Last modified: 2014-11-17 10:36:27 UTC
Making it an option for users is nice, but for users with sysop, checkuser, oversight and researchers (for enwiki; other wikis configurations my vary) SSL access should not be an option, but the only way to access the servers.
If we can require SSL for some logins, it would be irresponsible not to require SSL for *all* logins.
(In reply to comment #1) > If we can require SSL for some logins, it would be irresponsible not to require > SSL for *all* logins. What about requiring HTTPS for all logins, and HTTPS for all further pages of special users?
Sorry, to clarify I meant persistent HTTPS for all activity from the account, not just log-ins. But I agree with Brion's comment that the best case would be to require HTTPS for the log-in process for all accounts, at the very least.
FYI, here's the bug for secure login for all users: https://bugzilla.wikimedia.org/show_bug.cgi?id=39380
And now that all that code is in place, I think it should be trivial in the login to say if a user is a member of a particular group, force stickHTTPS to true.
(In reply to comment #5) > And now that all that code is in place, I think it should be trivial in the > login to say if a user is a member of a particular group, force stickHTTPS to > true. What about global groups? Ombudsmen, Staff, founder, steward and sysadmin all give access to private information.
https://gerrit.wikimedia.org/r/47089
Please forgive me for my ignorance, but doesn't having a cookie at all sent in HTTP mode mean that the user has logged in at least once *not* using HTTPS? Isn't it already too late to redirect him to HTTPS?
All HTTP cookies have a "Secure" attribute that determines whether the browser will send them over HTTP or not. So, in other words, the actual protocol under which the cookie was sent is irrelevant, it's the Secure flag on the cookie that matters. When you log in using HTTPS in MediaWiki, almost every cookie is set to Secure so that it only goes over HTTPS. However, if you look in User::setCookies, you'll see that the forceHTTPS cookie is explicitly set without the Secure attribute so that it'll be visible regardless of protocol.
(In reply to comment #9) > All HTTP cookies have a "Secure" attribute that determines whether the > browser > will send them over HTTP or not. So, in other words, the actual protocol > under > which the cookie was sent is irrelevant, it's the Secure flag on the cookie > that matters. > > When you log in using HTTPS in MediaWiki, almost every cookie is set to > Secure > so that it only goes over HTTPS. However, if you look in User::setCookies, > you'll see that the forceHTTPS cookie is explicitly set without the Secure > attribute so that it'll be visible regardless of protocol. That's a crystal clear explanation, thank you!