Drupal.org & group.drupal.org password disclosure
The Drupal security teams have identified a breach in the environment that has disclosed passwords. As their notification here --> https://drupal.org/news/130529SecurityUpdate states most of the passwords were salted and hashed, older passwords were not (although common practice is to store the salt value in the same table as the password, so that might not actually help much). According to the update they are still investigating what else may have been accessed. If you have one of those accounts happy password changing. If you use that password anywhere else (and of course you don't) you might want to change that whilst you are at it.
From the perspective of letting people know I must say I'm quite impressed. They notified fairly early on, they provide some details of the incident, steps to take, actions they are taking. From the breach notifications I have seen recently this is one of the more complete and useful ones.
Cheers
Mark H
Comments
In the ideal world, security incidents should be reported openly like traffic/crime statistics.
Good job Drupal.
JacL
May 30th 2013
1 decade ago
Steven Chamberlain
May 30th 2013
1 decade ago
Steven Chamberlain
May 30th 2013
1 decade ago
Mark
May 30th 2013
1 decade ago
Better to use a stronger hash algorithm and/or number of rounds. The rate that people can produce SHA256 hashes with GPUs now is alarming. I'd hope for SHA512 ($6$) with the default 5000 rounds, or Blowfish ($2a$) with at least 2^4 rounds. Drupal's announcement doesn't quite go into this amount of detail but PHPass will typically use the latter or better.
Steven Chamberlain
May 31st 2013
1 decade ago