Time |
Nick |
Message |
00:01 |
|
Extex joined #minetest |
00:13 |
|
illwieckz joined #minetest |
00:20 |
independent56 |
I have finally got a navigational sidebar for my rapidly growing server wiki. Should help navigation |
00:44 |
|
detrout joined #minetest |
00:51 |
|
detrout joined #minetest |
01:09 |
jonadab |
rubenwardy: Maybe have a look at this patch, which seems to have fixed the crash bugs for me, or at least the most common ones. https://termbin.com/amae |
01:10 |
jonadab |
My lua skills are terrible, so feel free to view that as a starting point or whatever. |
01:13 |
jonadab |
mazes_81: You also might be interested ^ |
01:14 |
jonadab |
Since you were expressing interest in the pipeworks autocrafter group: recipe support patch the other day; this one is meant to be applied after that one, to fix crashes. |
01:16 |
Noclip[m] |
Which group do I need to add a node to so that it can only be destroyed in creative mode but not in survival? |
01:16 |
Noclip[m] |
Is there group for it or would I need to make such a group myself? |
01:19 |
|
detrout joined #minetest |
01:27 |
MTDiscord |
<Warr1024> I believe last I checked neither NodeCore nor MTG had such a group. NodeCore does have an admin item that can unconditionally pick up any node that can be pointed at; devtest is likely to have something very similar. |
01:29 |
|
independent56 joined #minetest |
01:29 |
jonadab |
I think you have to take account for all the different ways nodes can be destroyed in your game/modpack. |
01:30 |
jonadab |
For example, if you have digtron, you have to make sure digtron can't remove it. |
01:31 |
Noclip[m] |
Well, I mainly wanted to know if such a group already exists. |
01:31 |
jonadab |
If you have TNT, you have to make sure TNT can't blow it up. |
01:31 |
jonadab |
I don't think there's a generic "can't be destroyed in any way" group, no. |
01:31 |
Noclip[m] |
As it doesn't exist I will probably just add it to another group. |
01:32 |
jonadab |
I assume you either don't have WorldEdit or would consider it equivalent to creative mode. Otherwise, you'd have to look at that too. |
01:32 |
jonadab |
And I don't even know if it's possible for a node to block we. |
01:32 |
MTDiscord |
<Warr1024> In NodeCore nodes should be indestructible if they don't have any dig groups, and mods that fail to respect that are basically bugged. |
01:33 |
MTDiscord |
<Warr1024> World edit would fall under the "removed by admin" case tho |
01:33 |
jonadab |
Fair. |
01:33 |
jonadab |
Personally I consider WE tantamount to creative. |
01:34 |
jonadab |
It's amazingly useful for testing changes to mods, though. |
01:34 |
MTDiscord |
<Warr1024> Basically each game can establish conventions around destructibility, and mods are technically always able to bypass those.. m |
01:34 |
jonadab |
Yeah, you really have to know which mods you have. |
01:34 |
Noclip[m] |
I added a node in MTG and because I didn't add it to a dig group it's indestructible, too. So I wondered if there would be a group that makes it only destructable for creative mode. But it's not really important in the long run, I'm just playing around a bit. |
01:35 |
jonadab |
Oh, just add a type of tool that has no crafting recipe, and can remove the node. |
01:35 |
jonadab |
Then it requires creative or admin privs (like /give) |
01:35 |
MTDiscord |
<Warr1024> You could create a tool only creative mode players could access with a custom group, or you could just add an on_punch callback that checks for creative mode privs or something... Lots of ways, no really clear convention I know of. |
01:36 |
jonadab |
Or that, yeah. |
01:36 |
jonadab |
Though I think checking for creative mode requires 5.x |
01:37 |
MTDiscord |
<Warr1024> Could be ... but pre-5.x MT is basically pretty dead here now ... using it at all could really be considered like a fork by this point, it's diverged so much. |
01:38 |
MTDiscord |
<Warr1024> It's been so long since I dropped all 0.4.x support for all my stuff... |
01:40 |
MTDiscord |
<Warr1024> Actually, creative mode being a 5.x thing is a builtin thing, not an engine thing, right? That would mean games still have the power to manage that themselves. |
01:41 |
|
detrout joined #minetest |
01:43 |
Noclip[m] |
I think creative mode isn't implemented in the engine, yea. |
01:44 |
Noclip[m] |
The engine just provides a checkbox in the menu to select creative mode if available. |
01:44 |
MTDiscord |
<Warr1024> Ripping it out for me only required overriding one function in builtin, and finding it accidentally enabled only actually affected one thing, so I suspect it's really mostly in builtin ... |
01:45 |
MTDiscord |
<Warr1024> In 5.5 that checkbox can be hidden ? |
01:45 |
Noclip[m] |
Cool! |
01:45 |
MTDiscord |
<Warr1024> But adding new checkboxes for different game features is still in the whiteboarding phase... |
01:46 |
Noclip[m] |
Nahh, I don't like the checkbox thing anyways. |
01:46 |
Noclip[m] |
That's not how you should configure game based stuff! |
01:46 |
Noclip[m] |
