icculus.org news
https://icculus.org/
https://icculus.org/news/news.phpnews from icculus.org: the open source incubatorSun, 17 Mar 2024 11:17:03 -0400icculus.org newshttps://icculus.org/icculus-org-now.png
https://icculus.org/
IPv6 support!
https://icculus.org/news/news.php?id=4684
icculus146842015-10-30 03:42:19Fri, 30 Oct 2015 03:42:19 -0400127.0.0.110
<p>If your connection has IPv6 support, you are likely talking to icculus.org over the new protocol instead of old, crusty IPv4.</p>
<p>If you aren't sure, one can always force the issue with <a href="https://ipv6.icculus.org/">ipv6.icculus.org</a> ... if the page loads at all, congrats, you've got IPv6.</p>
<p>We're still migrating bits and pieces of the system over, so please <a href="javascript:location.href='mailto:'+String.fromCharCode(105,99,99,117,108,117,115,64,105,99,99,117,108,117,115,46,111,114,103)+'?subject=icculus.org%20IPv6%20Feedback'">let me know</a> if something is broken.</p>
Two-factor auth
https://icculus.org/news/news.php?id=4673
icculus146732014-09-17 11:30:24Wed, 17 Sep 2014 11:30:24 -0400127.0.0.110
<img src="/~icculus/dotplan/googleauth.png" align="right" />
<p>
Icculus.org now supports two-factor authentication via Google Authenticator. Both ssh logins and webmail can be protected by this extra layer of security.
<p>
The system is opt-in. By default, nothing changes for you, but we encourage you to enable two-factor auth wherever you are able. To set it up:
<p>
<ol>
<li> Install Google Authenticator on your trusted device (namely: your smart phone). You can get it for lots of platforms (and the source code if you get desperate). The <a href="http://en.wikipedia.org/wiki/Google_Authenticator">Wikipedia page</a> has links to all that and more technical details, too.
<li> ssh to your icculus.org account, and run "google-authenticator". It will ask you something about time-based authentication tokens. Say "y" here. It will spit out a big ASCII QR code on your terminal. Scan this on your phone with the Google Authenticator app. There are a few more questions from google-authenticator, answer them however you feel is reasonable.
<li> That's all.
</ol>
<p>
Now when you ssh to your icculus.org shell account, you will be prompted for your password _and_ the current code from your Google Authenticator app, which changes every 30 seconds. Please note that if you have a valid private key configured, you will not be prompted for either a password or two-factor code, so that route will continue to work as expected, for automated logins, etc.
<p>
Webmail can also be protected:
<p>
<ol>
<li><a href="https://mail.icculus.org/">Login to your account</a>.
<li> Click the settings button in the top right, where you'll see a "2steps Google verification"
<li> Click the "Activate" checkbox.
<li> Either fill in your secret key from the ssh account, or make a new one and get your QR code.
<li> Optionally fill in recovery keys (or use the same ones from your shell account).
<li> Click "save"
<li> Fill in your current code from your phone and click "Check code" to make sure it's working.
<li> That's all.
</ol>
<p>
Next time you log into webmail with a valid password, you'll also be prompted for the current code from your smart phone before you can log in. Please note that IMAP and SMTP are not protected by 2-factor auth at this time, nor do we offer "app-specific passwords" at the moment.
<p>
<b>Also, a gentle reminder: two-factor auth is powerful stuff, but you should also use strong, unique passwords everywhere. Using a password manager like <a href="https://agilebits.com/onepassword">1Password</a> or <a href="http://keepass.info/">KeePass</a> or <a href="https://lastpass.com/">LastPass</a> (etc!) is important in modern times.</b>
<p>
Heartbleed status
https://icculus.org/news/news.php?id=4665
icculus146652014-04-15 13:34:22Tue, 15 Apr 2014 13:34:22 -0400127.0.0.110
<img src="/~icculus/dotplan/heartbleed.png" align="right" />
<p>
icculus.org uses OpenSSL, and was vulnerable to the <a href="https://heartbleed.com/">Heartbleed exploit</a> since we migrated to Ubuntu 12.10 on January 20th, 2013.
<p>
In the past few days, we have patched the security hole, revoked our existing SSL certificate, and installed a new certificate.
<p>
We don't have reason to believe Heartbleed was ever exploited on our servers, but the problem with Heartbleed is that there's never any indication that it was, either. If you have a shell account on icculus.org, or any personal/sensitive data on any service of icculus.org, like revision control or Bugzilla, you should consider changing your password.
<p>
If you have any problems or questions, or see anything that looks suspicious, please <a href="mailto:icculus@icculus.org">email Ryan</a> ASAP.
<p>
Thanks!
PhysicsFS 2.0.3 released!
https://icculus.org/news/news.php?id=4649
icculus146492012-10-23 00:21:41Tue, 23 Oct 2012 00:21:41 -0400127.0.0.110
<p>
The details are <a href="http://icculus.org/pipermail/physfs/2012-October/001056.html">here</a>.
<br/>
iodoom3 and GtkRadiant
https://icculus.org/news/news.php?id=4634
icculus146342011-11-27 19:47:16Sun, 27 Nov 2011 19:47:16 -0500127.0.0.110
<p>
This has been a very idTech week around here.
<p>
First up: <a href="http://en.wikipedia.org/wiki/GtkRadiant">GtkRadiant</a> has moved to icculus.org! You can find its Subversion repository <a href="http://svn.icculus.org/gtkradiant/">here</a>, and the mailing list <a href="http://icculus.org/mailman/listinfo/gtkradiant">here</a>.
<p>
You can pull from the Subversion repository with the svn:// protocol:
<p>
<code>svn co svn://svn.icculus.org/gtkradiant/GtkRadiant/trunk GtkRadiant</code>
<p>
We're still restoring some bits of functionality, such as the Trac website from the old server. This will be up and running soon.
<p>
Also this week: Doom 3 (aka "idTech 4") is now licensed under the GPL3. To match our work on Quake 3, which we affectionately refer to as "ioquake3", we've now set up iodoom3. You can see the start of our efforts over at <a href="http://www.iodoom3.org/">iodoom3.org</a>.
<p>
Thanks to everyone at id Software for their continued support of Free Software. We all look forward to a great holiday season, full of hacking on idTech!
<p>