this post was submitted on 08 Jul 2023
184 points (97.4% liked)

Technology

59197 readers
2961 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Let's gooooooooo

top 17 comments
sorted by: hot top controversial new old
[–] [email protected] 19 points 1 year ago (2 children)

Not a bad idea! The attack vector issue they mention in the PR comments is valid, though. Not displaying those errors gives an attacker no confirmation that a user whose account they're trying to attack exists, if they're trying known used passwords. But good on you doing what you can to contribute to the project!

[–] [email protected] 18 points 1 year ago (2 children)

There should be an error, but it shouldn't say whether it was the email or password that was wrong.

[–] [email protected] 2 points 1 year ago

Fair point!

[–] [email protected] -2 points 1 year ago* (last edited 1 year ago) (1 children)

~~An attacker would still know the account exists, and they would know the password did not match.~~

~~Or you're assuring them that specific password is used by some account, just not this one. Which is even worse.~~

[–] [email protected] 5 points 1 year ago (1 children)

Read the comment you're responding to, again. Nothing about their suggestion leads to either of these scenarios.

[–] [email protected] 4 points 1 year ago

Right, I misread "shouldn't" for "should".

[–] [email protected] 6 points 1 year ago* (last edited 1 year ago) (1 children)

Couldn't they just check instancename/u/accountname to see if the user exists?

[–] [email protected] 3 points 1 year ago

Theoretically yeah. Depends on how quickly the attacker is working or if they have enough information to know where the account lives. If they're doing their due diligence, they could 100% confirm that. But if they aren't, they might just go to a random instance, try logging in, and see if it works.

By no means is it bad to offer a response, but it always risks giving an attacker more information than they need/the victim would want to have discovered about them.

[–] [email protected] 14 points 1 year ago (2 children)

yeeeeaaaaaaaa - see what you can do about hiding viewed content ^*

[–] [email protected] 6 points 1 year ago (1 children)

Sounds like a cool feature. I'm honestly down for doing a good chunk of lemmy-ui dev work as I'm kind of getting rusty in React with my new job being strictly backend these days.

[–] [email protected] 3 points 1 year ago (1 children)

I might look into it myself, definitely curious but i’m always cautious with open source projects when committing a decently sized PR - yea that’s a great way to keep the knives sharp

[–] [email protected] 1 points 1 year ago (1 children)

If the size of the PR is a concern, maybe the maintainers will allow a staged approach. Create an Issue describing the feature and indicate step by step how you would implement. Then break the work into multiple pull requests.

If necessary, you could introduce a toggle that's switched off by default until the feature is fully implemented.

[–] [email protected] 2 points 1 year ago

ooooOO this is an interesting approach

[–] [email protected] 4 points 1 year ago

Yeah man... I am still waiting for that option that reddit has that hides any content you already upvoted/downvoted.

[–] [email protected] 8 points 1 year ago
[–] [email protected] 4 points 1 year ago (1 children)

For a moment I thought you meant "Public Relations". 😅

[–] [email protected] 3 points 1 year ago

Or "Press Release".

load more comments
view more: next ›