game based stuff should be configured through privs and commands. |
01:48 |
Noclip[m] |
One serious issue with the creative and damage checkboxes is that it makes both settings a global thing and can only be changed on server restart. |
01:49 |
Noclip[m] |
Unlike Minecraft you cannot set damage and creative mode per player and you can't change it while the game is running. |
01:49 |
Noclip[m] |
Of course as a dev you can solve that issue through modding but that shouldn't be needed in the first place. |
01:51 |
Noclip[m] |
There should be a priv and a command to change creative and damage on a running server per player. |
01:57 |
|
Hawk777 joined #minetest |
01:58 |
jonadab |
game-based stuff should be configured through minetest.conf mainly, with privs and commands secondarily. |
01:59 |
jonadab |
But yes, anything you need to change on a per-player basis obviously should be a priv. |
02:00 |
Noclip[m] |
Everything that the user might want to configure while the game is running should be configurable through privs and commands. |
02:01 |
Noclip[m] |
jonadab: Privs aren't always enough: You might not want to give a player creative but instead give them access to a command which they can then use to change their mode when ever they like to do so. |
02:01 |
jonadab |
Noclip[m]: So you have a command that only works if you have a given priv. |
02:01 |
jonadab |
Like /teleport |
02:01 |
Noclip[m] |
Exactly |
02:02 |
Noclip[m] |
Or you use two privs where on privs allows them to change the other priv. |
02:02 |
jonadab |
I suppose. |
02:02 |
Noclip[m] |
Or is this not possible? |
02:03 |
jonadab |
Probably? |
02:03 |
Noclip[m] |
It should at least be possible through a new command but that would kind of defeat the purpose of a second priv. |
02:04 |
|
riff-IRC joined #minetest |
02:18 |
jonadab |
I mean, make the initial priv allow using a key binding to toggle something, like fly does. |
02:20 |
|
detrout joined #minetest |
02:20 |
MTDiscord |
<Warr1024> The problem with configuring things in minetest.conf is that there's only one for all worlds, and SP is a thing. General world-specific config would help a lot. |
02:20 |
MTDiscord |
<Warr1024> I think there are proposals out there to clean up some config handling stuff like that, but I forget specifics. |
02:25 |
Noclip[m] |
Yea, that's another big issue with it. |
02:26 |
|
queria joined #minetest |
02:26 |
Noclip[m] |
As we don't have world-specific configs yet I'd say mod and game makers should avoid using minetest.conf as much as they can. |
02:27 |
Noclip[m] |
Either use commands and privs for configuration or read configs from a file within the world folder. |
02:30 |
|
queria joined #minetest |
02:31 |
MTDiscord |
<Warr1024> minetest.conf stuff can be okay for play style tweaks, or emergency things that you might only use temporarily, or things only relevant to dedicated servers that pretty much always have their own config. |
02:32 |
|
detrout joined #minetest |
02:32 |
MTDiscord |
<Warr1024> Other than that, player or mod meta is a good place to store in-game state stuff that doesn't already fit privs. |
02:56 |
|
detrout joined #minetest |
03:06 |
|
detrout joined #minetest |
03:31 |
|
detrout joined #minetest |
04:00 |
|
MTDiscord joined #minetest |
04:16 |
|
Alias joined #minetest |
05:01 |
|
riff-IRC joined #minetest |
05:33 |
|
reumeth joined #minetest |
06:09 |
|
CWz joined #minetest |
06:14 |
|
Flabb joined #minetest |
06:47 |
|
riff-IRC joined #minetest |
07:57 |
|
frostsnow joined #minetest |
08:00 |
|
simon816 joined #minetest |
08:01 |
|
specing_ joined #minetest |
08:08 |
|
absurb joined #minetest |
08:18 |
|
independent56 joined #minetest |
08:21 |
|
independent56 joined #minetest |
08:27 |
|
independent56 joined #minetest |
08:28 |
|
independent56 joined #minetest |
08:36 |
erlehmann |
<Noclip[m]> Which group do I need to add a node to so that it can only be destroyed in creative mode but not in survival? |
08:36 |
erlehmann |
haha bedrock destruction goes brrrrrr |
09:05 |
|
mdk joined #minetest |
09:19 |
MinetestBot |
[git] nerzhul -> minetest/minetest: Add debian 11 to Gitlab-CI (#11571) a7188bd https://git.io/JEzUq (2021-08-27T09:19:15Z) |
09:45 |
|
Talkless joined #minetest |
10:02 |
|
Tusha joined #minetest |
10:04 |
|
calcul0n_ joined #minetest |
10:11 |
|
independent56 joined #minetest |
10:15 |
|
independent56 joined #minetest |
10:37 |
|
Tusha joined #minetest |
10:38 |
|
independent56 joined #minetest |
10:44 |
|
independent56 joined #minetest |
10:49 |
|
Guest40 joined #minetest |
10:59 |
|
calcul0n__ joined #minetest |
11:04 |
independent56 |
Lets say someone SSH'd into my server and did a rm -r ~ as a joke. I was not aware, nor did i permiss this acion. Would this be legal ground for some punishment under the computer misue act? |
11:05 |
independent56 |
it is unauthorised access and destroys valuble data |
11:06 |
Tusha |
I would say that depending where you live, it could be at least a civil illicit act |
11:07 |
independent56 |
