Editing Mediawiki/Anonymous IP Hash

From Bibliotheca Anonoma

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 1: Line 1:
{{Note|Thanks to the GDPR, [https://www.mediawiki.org/wiki/Topic:Ufe16gko8aw47e6a there are efforts] to try and get [https://www.mediawiki.org/wiki/GDPR_(General_Data_Protection_Regulation)_and_MediaWiki_software#Hiding_the_display_of_IP_addresses_for_anonymous_editing this feature] working again.}}
{{Warning|Unfortunately, Mediawiki 1.27 has completely overhauled how IP addresses are used and they are probably used to verify sessions. Thus, using this mod will cause actual user account sessions to fail to authenticate. While deeper mods may be possible to make this work, we have given up on it and are seeking ways to hide IPs from user view instead: that allows us to still ban IP ranges anyway.}}
By default, MediaWiki displays IP Addresses of an anonymous editor in edit history. This obviously has a chilling effect on anonymous user participation.
However, this wiki '''hashes these IP addresses''' using a salted bcrypt function, and displays the first 8 characters as an anonymous ID (e.g. <code>ID:D9erK127</code>). The IDs change daily.
These are inspired by 2channel's anonymous ID hashes, as seen periodically on 4chan's /b/.
== Activating Anonymous IP Hash ==
Here's the gist of my anon ID hack to MediaWiki. I can't really package it as an extension or anything because it involves hacking things that
Here's the gist of my anon ID hack to MediaWiki. I can't really package it as an extension or anything because it involves hacking things that
apparently aren't supposed to be hacked, but it's not hard to do. - Halcy <!-- Note that this mod makes banning IPs quite hard. Maybe if there was a way to just not show the IP address to non-Admin users, and still store the IP in the database, that would be better. But on the flip side, tanasinn.info seems to be doing fine with it. We also use captchas that reduce the threat of mass edit by anonymous robots. -->
apparently aren't supposed to be hacked, but it's not hard to do. - Halcy


1. Add the following to your LocalSettings.php:
1. Add the following to your LocalSettings.php:
Line 20: Line 8:
// likely end up with useless crud after IDs expire
// likely end up with useless crud after IDs expire
$wgDisableAnonTalk = true;
$wgDisableAnonTalk = true;
function AnonUsername($IP) {
function AnonUsername() {
    $options = [
        $key = wfGetIP().'PUT RANDOM TEXT HERE';
        'cost' => 12, // bcrypt computation cost is 12 instead of default 10
        # Alternatively, you can use this function to further anonymize, but it makes it harder to ban: dmY = new ID per day, WY = per week.
        'salt' => 'PUT RANDOM SALT HERE', // bcrypt requires 22 chars max. change the salt monthly if possible. Static salts are needed for IDs to stay the same within a day or week. Note this may be deprecated by PHP 7.0...
        #$key = wfGetIP().'PUT RANDOM TEXT HERE'.gmdate('dmY');
    ];
        return 'ID:'.substr(crypt(md5($key), 'id'), 2, 8);
 
    // Expiry time for hashes: dmY = new ID per day, WY = per week.
    $key = $IP.'PUT RANDOM PADDING HERE'.gmdate('dmY'); // The RANDOM PADDING should be 49 characters (72 - 16 - 8), since for bcrypt, the key string can only be 72 characters
    return 'ID:'.substr(password_hash($key, PASSWORD_BCRYPT, $options), 'id'), 8, 8); // uses bcrypt level 10
}
}
</pre>
</pre>


The ID is a truncated hash, which, although it increases the risk of collisions, [http://www.perlmonks.org/?node_id=111524 that may be a benefit rather than a liability when it comes to IPs.]
{{Warning|Consider using something better than md5, such as sha1 for same performance, or bcrypt for reduced brute force.}}
 
{{Note|Obviously, change the "PUT RANDOM SALT HERE" and "PUT RANDOM PADDING HERE" to some 49 characters of random text: this reduces the risk of brute force attacks. Just bang on the keyboard for a bit, or if you want to be truly random, get an RNG or just roll some dice. The max size of a bcrypt salt is 22 characters. The padding size limit is 49 characters, [http://php.net/manual/en/function.password-hash.php since the max size of a string for bcrypt is 72 characters.]}}
 
{{Warning|Static salts are a necessary evil here since we need to ensure that IDs stay with a user for a day/week. We mitigate this risk by changing the salt monthly. Obviously in passwords, always use random salts.}}


{{Warning|While it is certainly miles better than bare IP addresses, hashing is [https://www.phillips321.co.uk/2012/04/04/cracking-an-md5-of-an-ip-address/ not an absolutely safe way to protect IPs]. We use bcrypt and a good salt, so it can stop attackers for quite a long time: but not forever. Maybe 5-10 years or so.}}
{{Note|Obviously you'd change the "PUT RANDOM TEXT HERE" to some random text: this functions as the salt and reduces the risk of brute force attacks. Just bang on the keyboard for a bit, or if you want to be truly random, get an RNG or just roll some dice.}}


2. In <code>includes/user/User.php</code>, (Mediawiki 1.27.1: getName() Line 2109) find the line that says:
2. In <code>includes/user/User.php</code>, (Mediawiki 1.27.1: getName() Line 2109) find the line that says:
Line 46: Line 26:
and change it to:
and change it to:


     $this->mName = AnonUsername( $this->getRequest()->getIP() );
     $this->mName = AnonUsername();


3. In <code>includes/user/User.php</code>, (Mediawiki 1.27.1: getBlockedStatus() Line 1600) find the line that says:
3. In <code>includes/user/User.php</code>, (Mediawiki 1.27.1: getBlockedStatus() Line 1600) find the line that says:
Line 54: Line 34:
and change it to:
and change it to:


     : AnonUsername( $this->getRequest()->getIP() );
     : AnonUsername();


You will need to repeat this mod whenever you update MediaWiki, since obviously an update replaces the system files. And of course the lines may vary, but have generally been similar.
You will need to repeat this mod whenever you update MediaWiki, since obviously an update replaces the system files. And of course the lines may vary, but have generally been similar.
Please note that all contributions to Bibliotheca Anonoma are considered to be released under the Creative Commons Attribution-ShareAlike (see Bibliotheca Anonoma:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!
Cancel Editing help (opens in new window)

Templates used on this page: