On Thu, Jul 23, 2009 at 8:50 PM, Happy-melon <happy-me...@live.com> wrote:

>
>
> "Aryeh Gregor" 
> <simetrical+wikil...@gmail.com<simetrical%2bwikil...@gmail.com>>
> wrote in message
> news:7c2a12e20907231051s638dd2f9v399ac2a79e185...@mail.gmail.com...
> > On Thu, Jul 23, 2009 at 1:37 PM, Tim Starling<tstarl...@wikimedia.org>
> > wrote:
> >> To help in the "proving trustworthy, or else" process, I have released
> >> the source code of Watchlistr - please take a look at it. You will see
> >> that I take the utmost care in securing user information. The wiki
> >> logins are encrypted with AES in our database. The key used to encrypt
> >> each user's login list is their site username, which is stored as a
> >> SHA1 hash in our database. If a cracker were to, somehow, gain access
> >> to the database, they would be left with a pile of garbage.
> >
> > They would only have to get the site usernames to decrypt the login
> > info.  They could get those the next time each user logs in, if
> > they're not detected immediately.  There's no way around this; if your
> > program can log in as the users, so can an attacker who's able to
> > subvert your program.
>
> Or, since the set of registered Wikimedia users is both vastly smaller than
> the superset of all possible usernames (remember it's restricted to users
> with a global login AFAICT), and readily accessible through a
> high-throughput API, a brute-force attack would be, if not trivial,
> certainly extremely feasible.
> >
> >> As for the other solutions that were presented - I was really trying
> >> to create a cross-platform, cross-browser solution that would not
> >> hinge on one particular technology. Javascript would be great, but
> >> what if someone doesn't have JS enabled? OAuth and a read-only API
> >> would be close-to-ideal, but they currently don't work with/don't
> >> exist on the Wikimedia servers. I am, however, open to other workable
> >> solutions that are presented - let me know.
> >
> > I would suggest you apply for a toolserver account:
> >
> > https://wiki.toolserver.org/view/Account_approval_process
> >
> > Once you have a toolserver account, I'd be willing to work with you to
> > arrange for some form of direct access to all wikis' watchlist tables
> > (I'm a toolserver root).  You then wouldn't need to possess any login
> > info.
>
> This looks like a *much* more acceptable system.  Although how would you
> authenticate without collecting proscribed data...?


Let the user prove account ownership by a talk page edit. This was the way
Interiot used in his old edit counter... (is this one still active?)

Marco


-- 
VMSoft GbR
Nabburger Str. 15
81737 München
Geschäftsführer: Marco Schuster, Volker Hemmert
http://vmsoft-gbr.de
_______________________________________________
Wikitech-l mailing list
Wikitech-l@lists.wikimedia.org
https://lists.wikimedia.org/mailman/listinfo/wikitech-l

Reply via email to