I live in the uk, thus my mention of the computer misuse act. What laws does the criminal follow? do they get imprisioned by britishofficers or law or officers of law of their home country or officers of law of the country they're in> |
11:07 |
Tusha |
As long as you can give evidence to the authorities and let them investigate the case, and that they want to take it seriously, but as far as I know, getting into other's computer wihout permission usually can be considered a crime |
11:08 |
Tusha |
It all depends from where the attack came from |
11:08 |
Tusha |
If it is international maybe interpol can act |
11:08 |
Tusha |
All depends on how the authorities treat the case though |
11:09 |
independent56 |
Is reading my sister's browsing history considered a crime? it facilitates unauthorised access. |
11:10 |
Tusha |
Again, I guess it would depend on the country, doesn't the uk has a site with info about those things? I would say it could constitute a privacy attack, if the user didn't had permission to do |
11:11 |
Tusha |
to do so*, although it can always be interpreted by a lawyer, like if she left the computer on and logged-in, that could imply a granted permission |
11:12 |
independent56 |
it does |
11:12 |
Tusha |
But I would consult an expert, all this is comes from police-based series and I doubt it can hold to real-life cases |
11:12 |
independent56 |
ha |
11:13 |
independent56 |
"it does" refer to the governemnt having a site |
11:13 |
Tusha |
I see, I would ask there then, maybe they can guide you |
11:13 |
independent56 |
https://www.legislation.gov.uk/ukpga/1990/18/crossheading/computer-misuse-offences |
11:13 |
independent56 |
I have a unambiguous text here |
11:14 |
Tusha |
All I know about UK law is that they don't let you have strong encryption, which I feel is lame |
11:16 |
independent56 |
Citation needed |
11:19 |
Tusha |
Indeed, I may have understood it, can't find where I found it, but it seems more like a government intention and not actual law, for what I'm finding so far |
11:22 |
Tusha |
https://en.wikipedia.org/wiki/Encryption_ban_proposal_in_the_United_Kingdom |
11:24 |
Tusha |
https://techcrunch.com/2021/06/30/uk-tells-messaging-apps-not-to-use-e2e-encryption-for-kids-accounts |
11:24 |
Tusha |
Can't find the actual place where I saw that info in the first place, sadly |
11:36 |
|
Guest5224 joined #minetest |
11:36 |
independent56 |
hmm |
11:37 |
independent56 |
it hasn't acted yet. until protonmail stops working,it hasn't |
11:37 |
independent56 |
It's a horrible idea, and ideas like thisis why we use democracies. |
11:41 |
Tusha |
Indeed |
11:41 |
Tusha |
And yeah, reading this: https://www.gp-digital.org/world-map-of-encryption/ I rememered what I read |
11:42 |
Tusha |
It is that if you have evidence encripted, and it makes you guilty, you are forced by law to unencrypt it to the authorities |
11:43 |
|
longerstaff13 joined #minetest |
11:43 |
Tusha |
Maybe I could have phrased it better, but the thing is, you must de-crypt all info if asked by law, even if doing so creates evidence against you |
11:43 |
independent56 |
Well, my evidence will be in the form of system logs, so i can see why an attacker would like to remove them. |
11:44 |
Guest5224 |
wiki.minetest.net SEC_ERROR_EXPIRED_CERTIFICATE 2021-08-11 |
11:44 |
Tusha |
I guess this is why veracrypt has plausible denyability which makes you be able to have dual partitions in the file depending on password given |
11:44 |
Tusha |
They got deleted? |
11:45 |
Tusha |
There are some linux distros that let you recover files though |
11:45 |
independent56 |
Guest5224, yeah cirtificate has been expired for months and nobody has fixed it. |
11:45 |
independent56 |
i hope there is software for that, as i use the fringe bodhi linux |
11:46 |
independent56 |
And they aren't deleted. they are a tapestry of my server. |
11:46 |
Tusha |
Who could fix it? I mean, anyone with admin access to the web server could create a cronjob with a certbot nowdays, even I managed to do that xD... |
11:46 |
Guest5224 |
letsencrypt is widely used for this. https://letsencrypt.org/ |
11:47 |
sfan5 |
independent56: 2021-08-11 is less than three weeks ago |
11:47 |
Tusha |
independent56 Just unmount the drive and mount in read only so it isn't altered and files aren't overwritten |
11:47 |
sfan5 |
in any case we're aware on it and a fix is being worked on |
11:48 |
independent56 |
sfan5, Feels like months |
11:48 |
independent56 |
Tusha, good idea. |
11:48 |
independent56 |
I also create daily backups copied to my main computer |
11:49 |
Tusha |
Well, you may then just restore the backup and save the hassle of recovering the data, which can be a pita |
11:49 |
Tusha |
sfan5 nice to know you are working on it :) |
11:50 |
independent56 |
That's what the backups are for. I hope i can get a cut of the fine if they get such a low punishment. |
11:51 |
Tusha |
Just keep everything untouched if you plan to ask for compensation, as they may need the evidence |
11:52 |
independent56 |
