We have a Steam curator now. You should be following it. https://store.steampowered.com/curator/44994899-RPGHQ/

(Erryone get logged out) Addressing login issue

HQ-related news you should probably read.
Post Reply
User avatar
rusty_shackleford
Site Admin
Posts: 10260
Joined: Feb 2, '23
Contact:

(Erryone get logged out) Addressing login issue

Post by rusty_shackleford »

There will be a one-time change that will cause everyone to be logged out. I apologize for the inconvenience, this is an attempt to fix a persistent issue with certain legacy users having login issues.

Please let me know if anyone has issues staying logged in after this, thank you.
Last edited by rusty_shackleford on March 4th, 2024, 19:07, edited 1 time in total.
User avatar
rusty_shackleford
Site Admin
Posts: 10260
Joined: Feb 2, '23
Contact:

Post by rusty_shackleford »

Konjad wrote: March 5th, 2024, 08:54
I expected 2FA when re-logging
:toot:

To be clear, this was a last resort after a long time of troubleshooting. I don't even know if it will fix the issue.
User avatar
Ratcatcher
Turtle
Turtle
Posts: 638
Joined: Feb 2, '23

Post by Ratcatcher »

Well, was it fixed? Having to login again caused me an immeasurable amount of inconveniences and my day is now ruin. I hope it was worth it, at least.
User avatar
asf
Turtle
Turtle
Posts: 494
Joined: Feb 2, '23

Post by asf »

i almost didn't remember the password
User avatar
BobT
Posts: 844
Joined: Jan 29, '24
Location: USA

Post by BobT »

asf wrote: March 5th, 2024, 18:16
i almost didn't remember the password
That's what password reset is for lol
User avatar
Decline
Posts: 586
Joined: Mar 29, '23

Post by Decline »

I never persist the session (aka I always login) which amounts to one button press when opening this site, because I use a proper password manager.

And you should do too.
User avatar
Analogue Dreams
Posts: 18
Joined: Feb 28, '24

Post by Analogue Dreams »

Decline wrote: March 5th, 2024, 23:59
I never persist the session (aka I always login) which amounts to one button press when opening this site, because I use a proper password manager.

And you should do too.
So you keep a persistent session of your password manager's database open and unencrypted instead? Why would you avoid keeping cookies that keep you logged in, but use a password manager that stays open and doesn't time out and lets you enter passwords with only one button? Reminds me of using LUKS1 with PBKDF2 and TPM to make it easy for authorities to bypass the encryption entirely, or if they don't have someone who knows how to do that, they could crack such a weakly encrypted password automatically in a few minutes without any technical knowledge anyway.
User avatar
rusty_shackleford
Site Admin
Posts: 10260
Joined: Feb 2, '23
Contact:

Post by rusty_shackleford »

Analogue Dreams wrote: March 6th, 2024, 07:14
Decline wrote: March 5th, 2024, 23:59
I never persist the session (aka I always login) which amounts to one button press when opening this site, because I use a proper password manager.

And you should do too.
So you keep a persistent session of your password manager's database open and unencrypted instead? Why would you avoid keeping cookies that keep you logged in, but use a password manager that stays open and doesn't time out and lets you enter passwords with only one button? Reminds me of using LUKS1 with PBKDF2 and TPM to make it easy for authorities to bypass the encryption entirely, or if they don't have someone who knows how to do that, they could crack such a weakly encrypted password automatically in a few minutes without any technical knowledge anyway.
Image
User avatar
Decline
Posts: 586
Joined: Mar 29, '23

Post by Decline »

Analogue Dreams wrote: March 6th, 2024, 07:14
So you keep a persistent session of your password manager's database open and unencrypted instead?
No.
Why would you avoid keeping cookies that keep you logged in, but use a password manager that stays open and doesn't time out and lets you enter passwords with only one button?
Because it is convenient.
Reminds me of using LUKS1
Wrong/Invalid comparison.

Password managers exist for using different passwords across multiple sites, so the leak of one website's DB does not cause your account to be taken over on another website. The local state of the encryption (if there's even one) is completely secondary to the password managers main purpose.

Please be dumb somewhere else.
Last edited by Decline on March 7th, 2024, 00:40, edited 2 times in total.
User avatar
Decline
Posts: 586
Joined: Mar 29, '23

Post by Decline »

rusty_shackleford wrote: March 6th, 2024, 08:21
Analogue Dreams wrote: March 6th, 2024, 07:14
Decline wrote: March 5th, 2024, 23:59
I never persist the session (aka I always login) which amounts to one button press when opening this site, because I use a proper password manager.

And you should do too.
So you keep a persistent session of your password manager's database open and unencrypted instead? Why would you avoid keeping cookies that keep you logged in, but use a password manager that stays open and doesn't time out and lets you enter passwords with only one button? Reminds me of using LUKS1 with PBKDF2 and TPM to make it easy for authorities to bypass the encryption entirely, or if they don't have someone who knows how to do that, they could crack such a weakly encrypted password automatically in a few minutes without any technical knowledge anyway.
Image
Full disk encryption protects against accidental discard of sensitive information, which is a common occurrence in organizations.
User avatar
Ranselknulf
Turtle
Turtle
Posts: 754
Joined: Feb 3, '23

Post by Ranselknulf »

rusty_shackleford wrote: March 6th, 2024, 08:21
Analogue Dreams wrote: March 6th, 2024, 07:14
Decline wrote: March 5th, 2024, 23:59
I never persist the session (aka I always login) which amounts to one button press when opening this site, because I use a proper password manager.

And you should do too.
So you keep a persistent session of your password manager's database open and unencrypted instead? Why would you avoid keeping cookies that keep you logged in, but use a password manager that stays open and doesn't time out and lets you enter passwords with only one button? Reminds me of using LUKS1 with PBKDF2 and TPM to make it easy for authorities to bypass the encryption entirely, or if they don't have someone who knows how to do that, they could crack such a weakly encrypted password automatically in a few minutes without any technical knowledge anyway.
Image
Jokes on them. My laptop is encrypted with a biometric dick print reader.

If they want to forcibly take my password, then they'll have to grab my penis.
Post Reply