this post was submitted on 09 Aug 2023
92 points (100.0% liked)

Asklemmy

44176 readers
1738 users here now

A loosely moderated place to ask open-ended questions

Search asklemmy πŸ”

If your post meets the following criteria, it's welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

~Icon~ ~by~ ~@Double_[email protected]~

founded 5 years ago
MODERATORS
 

I noticed that there were some accounts that were hijacked by the instance owners. All the posts from that user were then edited to say what happened.

This kind of surprised me, I figured instances could delete posts, but not edit them. So how much control do they have?

I assume they can't see my password (hopefully). Can they post in my name? Do they have all the access to my posts to foreign instances that they do over local posts?

Edit: thanks for all the responses everyone! I've wanted my own instance for a while, but maybe I'll get on it now

all 50 comments
sorted by: hot top controversial new old
[–] [email protected] 69 points 1 year ago (4 children)

Just to correct the people who say they can't see your password - this is only true if they're running a stock copy of lemmy, which hashes passwords in the database.

They're free to modify their instance however they want, including storing unencrypted passwords or emailing your password on registration to a bot farm.

Always use a unique password for every site you use.

[–] [email protected] 18 points 1 year ago* (last edited 1 year ago)

Before people get worried about this, this is how literally any online service works. If you have an account anywhere, you trusted that service to not record your password.

Only exception is oauth, which actually might be a good idea for Lemmy.

[–] [email protected] 4 points 1 year ago (2 children)

An instance owner having access to the database can surely change the password to access the account and then change it back. If you're the server owner, you can do anything you want directly on the database.

[–] [email protected] 5 points 1 year ago

Yes but if I was a dick, I'd just harvest their passwords silently and then try them on other websites.

[–] [email protected] 3 points 1 year ago* (last edited 1 year ago)

[This comment has been deleted by an automated system]

[–] [email protected] 3 points 1 year ago

Oh boy, I have a bad feeling about this

[–] [email protected] 2 points 1 year ago

Or even modifying the login page to send and store unencrypted passwords to get passwords from people who already registered long ago

[–] [email protected] 43 points 1 year ago* (last edited 1 year ago)

The passwords are hashed (AFAIK), but the instance admin has effectively full control of any and all data originating on their instance, right down to the database level.

There has to be some level of guaranteed trust for any instance to work. And in some capacity there is inherent trust across the entire Fediverse that instances federating content are to be trustworthy. It's no different than any other forum from the old web days- there's zero guarantees and there's no way around it.

[–] [email protected] 40 points 1 year ago (1 children)

They have full control over the account. Since they control the server, they can modify the database to do whatever they want.

[–] [email protected] 18 points 1 year ago (1 children)

Yup, simple as changing the password hash to their own and then logging in with their known password.

[–] [email protected] 17 points 1 year ago

Or even simpler, just edit it directly in the database.

[–] [email protected] 38 points 1 year ago* (last edited 1 year ago) (4 children)
  • Password hashing occurs server-side. Even without removing the hashing step an admin can intercept the plaintext password during login. Use unique safe passwords.

  • An admin can intercept the jwt authentication cookie and use any account that lives in the instance.

  • Private messages are stored as plaintext in the database

  • Admins can see who upvotes/downvotes what

  • These are not things that are unique to Lemmy. This is common.

  • To avoid having to trust your admin, run an instance.

[–] Ziggurat 7 points 1 year ago (2 children)

Quick note,

this is note unique to Lemmy/Fediverse. Reddit admin or twitter admin (and even gmail) can also read your MP, see the hash of your password and remove your comments. Reading your MP is even part of their business model so they can show you personalized ads.

There is definitely a probability to deal with a non reliable instance admin, but not less than with any other social media, and in principle they collect even less data

[–] [email protected] 7 points 1 year ago (1 children)

Technically that’s true.