yeah, but how do i serve the evidence? ssh access? |
11:52 |
Tusha |
Dang can't find the article that introduced me to ddrescue |
11:52 |
independent56 |
entire computer transfer? |
11:52 |
Tusha |
Maybe they need physical access to the harddrive |
11:52 |
Tusha |
I don't know as I never saw how law operates in those cases |
11:53 |
Tusha |
Just common sense kicking-in about having stuff as untampered as possible |
11:53 |
independent56 |
ah yeah |
11:53 |
Tusha |
So you can't be accused of manipulating it |
11:54 |
independent56 |
it would be impossible to login with a removed home directory ( i oncedid that on a vm and it was funny) |
11:54 |
sfan5 |
Tusha: well not literally me, I don't host the wiki |
11:55 |
Tusha |
independent56, Interesting, never tried that |
11:56 |
independent56 |
In actuality, i used the same hardware as the server, but it was a minimal installtion, meant for writing on a usb. So my data was fine, the computer wasn't. Ihad to reinstall bodhi |
11:58 |
|
proller joined #minetest |
12:00 |
Tusha |
I think there are ways to rebuild the home directory, from adduser I think (or however the command is called) |
12:03 |
Tusha |
If you want forensic distros (just searched now) last I used for data recovery was CAINE, although it is a bit bloated, also ParrotOS should help |
12:21 |
sfan5 |
By some unscientific log parsing I have determined that most of the Minetest players who use Windows are on Windows 10 20H1 (65%) |
12:21 |
sfan5 |
second biggest group is on Windows 7 SP1 (which is EOL), third biggest on Windows 10 19H1 (which is also EOL) |
12:22 |
Tusha |
I win (no pun intended) as I'm in 1607 |
12:22 |
Tusha |
win10 that is |
12:22 |
sfan5 |
that's the 9th largest group |
12:27 |
|
independent56 joined #minetest |
12:33 |
erlehmann |
independent56 regarding the computer misuse act, you should know that what will be considered a crime by the authorities usually depends on who does it. it is not just about the letter of the law, but about who is inconvenienced. |
12:33 |
independent56 |
oh god... what about me? how would i be treated? |
12:34 |
erlehmann |
independent56 if a police person does something that *might* be seen as a crime, they are much less likely to be punished than, say, a journalist or some random person not in a position of power. |
12:35 |
erlehmann |
independent56 on the contrary, normal people can be punished for stuff that might not even be reasonably considered a crime if they inconvenience the authorities. |
12:36 |
|
independent56 joined #minetest |
12:38 |
erlehmann |
independent56 for specific legal advice i would always advise you to ask a lawyer. not only are they professionals, usually lawyer-client communication is protected (in theory) by the law as well. |
12:39 |
independent56 |
oh |
12:39 |
independent56 |
well crap |
12:40 |
erlehmann |
only trust your fists, police will never help you! |
12:40 |
erlehmann |
(that's a quote from a video game) |
12:42 |
erlehmann |
https://nitter.snopyta.org/Foone/status/1002735322948440064#m |
12:43 |
erlehmann |
nah, it's not a quote from a video game after all |
12:59 |
|
kamdard joined #minetest |
13:39 |
MTDiscord |
<MisterE> why does this cause a segfault? |
13:39 |
MTDiscord |
<MisterE> -- on_place = function(itemstack, placer, pointed_thing) -- if pointed_thing.type == "node" then -- local pos = pointed_thing.above -- minetest.set_node(pos , {name="mesewars:stone"}) -- local inv = placer:get_inventory() -- inv:remove_item("main", "mesewars:stone") -- end -- end, -- on_dig = function(pos, node, digger) -- local wielded = digger |
13:39 |
MTDiscord |
and digger:get_wielded_item() -- local drops = minetest.get_node_drops(node, wielded and wielded:get_name()) -- minetest.handle_node_drops(pos, drops, digger) -- minetest.dig_node(pos) -- end, |
13:40 |
MTDiscord |
<MisterE> the on_dig |
13:41 |
sfan5 |
doesn't dig_node call on_dig itself? |
13:42 |
MTDiscord |
<MisterE> I want to bypass protection |
13:42 |
MTDiscord |
<MisterE> I guess I should do that by modifying minetest.is_protected |
13:43 |
sfan5 |
uh what |
13:43 |
sfan5 |
just call remove_node?! |
13:44 |
MTDiscord |
<MisterE> I also want to give the player the node |
13:44 |
MTDiscord |
<MisterE> oh, instead of dignode |
13:50 |
sfan5 |
on_dig does not get called when protection kicks in |
13:50 |
sfan5 |
so your approach is indeed wrong |
13:53 |
|
Splyncryth_ joined #minetest |
13:54 |
|
Fixer joined #minetest |
13:54 |
|
olliy1or joined #minetest |
14:03 |
|
Verticen joined #minetest |
14:47 |
|
queria joined #minetest |
14:56 |
|
Guest71 joined #minetest |
14:59 |
|
Extex joined #minetest |
15:02 |
Noclip[m] |
independent56: Your IT security shouldn't rely on law enforcement, that's a very dumb strategy to begin with! |
15:03 |
independent56 |
Ha, yeah, probably |
15:06 |
Noclip[m] |
You probably want to be able to get full root access through SSH so sandboxing isn't really an option here. Make sure that SSH itself is setup in a very secure way. |
15:06 |
Noclip[m] |
