{"id":3736,"date":"2018-02-20T19:02:37","date_gmt":"2018-02-20T19:02:37","guid":{"rendered":"https:\/\/blog.mageia.org\/en\/?p=3736"},"modified":"2018-02-21T11:07:10","modified_gmt":"2018-02-21T11:07:10","slug":"mageia-identity-security-breach","status":"publish","type":"post","link":"https:\/\/blog.mageia.org\/en\/2018\/02\/20\/mageia-identity-security-breach\/","title":{"rendered":"Mageia Identity Security Breach"},"content":{"rendered":"<p>A user was able to gain access to our LDAP\u00a0database\u00a0and has published the email\u00a0addresses\u00a0and names, as well as apparent password hashes,\u00a0of anyone who has signed up to identity.mageia.org.\u00a0However, the published hashes do not match those on record, and all capitalisation has been removed, so it is not clear that the actual passwords have been compromised.\u00a0All of the passwords have since been reset as a security\u00a0precaution.\u00a0New rules\u00a0have been\u00a0added to prevent access to the LDAP server. The sysadmins are investigating how the fields were read,\u00a0as the configuration\u00a0should have\u00a0specifically prevented this.<\/p>\n<p>The passwords\u00a0stored by the Mageia LDAP server are\u00a0hashed and salted, meaning that the full decryption of the password, if they have actually been leaked, into a human-usable format would require significant computing power for safe and complex passwords.\u00a0Despite the leaked data only appearing to be names and email\u00a0addresses\u00a0of identity.mageia.org users, we strongly urge users to be cautious if the password used for\u00a0their Mageia account is used elsewhere,\u00a0and\u00a0we recommend changing passwords wherever else it is used.<\/p>\n<p>To regain access to your Mageia account, the reset password link should be sufficient for all users without git access.The reset password link can be obtained\u00a0by asking for a password reset on\u00a0<a href=\"https:\/\/identity.mageia.org\/forgot_password\">https:\/\/identity.mageia.org\/forgot_password<\/a>\u00a0after which you&#8217;ll receive a mail with the link.<\/p>\n<p>For privileged users, a sysadmin should be contacted\u00a0to regain access.<\/p>\n<p>We sincerely apologise for any problems and inconvenience that this might cause.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A user was able to gain access to our LDAP\u00a0database\u00a0and has published the email\u00a0addresses\u00a0and names, as well as apparent password hashes,\u00a0of anyone who has signed up to identity.mageia.org.\u00a0However, the published hashes do not match those on record, and all capitalisation &hellip; <a href=\"https:\/\/blog.mageia.org\/en\/2018\/02\/20\/mageia-identity-security-breach\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":26,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-3736","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p159kA-Yg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.mageia.org\/en\/wp-json\/wp\/v2\/posts\/3736","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mageia.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mageia.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mageia.org\/en\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mageia.org\/en\/wp-json\/wp\/v2\/comments?post=3736"}],"version-history":[{"count":3,"href":"https:\/\/blog.mageia.org\/en\/wp-json\/wp\/v2\/posts\/3736\/revisions"}],"predecessor-version":[{"id":3739,"href":"https:\/\/blog.mageia.org\/en\/wp-json\/wp\/v2\/posts\/3736\/revisions\/3739"}],"wp:attachment":[{"href":"https:\/\/blog.mageia.org\/en\/wp-json\/wp\/v2\/media?parent=3736"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mageia.org\/en\/wp-json\/wp\/v2\/categories?post=3736"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mageia.org\/en\/wp-json\/wp\/v2\/tags?post=3736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}