To build trust and adhere to law, corporations will usually have processes and regulations in place that determine which employees can access and modify what. That is why spez modifying user comments is such a big deal. It showed that Reddit is not to be trusted. Nevertheless, for corporations that value customers trust, any employee who does not adhere to these procedures risks their employment.

On smallish fediverse instances none of these procedures need to be in place, the admin is bound only by his own moral code.

[–] [email protected] 4 points 1 year ago

This is true. However keep in mind that instances survive on reputation. As soon as something like this came out, which is inevitable with time, nobody will trust that instance, or the person running that instance, again. And people are usually quite quick to find this out as already demonstrated by other online services. Hiding is very difficult. Even worse, once your reputation falls, people can move to a more respectful server and continue participating in the network, so in the end it's a losing game for the instance owner. Password safety obviously applies, but if you take a look at big social media privacy and terms, a little password manager in my personal opinion is preferable.

[–] [email protected] 3 points 1 year ago

There is definitely a probability to deal with a non reliable instance admin, but not less than with any other social media, and in principle they collect even less data

Yeah. You can see the cookies that are stored by a site by right-clicking on the site, going to "inspect", and the clicking "Storage". By default, the only cookie that Lemmy has is an jwt cookie used to authenticate your user.

You are not asked for a phone number to be here. Providing an e-mail is often optional and even discouraged by some instances. When you want to send a private message through the site you get a message discouraging from doing that and encouraging to try to use an encrypted chat application instead, such as matrix.

The original Lemmy instance (lemmy.ml) is a community for FOSS and Privacy enthusiasts. What is asks from a user and what it does with the data is what it needs to be functional. Lemmy lets you take any proactive step that you would like to take to protect your privacy - use a VPN or Tor, use safe passwords, use a unique identity, and don't provide any personal information. There are no built-in features to block you or discourage you from doing that. Lemmy never asks for your location, nor does it keep any logs of what content you visit, nor does it try to run any analytics on you. But even if that is not enough for you, the fediverse doesn't lock you out, you can set up an instance or even create a new program to interact and communicate only precisely what you want to communicate via activity pub.

[–] [email protected] 3 points 1 year ago (2 children)

I'm assuming votes are all federated, so I think any instance admin would be able to see who voted in which direction for any post that gets federated to their instance, no? Or is it just the vote count that is federated?

[–] [email protected] 3 points 1 year ago (2 children)

I remember seeing someone listing everyone who voted, so I think the votes themself are federated.

Might even be accessible via the API so any frontend can list them, but that's just a guess.

[–] [email protected] 1 points 1 year ago (1 children)

I kinda hope they don't have an API for that. I really didn't like it on reddit when two people would be having a debate on a topic, and one person would search the other person's comment history to find something to attack their character on to hurt their credibility. I think debates should be handled using relevant points about the topic being discussed. Attempts to attack character are very underhanded. It's how politicians debate. It almost like admitting that you couldn't make a better point than your opponent, so you had to stoop to that level.

I think having an API for votes and front ends that showed votes would encourage people to do exactly that here. If front ends started showing that info, I think it would discourage lurkers from voting, which I'm not sure we want.

Obviously there's very little that could or even should be done about admins seeing that info. Admins have full visibility and manipulation power over the DB, and I feel like this wouldn't even make the list of improvements that I think lemmy needs right now. Admins just sort of need to be trusted or people will leave your instance.

[–] [email protected] 2 points 1 year ago* (last edited 1 year ago)

No, there is no API to get the votes (https://join-lemmy.org/api/). If my understanding is correct, now that I upvoted your comment my instance will push that information. I'm not sure whether it pushes it to dandroid.app first or to all instances, saying basically "[email protected] upvoted https://dandroid.app/comment/441785", and so every instance that has that comment can save my user ID in the "upvote" list of that comment, and that upvote is counted.

If only the vote direction was federated, then it would be very easy for me to spam the message "Upvote https://dandroid.app/comment/441785". I would not even need to create an instance for that, I just need to speak ActivityPub. And it would be more difficult to detect that I am doing that, because the database would only hold the vote count.