If possible use only public key login and disable password based login in the SSH config. |
15:08 |
|
independent56 joined #minetest |
15:09 |
Noclip[m] |
independent56: Those are my default config optimizations for the SSH server:... (full message at https://libera.ems.host/_matrix/media/r0/download/libera.chat/09b0adddca56e9fac88c0b8f5b08f67e8cfccb86) |
15:10 |
Noclip[m] |
Make sure that you setup public key authentication before you make those changes otherwise you won't be able to login to your server through ssh anymore! |
15:10 |
independent56 |
thanks.... >:-) |
15:11 |
|
longerstaff13 joined #minetest |
15:11 |
independent56 |
wait why i get error "invalid user"? |
15:12 |
|
independent56 joined #minetest |
15:12 |
Noclip[m] |
independent56: Also setup a firewall and allow incoming traffic only for those ports where you really need it. (For example the ports for ssh and minetest.) |
15:13 |
Noclip[m] |
independent56: "wait why i get error "invalid user"?" |
15:13 |
Noclip[m] |
-> Not sure what you did there. |
15:14 |
Noclip[m] |
Because of "PermitRootLogin no" you cannot login as root anymore. You will need to first login to another user and then elevate privs from within that user account. |
15:15 |
independent56 |
hmm |
15:15 |
independent56 |
andwhat i did was joking |
15:15 |
independent56 |
(pronounced "joe-king") |
15:16 |
|
Guest71 left #minetest |
15:17 |
|
Hawk777 joined #minetest |
15:18 |
Noclip[m] |
independent56: Also do not run the minetest server with root privs, it really doesn't need them! |
15:18 |
independent56 |
i never do |
15:18 |
independent56 |
(i never did) |
15:19 |
Noclip[m] |
Good! If you want some additional security for the mintest server you should run it either inside a sandbox or a virtual machine. |
15:20 |
Noclip[m] |
Unless your server has a lot of unneeded power a virtual machine is probably a bit overkill. |
15:20 |
Noclip[m] |
A sandbox on the other hand is less secure but has pretty much no overhead at all so you won't lose any performance. |
15:22 |
Noclip[m] |
independent56: For sandboxing you could use firejail, bubblewrap or minijail. |
15:22 |
independent56 |
too much effort |
15:22 |
independent56 |
for such a weak thing. |
15:26 |
Noclip[m] |
independent56: Well if someone finds a zero-day exploit in minetest they might be able to run arbitrary code as the user which started the minetest server. Depending on your security setup they might be able to work their way up to root then. With root they would then have full control over the operating system. |
15:26 |
independent56 |
ahrgh! |
15:27 |
independent56 |
and that's why backup is so important |
15:27 |
Noclip[m] |
It wouldn't surprise me if finding such a zero-day in minetest would be fairly easy. |
15:30 |
Noclip[m] |
independent56: Is there any sensitive/private data on your server which could get you in trouble if someone would publish it? |
15:31 |
independent56 |
erm... give me some examples to jog my memeory. I certainly do not keep my 0x volumes, exhaustive reruns of my life, showing off my absolute shittiness. |
15:31 |
independent56 |
... on the server |
15:31 |
Noclip[m] |
Backups do not protect you against data theft! |
15:34 |
MinetestBot |
[git] sfan5 -> minetest/minetestmapper: Modernize CMake build script 8b563f4 https://git.io/JEggc (2021-08-27T15:30:42Z) |
15:34 |
MinetestBot |
[git] sfan5 -> minetest/minetestmapper: Switch from Travis-CI to Github Actions f26070e https://git.io/JEggW (2021-08-27T14:56:24Z) |
15:34 |
Noclip[m] |
independent56: Examples for sensitive data would be for example pictures of yourself or your family, data that can be used to identify you or official documents like your ID, drivers license or certificates. |
15:35 |
independent56 |
Oh yeah, that. Darn... i will need to take a minute to think. |
15:36 |
Noclip[m] |
Especially those official documents would be a serious threat as they can be used for identity theft! |
15:38 |
Noclip[m] |
independent56: You should delete any sensitive data from the server which doesn't need to be there. (Of course you should do that in such a way that it can't be recovered anymore.) |
15:38 |
independent56 |
90% sure there is no sensitive information |
15:39 |
independent56 |
Not even my name, Vitra is over there |
15:40 |
Noclip[m] |
independent56: You should check that just to be sure. If there is really no sensitive data on the server then relying on backups might be okay. |
15:41 |
independent56 |
But i might as well put my name on the wiki, for vertification purposes |
15:41 |
Noclip[m] |
(Of course you should have backups anyways, you often just need some additional protections.) |
15:42 |
Noclip[m] |
independent56: That's your decision. If it's just for verification you could probably use a public key instead. |
15:42 |
independent56 |
hmm |
15:44 |
Noclip[m] |
As long as you don't lose the private key and keep it secret that should actually be the best verification method available today. |
15:44 |
independent56 |
hmm |
15:47 |
