this post was submitted on 19 Jun 2023
25 points (100.0% liked)

Technology

37443 readers
245 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS
25
Lemmy user list (lemmy.ninja)
submitted 1 year ago* (last edited 1 year ago) by MrEUser@lemmy.ninja to c/technology@beehaw.org
 

EDIT: I'm putting this up front so it's the FIRST thing you see and read: I WAS WRONG I ASSUMED (and I know better) that it wasn't possible for me to have 3000 accounts created within a day or two of going live. I ASSUMED what I saw was accounts that were NOT local, I WAS WRONG I created a process to remove the bot accounts from my database without crashing my site. I have tested and it looks like all functions are working. If you need help because you suddenly have thousands more accounts than you would suspect ask me for the procedure. I'll gladly provide it.

I was able to identify bot accounts by looking at creation times. They accounts are grouped by "batches" where the account creation times are within seconds of each other. That's not typically going to happen with random humans creating accounts.

I used a tool to see how many users my site had. Once I saw the count was larger than expected, I wondered who these users were. I checked the database table and saw a huge list. I know for a fact that all these users are not on my instance. I was able to confirm that the database includes email address and password hash. This SHOULD mean that if someone tries to login, and their authentication information is sitting in my database, they can login at my site locally, correct? I only ask because I did not find an entry anywhere that lists a “home” instance for them to log in to. Am I correct in understanding that accounts are distributed like communities are?

you are viewing a single comment's thread
view the rest of the comments
[–] Orvanis@lemm.ee 9 points 1 year ago (3 children)

I was able to confirm that the database includes email address and password hash.

Uhhhh not loving that if true... Why would password hashes need to be sent all over the planet...? That's a security bomb just ticking.

Shouldn't each instance only need to be tracking user Metadata, with only the original users instance handling authentication...? After all my personal interaction is happening on my instance.

[–] key@lemmy.keychat.org 12 points 1 year ago* (last edited 1 year ago) (2 children)

You can see in the source that password hashes are not sent over activitypub.

[–] 6fn@kbin.social 7 points 1 year ago

Ok, I've looked at the source provided and don't see an e-mail field either. The account e-mail is also limited to your own instance, correct? This thread was making me mildly concerned that e-mails were being shared when federating between instances.

load more comments (1 replies)
load more comments (1 replies)