HeadlinesBriefing favicon HeadlinesBriefing.com

Apple Keychain Recovery After Password Reset

Hacker News •
×

A macOS user discovered a critical flaw in Apple's password reset process after locking themselves out of their MacBook. After using recovery mode to reset their password, they found all keychain data and local user information had vanished. The reset process had moved the original encrypted keychain to a backup file and created a new one, breaking access to stored credentials.

This security design choice makes sense from Apple's perspective—the old keychain remains encrypted with the previous password—but leaves users stranded without a recovery path. When the user attempted to resync with their old data, they'd already exhausted the allowed password attempts. Every resync attempt triggered a warning about deleting iCloud data, creating a frustrating catch-22 situation.

For Linux users accustomed to tinkering, the solution proved surprisingly simple. The keychain data resides in ~/Library/Keychains, with the main file being login.keychain-db. During the reset, macOS moved the original to login_renamed_1.keychain-db. Restoring access required nothing more than replacing the new keychain with the old one, then entering the original password when prompted. Once authenticated, the system automatically re-encrypted everything with the new password and restored full functionality.