Noclip[m] |
independent56: public key cryptography seems to be uncrackable without quantum computers from the future. |
15:48 |
independent56 |
i mean like on other parts of the web "oh yeah, vitra made an account here, he owns his own wiki" |
15:48 |
Noclip[m] |
"he owns his own wiki" lul |
15:50 |
Noclip[m] |
independent56: You could make a new account on a platform and then sign a message with your private key to prove that the message is from you. |
15:52 |
independent56 |
I might as well make fake personal details |
15:52 |
independent56 |
and fake incriminating evidence. |
15:52 |
independent56 |
To deter deeper efforts |
15:54 |
Noclip[m] |
Unlike public key cryptography those fake details could be faked again by others fairly easy. |
15:54 |
Noclip[m] |
And isn't the point of verification that no one can fake it? |
15:55 |
independent56 |
meh |
16:06 |
Noclip[m] |
I will probably be offline for now, bye. |
16:13 |
Hawk777 |
Hmm, the problem with the “verify via signed message” thing is that, if you lose the private key, you can’t verify; if you verify via personal details, you likely still have those. And if you say, well, back up your private key, I say, if you have good backups, you won’t lose the original password that you were trying to recover anyway, because you’ll back up your machine regularly (with your password manager database on |
16:13 |
Hawk777 |
and have a way to access those backups later. |
16:27 |
|
garywhite joined #minetest |
16:27 |
|
garywhite joined #minetest |
16:46 |
|
Verticen joined #minetest |
17:08 |
Noclip[m] |
Hawk777: Normal passwords are far easier to steal and fake than a private key. |
17:08 |
independent56 |
i do. I copy them using SCP to my main every day |
17:08 |
independent56 |
It really helps |
17:10 |
Hawk777 |
It depends on what your goal is. If you’re talking about using private keys instead of passwords as an everyday login system, great; they are definitely superior in lots of ways (but also useless for most services, since when’s the last time you saw a website that uses a private key to log in? really only useful for SSH and a few other things). If you’re talking about using them as an account recovery mechanism, for when you |
17:10 |
Hawk777 |
your normal credentials, that’s what I was talking about—might as well just back up your passwords instead of your private key, and then you won’t lose them in the first place. |
17:10 |
Noclip[m] |
Hawk777: And if you use something like a hardware key with fido to store and use your private key then stealing them should be pretty much impossible without also stealing the hardware key as the private key should never leave the hardware key. |
17:11 |
Hawk777 |
This is true, if you have one of those, though the question then becomes, what do you do when the hardware breaks? You obviously can’t have backed up the key because the point is that it’s nonexportable. |
17:13 |
Tusha |
Using a disposable usb extension could help with that, saving wearing from the hardware key |
17:13 |
Hawk777 |
Also, while avoiding credential theft is a nice property, it would be a good idea not to rely on it too much. After all, if I want to gain long-term access to your server (for example), I don’t have to steal your SSH private key. Assuming I’ve already broken into your desktop but I can’t access your private key (i.e. the security perimeter that the hardware key provides), I just wait until you SSH into your server, create a s |
17:13 |
Hawk777 |
d terminal session in the existing SSH connection, and use it to add my own key to your authorized_keys file. How often do you check that for extra lines being mysteriously added to it? |
17:14 |
Noclip[m] |
Hawk777: When I came up with public key cryptography I actually wasn't talking about website logins at all. I was talking about a method to prove your identity to other humans and not to a server. For server logins you have to rely of course on what the server offers you as login options. |
17:14 |
Hawk777 |
Oh yeah, it’s fine there. |
17:15 |
Hawk777 |
Tusha: Helps with some problems, but doesn’t really help if a lightning bolt comes through the USB cable and into the key, or if you drop it down a sewer grate, or if you get hit by a car and it’s in your pocket and gets crushed, or whatever. I’m still uncomfortable with critical things that can’t be backed up at all. |
17:16 |
Tusha |
Yeah non-predictable damage is still something to worry about Hawk777 |
17:17 |
Hawk777 |
Sadly, like everything, we can’t have our cake and eat it too. Either you make it really secure but vulnerable to loss, or you make it very redundantly backed up but easier to steal. |
17:17 |
Tusha |
The further thing I saw about backups was converting bineries to base64 and generate high failsafe qr codes and print them to backup the data |
17:17 |
Tusha |
binaries* |
17:19 |
Noclip[m] |
