Mediawiki/Anonymous IP Hash: Difference between revisions

From Bibliotheca Anonoma
No edit summary
mNo edit summary
 
(14 intermediate revisions by the same user not shown)
Line 1: Line 1:
{{Note|Thanks to the GDPR, [https://www.mediawiki.org/wiki/Topic:Ufe16gko8aw47e6a there are efforts] to try and get [https://www.mediawiki.org/wiki/GDPR_(General_Data_Protection_Regulation)_and_MediaWiki_software#Hiding_the_display_of_IP_addresses_for_anonymous_editing this feature] working again.}}
{{Warning|Unfortunately, Mediawiki 1.27 has completely overhauled how IP addresses are used and they are probably used to verify sessions. Thus, using this mod will cause actual user account sessions to fail to authenticate. While deeper mods may be possible to make this work, we have given up on it and are seeking ways to hide IPs from user view instead: that allows us to still ban IP ranges anyway.}}
By default, MediaWiki displays IP Addresses of an anonymous editor in edit history. This obviously has a chilling effect on anonymous user participation.
However, this wiki '''hashes these IP addresses''' using a salted bcrypt function, and displays the first 8 characters as an anonymous ID (e.g. <code>ID:D9erK127</code>). The IDs change daily.
These are inspired by 2channel's anonymous ID hashes, as seen periodically on 4chan's /b/.
== Activating Anonymous IP Hash ==
Here's the gist of my anon ID hack to MediaWiki. I can't really package it as an extension or anything because it involves hacking things that
Here's the gist of my anon ID hack to MediaWiki. I can't really package it as an extension or anything because it involves hacking things that
apparently aren't supposed to be hacked, but it's not hard to do. - Halcy
apparently aren't supposed to be hacked, but it's not hard to do. - Halcy <!-- Note that this mod makes banning IPs quite hard. Maybe if there was a way to just not show the IP address to non-Admin users, and still store the IP in the database, that would be better. But on the flip side, tanasinn.info seems to be doing fine with it. We also use captchas that reduce the threat of mass edit by anonymous robots. -->


1. Add the following to your LocalSettings.php:
1. Add the following to your LocalSettings.php:
Line 9: Line 21:
$wgDisableAnonTalk = true;
$wgDisableAnonTalk = true;
function AnonUsername($IP) {
function AnonUsername($IP) {
         $key = $IP.'PUT RANDOM TEXT HERE';
    $options = [
        # Alternatively, you can use this function to further anonymize, but it makes it harder to ban robots: dmY = new ID per day, WY = per week.
         'cost' => 12, // bcrypt computation cost is 12 instead of default 10
        #$key = $IP.'PUT RANDOM TEXT HERE'.gmdate('dmY');
        'salt' => 'PUT RANDOM SALT HERE', // bcrypt requires 22 chars max. change the salt monthly if possible. Static salts are needed for IDs to stay the same within a day or week. Note this may be deprecated by PHP 7.0...
        return 'ID:'.substr(crypt(md5($key), 'id'), 2, 8);
    ];
 
    // Expiry time for hashes: dmY = new ID per day, WY = per week.
    $key = $IP.'PUT RANDOM PADDING HERE'.gmdate('dmY'); // The RANDOM PADDING should be 49 characters (72 - 16 - 8), since for bcrypt, the key string can only be 72 characters
    return 'ID:'.substr(password_hash($key, PASSWORD_BCRYPT, $options), 'id'), 8, 8); // uses bcrypt level 10
}
}
</pre>
</pre>


{{Warning|Consider using something better than md5, such as sha1 for same performance, or bcrypt for reduced brute force.}}
The ID is a truncated hash, which, although it increases the risk of collisions, [http://www.perlmonks.org/?node_id=111524 that may be a benefit rather than a liability when it comes to IPs.]
 
{{Note|Obviously, change the "PUT RANDOM SALT HERE" and "PUT RANDOM PADDING HERE" to some 49 characters of random text: this reduces the risk of brute force attacks. Just bang on the keyboard for a bit, or if you want to be truly random, get an RNG or just roll some dice. The max size of a bcrypt salt is 22 characters. The padding size limit is 49 characters, [http://php.net/manual/en/function.password-hash.php since the max size of a string for bcrypt is 72 characters.]}}
 
{{Warning|Static salts are a necessary evil here since we need to ensure that IDs stay with a user for a day/week. We mitigate this risk by changing the salt monthly. Obviously in passwords, always use random salts.}}


