Page 1 of 1

(Erryone get logged out) Addressing login issue

Posted: March 4th, 2024, 18:56
by rusty_shackleford
There will be a one-time change that will cause everyone to be logged out. I apologize for the inconvenience, this is an attempt to fix a persistent issue with certain legacy users having login issues.

Please let me know if anyone has issues staying logged in after this, thank you.

(Erryone get logged out) Addressing login issue

Posted: March 5th, 2024, 08:54
by Konjad
I expected 2FA when re-logging

(Erryone get logged out) Addressing login issue

Posted: March 5th, 2024, 08:55
by rusty_shackleford
Konjad wrote: March 5th, 2024, 08:54
I expected 2FA when re-logging
:toot:

To be clear, this was a last resort after a long time of troubleshooting. I don't even know if it will fix the issue.

(Erryone get logged out) Addressing login issue

Posted: March 5th, 2024, 09:58
by Ratcatcher
Well, was it fixed? Having to login again caused me an immeasurable amount of inconveniences and my day is now ruin. I hope it was worth it, at least.

(Erryone get logged out) Addressing login issue

Posted: March 5th, 2024, 18:16
by asf
i almost didn't remember the password

(Erryone get logged out) Addressing login issue

Posted: March 5th, 2024, 23:56
by BobT
asf wrote: March 5th, 2024, 18:16
i almost didn't remember the password
That's what password reset is for lol

(Erryone get logged out) Addressing login issue

Posted: March 5th, 2024, 23:59
by Decline
I never persist the session (aka I always login) which amounts to one button press when opening this site, because I use a proper password manager.

And you should do too.

(Erryone get logged out) Addressing login issue

Posted: March 6th, 2024, 07:14
by Analogue Dreams
Decline wrote: March 5th, 2024, 23:59
I never persist the session (aka I always login) which amounts to one button press when opening this site, because I use a proper password manager.

And you should do too.
So you keep a persistent session of your password manager's database open and unencrypted instead? Why would you avoid keeping cookies that keep you logged in, but use a password manager that stays open and doesn't time out and lets you enter passwords with only one button? Reminds me of using LUKS1 with PBKDF2 and TPM to make it easy for authorities to bypass the encryption entirely, or if they don't have someone who knows how to do that, they could crack such a weakly encrypted password automatically in a few minutes without any technical knowledge anyway.

(Erryone get logged out) Addressing login issue

Posted: March 6th, 2024, 08:21
by rusty_shackleford
Analogue Dreams wrote: March 6th, 2024, 07:14
Decline wrote: March 5th, 2024, 23:59
I never persist the session (aka I always login) which amounts to one button press when opening this site, because I use a proper password manager.

And you should do too.
So you keep a persistent session of your password manager's database open and unencrypted instead? Why would you avoid keeping cookies that keep you logged in, but use a password manager that stays open and doesn't time out and lets you enter passwords with only one button? Reminds me of using LUKS1 with PBKDF2 and TPM to make it easy for authorities to bypass the encryption entirely, or if they don't have someone who knows how to do that, they could crack such a weakly encrypted password automatically in a few minutes without any technical knowledge anyway.
Image

(Erryone get logged out) Addressing login issue

Posted: March 7th, 2024, 00:34
by Decline
Analogue Dreams wrote: March 6th, 2024, 07:14
So you keep a persistent session of your password manager's database open and unencrypted instead?
No.
Why would you avoid keeping cookies that keep you logged in, but use a password manager that stays open and doesn't time out and lets you enter passwords with only one button?
Because it is convenient.
Reminds me of using LUKS1
Wrong/Invalid comparison.

Password managers exist for using different passwords across multiple sites, so the leak of one website's DB does not cause your account to be taken over on another website. The local state of the encryption (if there's even one) is completely secondary to the password managers main purpose.

Please be dumb somewhere else.

(Erryone get logged out) Addressing login issue

Posted: March 7th, 2024, 00:45
by Decline
rusty_shackleford wrote: March 6th, 2024, 08:21
Analogue Dreams wrote: March 6th, 2024, 07:14
Decline wrote: March 5th, 2024, 23:59
I never persist the session (aka I always login) which amounts to one button press when opening this site, because I use a proper password manager.

And you should do too.
So you keep a persistent session of your password manager's database open and unencrypted instead? Why would you avoid keeping cookies that keep you logged in, but use a password manager that stays open and doesn't time out and lets you enter passwords with only one button? Reminds me of using LUKS1 with PBKDF2 and TPM to make it easy for authorities to bypass the encryption entirely, or if they don't have someone who knows how to do that, they could crack such a weakly encrypted password automatically in a few minutes without any technical knowledge anyway.
Image
Full disk encryption protects against accidental discard of sensitive information, which is a common occurrence in organizations.

(Erryone get logged out) Addressing login issue

Posted: March 8th, 2024, 03:17
by Ranselknulf
rusty_shackleford wrote: March 6th, 2024, 08:21
Analogue Dreams wrote: March 6th, 2024, 07:14
Decline wrote: March 5th, 2024, 23:59
I never persist the session (aka I always login) which amounts to one button press when opening this site, because I use a proper password manager.

And you should do too.
So you keep a persistent session of your password manager's database open and unencrypted instead? Why would you avoid keeping cookies that keep you logged in, but use a password manager that stays open and doesn't time out and lets you enter passwords with only one button? Reminds me of using LUKS1 with PBKDF2 and TPM to make it easy for authorities to bypass the encryption entirely, or if they don't have someone who knows how to do that, they could crack such a weakly encrypted password automatically in a few minutes without any technical knowledge anyway.
Image
Jokes on them. My laptop is encrypted with a biometric dick print reader.

If they want to forcibly take my password, then they'll have to grab my penis.

(Erryone get logged out) Addressing login issue

Posted: March 10th, 2024, 08:21
by krokodil
>one time