If for example I would have a Twitter account, Twitter would get hacked and someone would take over my account they could post messages with my account but they cannot sign them with my private key and thus can't prove that they are me. In the same scenario I could just create a new Twitter account, post a message which says that my account got taken over and sign it with my key to prove my identity. |
17:20 |
Hawk777 |
Yep. Which solves the problem for whatever percentage of your followers actually downloaded your public key and know how to use it to verify the message. I think that’s the sort of thing that keybase.io automates a bit, isn’t it? Posting signed attestations of mappings between keys and various online accounts? |
17:20 |
Noclip[m] |
Hawk777: I don't know that much about those hardware keys. Is there really no way to back them up? |
17:21 |
|
independent56 joined #minetest |
17:21 |
Hawk777 |
I don’t either; I don’t own one. I think some of them might have an “export PIN” or something that you can enter to export the key, and another PIN that you can enter to use the key without exporting it, but I’m not sure. And some might not allow exporting at all, or have the option to generate non-exportable keys. |
17:21 |
detrout |
Noclip[m], backing them up is considered a security vulnerability, the recommendation for backup is either have a couple of them or some other method to authenticate |
17:24 |
Noclip[m] |
detrout: So you generate the private key on a normal computer which is considered secure and then import it into all your hardware keys? |
17:24 |
detrout |
I think you can do that, though you can also generate private keys on the token itself |
17:24 |
|
proller joined #minetest |
17:25 |
Noclip[m] |
Hawk777: Isn't keybase just a alternative to Signal? Iirc Keybase uses proprietary server software. That's not really a security concern but not very nice either. |
17:26 |
detrout |
I thought keybase is a different product, it was trying to help connect identities to keys |
17:26 |
Noclip[m] |
detrout: Which you then cannot export and thus can't copy into other hardware keys, right? |
17:26 |
Hawk777 |
Maybe I’m thinking of something else, but I thought Keybase was (at least when it was first launched) a tool for automating things like posting a GPG-signed message on Twitter, Facebook, or whatever else, and verifying said messages from other people, to bind identities to keys. |
17:26 |
detrout |
signal was an IM system that had very convienent to use crypto setup. |
17:27 |
Noclip[m] |
detrout: Mhh, on their website it just says "End-to-end encryption for things that matter. Keybase is secure messaging and file-sharing." |
17:27 |
detrout |
huh apparently keybase branched out? https://keybase.io/ |
17:28 |
detrout |
wow they switched a long time ago |
17:29 |
detrout |
This is the keybase I'm remembering https://web.archive.org/web/20150209180753/https://keybase.io/ |
17:29 |
detrout |
but they had pivoted to messaging by 2018 |
17:29 |
Noclip[m] |
Interesting |
17:29 |
detrout |
and i don't care enough to trawl through archive.org to see when they changed |
17:34 |
celeron55_ |
interesting |
17:35 |
celeron55_ |
keybase has a blog that goes back man years, you can see what happened there https://keybase.io/blog |
17:35 |
celeron55_ |
many years* |
17:37 |
celeron55_ |
https://keybase.io/blog/keybase-chat |
17:37 |
celeron55_ |
this is where the chat was introduced |
17:37 |
celeron55_ |
that's 2017 |
17:40 |
celeron55_ |
i think their goal became "crypto for everyone" quite early and then they decided there's no other way forward than a messaging platform |
17:41 |
celeron55_ |
which makes sense |
17:42 |
celeron55_ |
messaging is the main use of crypto, and no existing messaging platform is going to take in your technology no matter how nice you make it |
17:42 |
celeron55_ |
especially if you have a business to run |
17:43 |
celeron55_ |
but then https://keybase.io/blog/keybase-joins-zoom |
17:44 |
celeron55_ |
zoom bought the entire thing, and i don't think any original user of keybase wants to use anything published by zoom |
17:44 |
detrout |
Eh... anyone sufficiently paranoid wasn't going to use keybase in the firstplace |
17:45 |
celeron55_ |
it was an interesting concept |
17:46 |
celeron55_ |
sadly zoom isn't going to use any of it, they just want keybase's capable team to work on their existing problems |
17:49 |
|
proller joined #minetest |
17:49 |
|
independent56 joined #minetest |
17:54 |
rubenwardy |
Keybase dev also died after zoom bought them |
17:54 |
rubenwardy |
Like, activity dropped right off |
17:57 |
|
delta23 joined #minetest |
18:03 |
celeron55_ |
obviously |
18:23 |
MinetestBot |
[git] Treer -> minetest/minetest: Add group-based tool filtering for node drops (#10141) 149d8fc https://git.io/JEgAS (2021-08-27T18:23:20Z) |
18:23 |
MinetestBot |
[git] Kalabasa -> minetest/minetest: Optimize vector length calculations (#11549) d36dca3 https://git.io/JEgA9 (2021-08-27T18:22:35Z) |
18:26 |
MinetestBot |
[git] NeroBurner -> minetest/minetest: Joystick sensitivity for player movement (#11262) 1d69a23 https://git.io/JEgxt (2021-08-27T18:24:24Z) |