{{Note|Obviously you'd change the "PUT RANDOM TEXT HERE" to some random text: this functions as the salt and reduces the risk of brute force attacks. Just bang on the keyboard for a bit, or if you want to be truly random, get an RNG or just roll some dice.}}
{{Warning|While it is certainly miles better than bare IP addresses, hashing is [https://www.phillips321.co.uk/2012/04/04/cracking-an-md5-of-an-ip-address/ not an absolutely safe way to protect IPs]. We use bcrypt and a good salt, so it can stop attackers for quite a long time: but not forever. Maybe 5-10 years or so.}}


2. In <code>includes/user/User.php</code>, (Mediawiki 1.27.1: getName() Line 2109) find the line that says:
2. In <code>includes/user/User.php</code>, (Mediawiki 1.27.1: getName() Line 2109) find the line that says:

Latest revision as of 02:54, 6 August 2018

Note: Thanks to the GDPR, there are efforts to try and get this feature working again.
Warning: Unfortunately, Mediawiki 1.27 has completely overhauled how IP addresses are used and they are probably used to verify sessions. Thus, using this mod will cause actual user account sessions to fail to authenticate. While deeper mods may be possible to make this work, we have given up on it and are seeking ways to hide IPs from user view instead: that allows us to still ban IP ranges anyway.

By default, MediaWiki displays IP Addresses of an anonymous editor in edit history. This obviously has a chilling effect on anonymous user participation.

However, this wiki hashes these IP addresses using a salted bcrypt function, and displays the first 8 characters as an anonymous ID (e.g. ID:D9erK127). The IDs change daily.

These are inspired by 2channel's anonymous ID hashes, as seen periodically on 4chan's /b/.

Activating Anonymous IP Hash[edit]

Here's the gist of my anon ID hack to MediaWiki. I can't really package it as an extension or anything because it involves hacking things that apparently aren't supposed to be hacked, but it's not hard to do. - Halcy

1. Add the following to your LocalSettings.php:

// you can leave anon talk pages on, but you'll
// likely end up with useless crud after IDs expire
$wgDisableAnonTalk = true;
function AnonUsername($IP) {
    $options = [
        'cost' => 12, // bcrypt computation cost is 12 instead of default 10
        'salt' => 'PUT RANDOM SALT HERE', // bcrypt requires 22 chars max. change the salt monthly if possible. Static salts are needed for IDs to stay the same within a day or week. Note this may be deprecated by PHP 7.0...
    ];

    // Expiry time for hashes: dmY = new ID per day, WY = per week.
    $key = $IP.'PUT RANDOM PADDING HERE'.gmdate('dmY'); // The RANDOM PADDING should be 49 characters (72 - 16 - 8), since for bcrypt, the key string can only be 72 characters
    return 'ID:'.substr(password_hash($key, PASSWORD_BCRYPT, $options), 'id'), 8, 8); // uses bcrypt level 10
}

The ID is a truncated hash, which, although it increases the risk of collisions, that may be a benefit rather than a liability when it comes to IPs.

Note: Obviously, change the "PUT RANDOM SALT HERE" and "PUT RANDOM PADDING HERE" to some 49 characters of random text: this reduces the risk of brute force attacks. Just bang on the keyboard for a bit, or if you want to be truly random, get an RNG or just roll some dice. The max size of a bcrypt salt is 22 characters. The padding size limit is 49 characters, since the max size of a string for bcrypt is 72 characters.
Warning: Static salts are a necessary evil here since we need to ensure that IDs stay with a user for a day/week. We mitigate this risk by changing the salt monthly. Obviously in passwords, always use random salts.
Warning: While it is certainly miles better than bare IP addresses, hashing is not an absolutely safe way to protect IPs. We use bcrypt and a good salt, so it can stop attackers for quite a long time: but not forever. Maybe 5-10 years or so.

2. In includes/user/User.php, (Mediawiki 1.27.1: getName() Line 2109) find the line that says:

   $this->mName = IP::sanitizeIP( $this->getRequest()->getIP() );

and change it to:

   $this->mName = AnonUsername( $this->getRequest()->getIP() );

3. In includes/user/User.php, (Mediawiki 1.27.1: getBlockedStatus() Line 1600) find the line that says:

   : IP::sanitizeIP( $wgUser->getRequest()->getIP() );

and change it to:

   : AnonUsername( $this->getRequest()->getIP() );

You will need to repeat this mod whenever you update MediaWiki, since obviously an update replaces the system files. And of course the lines may vary, but have generally been similar.

aa tags[edit]

On a slightly related note, I hacked an extension together for <aa> tags.

  • Music:DQN-kun / >>6 is not a panda

http://storlek.livejournal.com/47939.html?thread=47171