So is the problem only for people who have used the mobile version of RR?
So is the problem only for people who have used the mobile version of RR?
No, the mobile version of RR was the attack vector... they used a vulnerability there to walk through the user database and pull email addresses and encrypted passwords because of a bug. It was fixed in July, but they had enough time to pull about 25% of the user accounts on the site.
Interesting, thanks. If you know how many were affected is there a way to know who is affected?
The attacker was then able to decrypt the passwords by using MD5+salt rainbow tables.
Usually the salt is something the admin provides, not the developer, so I'm confused. Unless, of course a default salt was used.Can you elaborate on this? How did you make the determination this was the method used by the attacker to decrypt the passwords?
I've rolled out the new password management functions, so you can go ahead and change your password now.
If you change your password now, we won't reset your password when we do the mass password change that's going to happen here shortly.
I've rolled out the new password management functions, so you can go ahead and change your password now.
If you change your password now, we won't reset your password when we do the mass password change that's going to happen here shortly.
There aren't any restrictions that I am aware of.What is the maximum password length allowed and what characters allowed/not allowed for the new system?