18:45 |
|
Elzington_ joined #minetest |
18:55 |
MinetestBot |
[git] sfan5 -> minetest/minetestmapper: Add simple functional test to CI 5c435f6 https://git.io/JEgjb (2021-08-27T18:53:16Z) |
19:02 |
|
independent56 joined #minetest |
19:04 |
|
independent56 joined #minetest |
19:07 |
independent56 |
Are there times where you become at one with your computer, and end up waching time slip through your hands? |
19:08 |
MTDiscord |
<Noodlemire> Yes |
19:08 |
MTDiscord |
<Noodlemire> Usually when coding. |
19:12 |
independent56 |
I do it all the time, and then i stand up and i am all wibbly wobbly ebcause i spent 2 straight hours on the compuer |
19:13 |
MTDiscord |
<Noodlemire> Only 2? |
19:13 |
independent56 |
ha, soemtimes more |
19:13 |
independent56 |
At night i get too tired, so i end up looking at the clock again and again 1;45... 1:55... 2:05 |
19:14 |
Extex |
I'm using the one-line compiler |
19:14 |
Extex |
https://forum.minetest.net/viewtopic.php?f=42&t=26509 |
19:17 |
|
Extex joined #minetest |
19:19 |
Extex |
But when MT starts compiling it stops and says that IrrlichtMT isn't installed |
19:19 |
Extex |
"Irrlicht Mt is required to build the client, but it was not found." |
19:24 |
celeron55_ |
that guide is definitely outdated for the latest development version |
19:24 |
celeron55_ |
you'll need to take a look at the official readmes |
19:43 |
|
manjaro-user joined #minetest |
19:47 |
rubenwardy |
https://github.blog/2021-08-27-30-free-and-open-source-linux-games-part-3/ |
19:49 |
sfan5 |
neat |
19:55 |
specing |
Excellent, Microsoft Minetest |
19:55 |
celeron55_ |
wait do all of the games mentioned in that series of posts have their code on github |
19:55 |
specing |
Isn't that the point of a github blog post? |
19:56 |
celeron55_ |
well, not necessarily, but looks like it |
19:57 |
|
specing_ joined #minetest |
19:57 |
detrout |
that's a pretty good list of most of the best open source games |
20:01 |
celeron55_ |
what is interesting is that basically microsoft (under the name github) links to minetest and recommends it, while they have a commercial proprietary product to sell |
20:02 |
celeron55_ |
i mean, competing product |
20:02 |
MTDiscord |
<Warr1024> it's free advertising |
20:03 |
celeron55_ |
i don't think they have competing commercial products for any of the other games mentioned in that blog series unless you count games distributed in their app stores |
20:03 |
|
Elzington joined #minetest |
20:03 |
MTDiscord |
<Warr1024> people playing something that's basically perceived as "knock-off Minecraft" are people thinking about playing games a lot like Minecraft, such as, say, Minecraft. |
20:03 |
MTDiscord |
<GreenXenith> Minecraft isnt a competing product |
20:03 |
MTDiscord |
<GreenXenith> Theres no competition |
20:04 |
MTDiscord |
<Warr1024> heh, that's kinda true on a couple levels |
20:04 |
MTDiscord |
<GreenXenith> Yeah, and I meant it on a couple levels |
20:04 |
MTDiscord |
<GreenXenith> Two separate applications intended for separate purposes |
20:05 |
MTDiscord |
<GreenXenith> They just both happen to like blocks |
20:06 |
celeron55_ |
well in the eyes of the general public, it kind of is |
20:07 |
MTDiscord |
<GreenXenith> While that may be true, GitHub/Microsoft and its employees are not the general public |
20:07 |
MTDiscord |
<GreenXenith> Besides, some Minecraft devs have (and might still) played Minetest. If they understand the difference, who cares what everyone else thinks |
20:12 |
celeron55_ |
i can see it's the brand that's most valuable. it wouldn't even matter if minetest became very popular among technically minded people and was developed to some kind of killer product - if that happened, microsoft would literally just start distributing minetest re-branded as minecraft |
20:12 |
celeron55_ |
in reality, of course, not going to happen |
20:14 |
celeron55_ |
not that anyone a decade or two ago would have believed some of the stuff microsoft is doing these days |
20:14 |
detrout |
(Also never assume that large companies have consistent positions, there are always scores of different people or factions who can be in various levels of conflict) |
20:27 |
|
proller joined #minetest |
20:36 |
|
independent56 joined #minetest |
20:38 |
|
independent56 joined #minetest |
20:50 |
|
independent56 joined #minetest |
20:55 |
|
independent56 joined #minetest |
20:56 |
|
independent56 joined #minetest |
21:00 |
|
independent56 joined #minetest |
21:18 |
|
proller joined #minetest |
21:36 |
|
YuGiOhJCJ joined #minetest |
21:41 |
|
Talkless joined #minetest |
21:42 |
mazes_81 |
yes jonadab thumbs up, I'm interested in this new feature |
21:44 |
|
proller joined #minetest |
22:10 |
|
olliy joined #minetest |
22:17 |
|
independent56 joined #minetest |
22:34 |
|
z812 joined #minetest |
22:42 |
|
Verticen joined #minetest |
23:13 |
|
independent56 joined #minetest |
23:30 |
|
proller joined #minetest |
23:58 |
|
independent56 joined #minetest |
23:59 |
|
independent56 joined #minetest |