I don't think there is a way to ask an instance to reveal this list. You can only get it by directly querying the database if you have access to it. This is why if you fetch an older post or comment, it will arrive with a single or zero votes.

load more comments (1 replies)
[–] [email protected] 2 points 1 year ago (2 children)

Can you recommend a good free web host for running your own instance? I haven't dabbled in web development in over 15 years now, so I'm kinda out of the loop.

[–] afa 3 points 1 year ago (1 children)

Oracle has a pretty decent free tier.

[–] [email protected] 1 points 1 year ago
[–] [email protected] 2 points 1 year ago (1 children)

I'm not sure about Web Hosting. Many of us use a dedicated virtual private server (VPS)

I use https://serverspace.io, I think Lemmy.ml is hosted with https://www.hetzner.com/

These are servers that you access via SSH and can install the instance inside of it. I personally install using docker compose, but there are some other methods that are claimed to be easier. The cost starts at ~$5 / month. Currently I pay about $15 / month. You would then rent the domain name from a domain name registrar (I use namecheap.com) and ask them to point the domain name to your server's IP address.

[–] [email protected] 2 points 1 year ago* (last edited 1 year ago)

I looked into it and gave up after half a day of trying. I can't figure out how this SSH thing works at all.

I'm used to CPanel and uploading files via FTP. I can code some CSS and manage a MySQL server, but this modern era of web development goes over my head. Apparently now you have to pick a Linux distro and install it, instead of it just being ready to go for you. (At least that's how it worked with Oracle).

Thanks for trying to help but I'm too old for this shit now. I don't even know what "docker compose" means. I've read the official documentation and looked at tutorials, but it's all a foreign language to me now. Like I said, in my day you just uploaded the files via FTP, changed some lines in a config file, redirected your .com to your nameservers in CPanel, and you were good to go. Installing an instance is 10x more difficult. Wasted $9 on a domain for nothing... *sigh*

[–] [email protected] 19 points 1 year ago

as instance admins, they have access to the database, so they straight up can edit any data.

only thing they can't do is view your password (hashed), but they can replace the hash by one of a known pw.

so you must have some trust in your instance owner, again whats good with the fediverse is that you can just start your own instance, and then the best they can do is defederate from you or ban you.

[–] [email protected] 17 points 1 year ago* (last edited 1 year ago) (2 children)

It's important to note that your password has to be stored someway, no matter what, no matter where. How it's stored can be varied, from hashed (think encrypted) to cleartext. I'm assuming lemmy is using hashed passwords, so if you're concerned about your password being available to an instance owner, admin, or potential attackers, then you'll need to follow safe password guidelines. Changing the concept from passwords to passphrases is a great start.

Always keep in mind, if the data isn't stored on your device, you do not technically own that data. You have to trust the owners to be good data custodians and treat the data you give them as if it were their own private data.

I'll leave this now internet-ancient sacred image for future passphrase converts.

[–] [email protected] 15 points 1 year ago (1 children)

Understood. I am now changing all my passwords to Correct Horse Battery Staple.

[–] [email protected] 2 points 1 year ago

Hey, that's my password too.

[–] [email protected] 2 points 1 year ago* (last edited 1 year ago) (1 children)

Just to be clear, you're talking about Lemmy. There are authentication mechanisms in which the instance never has access to your password, in any form.

I wish I could upvote your comment multiple times for the XKCD comic on this. And to anyone curious, there are many tools which will generate XKCD passwords for you. One's called "correcthorse", and there's another called "correctpony". A github search for "xkcd password" should turn up several.

[–] karlthemailman 2 points 1 year ago (1 children)

Why can't the admin just change the Lemmy source code to not hash anymore?

