 minutes but an attacker would only have control of an account for a maximum of five minutes. Maybe it was done to help save on server load, since this is all basically run by a few people as a hobby.

      • TheSaneWriter@lemm.ee
        link
        fedilink
        arrow-up
        2
        ·
        1 year ago

        The servers should theoretically have a way to murder the tokens, but I’m not sure how Lemmy has implemented authentication so I don’t know for sure.

    • Lmaydev@programming.dev
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      Once a token is issued it is valid until it experies. There is no way to disable a token short of changing the secret used to sign them which would invalidate all existing tokens for all users.

      • Mic_Check_One_Two@reddthat.com
        link
        fedilink
        arrow-up
        3
        ·
        1 year ago

        I actually suggested exactly that elsewhere. It would be a nuclear option, for sure. Since it would require every single user to log back in. But it would 100% without a doubt stop the attacker in their tracks.

      • Natanael@slrpnk.net
        link
        fedilink
        arrow-up
        1
        ·
        1 year ago

        That’s bad design because you can bind a user token to a per-account value which can be rotated to deprecate tokens