Last modified: 2014-09-24 00:04:10 UTC

Wikimedia Bugzilla is closed!

Wikimedia migrated from Bugzilla to Phabricator. Bug reports are handled in Wikimedia Phabricator.
This static website is read-only and for historical purposes. It is not possible to log in and except for displaying bug reports and their history, links might be broken. See T20981, the corresponding Phabricator task for complete and up-to-date bug report information.
Bug 18981 - Allow anonymising of IP editors
Allow anonymising of IP editors
Status: NEW
Product: MediaWiki
Classification: Unclassified
Page editing (Other open bugs)
unspecified
All All
: Low enhancement (vote)
: ---
Assigned To: Nobody - You can work on this!
http://lists.wikimedia.org/pipermail/...
: patch, patch-reviewed
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2009-05-28 08:56 UTC by p858snake
Modified: 2014-09-24 00:04 UTC (History)
8 users (show)

See Also:
Web browser: ---
Mobile Platform: ---
Assignee Huggle Beta Tester: ---


Attachments
mediawiki-1.15.0rc1-anonymize-v2.patch (1.40 KB, patch)
2009-05-28 10:19 UTC, Hanno Boeck
Details

Description p858snake 2009-05-28 08:56:48 UTC
Please allow true anonymous IP editing. Spilting this discussion from the mailing list so that the people may submit the patches.
Comment 1 Andrew Garrett 2009-05-28 08:58:28 UTC
Clarified bug summary.
Comment 2 Hanno Boeck 2009-05-28 10:19:57 UTC
Created attachment 6167 [details]
mediawiki-1.15.0rc1-anonymize-v2.patch
Comment 3 Andrew Garrett 2009-05-28 10:25:24 UTC
09:02 < flyingparchment> you can't just encrypt it, you need something cleverer
09:02 < flyingparchment> i suggest doing it how unreal ircd does it
09:02 < flyingparchment> you get a fake "IP" that looks like this: 32FFF7DC.3A716EB8.7D3F1A12
09:03 < flyingparchment> if you ban that, it's the same as one IP; if you ban 32FFF7DC.3A716EB8.*, it's like banning the /24, etc
09:03 < flyingparchment> that way you hide the ip, but you don't lose the administrative flexibility

I agree, too.

Also, your patches should be against trunk, not against 1.15-rc1.
Comment 4 Hanno Boeck 2009-05-29 09:34:40 UTC
Current patch applies also to trunk, I'll provide a new one if neccessarry.

About more intelligent solutions: Nothing against that, but it's not really trivial to do it in a sane way. Considering the sense of the whole thing is anonymity would require that also the administrator or someone else with administrative privileges is not able to find out the IP afterwards. So solutions with a fixed salt or something like that won't work.

But anyway, if someone wants to do such a thing, it wouldn't hurt imho to provide both options.
Comment 5 Alex Z. 2009-05-29 16:01:26 UTC
The problem is that this provides extra privacy at the expense of creating a major gap in security. You can no longer block abuse from individual IPs, you can only block every anon editor or none of them. You wouldn't be able to use the "autoblock" feature when blocking an account, because it would just block everyone. Given the option between this and just not allowing anon editing, I don't see why people wouldn't choose the latter, as this makes it virtually impossible to control abuse.

(In reply to comment #4)
> About more intelligent solutions: Nothing against that, but it's not really
> trivial to do it in a sane way. Considering the sense of the whole thing is
> anonymity would require that also the administrator or someone else with
> administrative privileges is not able to find out the IP afterwards. So
> solutions with a fixed salt or something like that won't work.

If you put the salt in the config file, then only people with access to the server could know it, and if you can't trust them, then you have bigger problems than this.
Comment 6 p858snake 2011-04-30 00:09:35 UTC
*Bulk BZ Change: +Patch to open bugs with patches attached that are missing the keyword*
Comment 7 Chad H. 2011-09-30 15:37:25 UTC
-need-review +reviewed.

I couldn't see this getting applied in its current form. If we do this, it should definitely be done as outlined in comment 3.
Comment 8 Daniel Friesen 2011-10-01 02:12:26 UTC
Note that a feature that hashes and consistently salts the ip enabling blocks to still be applied would still disable the ability to range block.
Comment 9 Hanno Boeck 2011-10-03 16:53:29 UTC
As I tried to explain above, using a static salt and hashing with that is not the same as anonymizing the IP.

Consider this:
If someone breaks into a server running a mediawiki installation (by hacking the server, by raiding the server location or whatever), he can de-anonymize everything that happened in the past. This can happen afterwards, the attacker does not need to have access at the time the edit is happening.
This is something completely different than the case if someone has permanent access to the server.

A solution to that would be a regularly-changing salt, maybe once a week.
Comment 10 Daniel Friesen 2011-10-03 17:20:10 UTC
(In reply to comment #9)
> As I tried to explain above, using a static salt and hashing with that is not
> the same as anonymizing the IP.
> 
> Consider this:
> If someone breaks into a server running a mediawiki installation (by hacking
> the server, by raiding the server location or whatever), he can de-anonymize
> everything that happened in the past. This can happen afterwards, the attacker
> does not need to have access at the time the edit is happening.
> This is something completely different than the case if someone has permanent
> access to the server.
> 
> A solution to that would be a regularly-changing salt, maybe once a week.

What is the point of storing anything at all if you're hashing and salting it in ways that preclude the ability to do blocks or attribution?

Also rather than a fixed salt salting with something like the revision id would be better. I think...

Note You need to log in before you can comment on or make changes to this bug.


Navigation
Links