[–] [email protected] 1 points 1 year ago

Are you asking why can't a bad admin change the code so that they can more easily steal the password? They could, and this is what OP was saying about trusting the admin. What I was saying was that there are client-side auth mechanisms, where the admin never has access to the password. But Lemmy could also implement OAuth, or a similar federated identity pattern, where (again) the Lemmy admin never has access to any form of the password.

I've never run a Lemmy instance; it's possible the server software supports SSO but few instances use it.

[–] [email protected] 14 points 1 year ago (1 children)

A lot of people here mentioned that passwords are hashed, but unless I missed it no one pointed out the following:

The admin of your instance controls your login form and they can pull your password when you log in. So, as others mentioned: always use unique passwords, never ever reuse them.

In general a server admin can do anything they want on their own instance.

Federation wise I'd say if your home instance is the bad actor you are screwed, if it's another instance then their capabilities for mischief hare probably (hopefully?) more limited. And any such action would likely cause a swift defederation of the malicious instance

[–] [email protected] 4 points 1 year ago* (last edited 1 year ago)

[This comment has been deleted by an automated system]

[–] [email protected] 7 points 1 year ago

On which instance did this stuff happen? I’d like to defederate for sure.

[–] [email protected] 5 points 1 year ago (1 children)

Just want to add some detail to what everyone is saying about passwords. From what I understand, by default, Lemmy uses the bcrypt hashing function to store passwords. This is a fantastic choice. The great thing about hashing a password is that there is no way to go from the hash back to the password. It's mathematically impossible, since the process loses information. This is different from encryption where there is a mathematical way to recover the original data from the ciphertext.

So great, no recovering passwords! Well...Not exactly. While there is no way to calculate the password from the hash, the neat thing about hashing algorithms is that the same input, run through the same function, will always produce the same output. And since we know Lemmy uses bcrypt, and a sufficiently motivated attacker could look at the code and figure out all the variables that goes into the bcrypt function in Lemmy, an attacker can know exactly how your password was hashed. They can make a guess at your password, run it through the function and see if that matches the hash stored in the database (this is actually how you are authenticated when logging in). If they do that a lot of times, they might be able to guess your password this way. This is basic brute forcing of a password. and there are pre-built tools to do this.

Extending that brute force attack further. People are bad at picking passwords. Most peoples' passwords follow similar patterns and have similar words in them. If you get such a list of words and use it to make up the guesses using common patterns, this can greatly speed up the guessing of passwords. And, wouldn't you know it, this also has pre-built lists and tools to do. It's dead simple. Take a class on hacking and you'll likely be doing this on day 1. Day 2 if the instructor eats up a lot of time going over the syllabus.

So, what's the defense against this? Well, two things:

  1. Unique passwords - and not just a common password with an easy to guess change. Having "Password1" here and "Password2" over there isn't smart, no matter how smart your version of "Password" is. I mean real, complex, unique passwords. Give up memorizing them, or even knowing what they are. Get a good password vault (e.g. KeePass or BitWarden), and use that to both generate and store passwords. Protect that with a long passphrase (a sentence, with capitalization and punctuation) which you can remember.
  2. Multi-factor authentication (MFA) - This can be limited to stuff which you really care about. If someone hacks your PornHub account, you probably don't care. If someone hacks your bank account, you probably do care. There's a whole discussion on MFA and what types are better; but, if you can enable it on a site you don't want compromised, use what's offered.
[–] [email protected] 6 points 1 year ago* (last edited 1 year ago) (1 children)

That is a lot of words to say β€˜they can’t see your password, but they can try to guess it. Make a secure password and you won’t have any problems’

[–] [email protected] 1 points 1 year ago

That's a fair critique. However, I find the advice "Make a secure [unique] password and you won’t have any problem" is often given, without any explanation as to "why" that advice is given. As someone who likes to know the "why" behind things like this, I like to give that detail as well.

[–] [email protected] 4 points 1 year ago (4 children)

Lemmy needs GPG signatures!

load more comments (4 replies)
[–] [email protected] 2 points 1 year ago

They can’t see your password in a usable state, but have control over everything else.