User Details
- User Since
- Nov 18 2019, 7:30 PM (295 w, 3 d)
- Availability
- Available
- LDAP User
- Mstyles
- MediaWiki User
- MStyles (WMF) [ Global Accounts ]
Wed, Jul 16
It doesn't have to be a physical device, but we're proposing to currently limit passkeys to physical devices until we get proper Web Authn support
What is the benefit of adding the right directly vs adding users to a group?
Not sure how to make that more clear. If a randomly selected user (part of whatever percent rollout we are doing) is not a member of any of the other global groups then they get added to the oathauth-tester group.
@kostajh mentioned that we could also consider an event logging collection since there is a low volume of events
Tue, Jul 15
Actually can you create them as milestones and not subprojects?
Can you also create the following subprojects:
Wed, Jul 9
I ended up keeping both pages since https://www.mediawiki.org/wiki/Developing_security_patches talks about more than just Gerrit. I still left the technical patch documentation in https://wikitech.wikimedia.org/wiki/How_to_deploy_code#Security_patches. Definitely open to feedback about further changes.
Mon, Jul 7
Marking as invalid since we were not able to reproduce this issue on our side. Feel free to reopen @Wikinaut if you still see any issues.
Tue, Jul 1
Security issue access granted!
Tue, Jun 24
Mon, Jun 23
@Dwisehaupt if you have any questions, please let me know. Otherwise, I will mark this as resolved at the end of this week.
Security Review Summary - T385337 - 2025-06-23
@Lakejason0, Thank you for working on this issue. In the future can you put patches up privately as outlined in developing security patches. It would be ideal to get this patch merged today.
Since this release is backported to 1.41 and 1.42 and there's been no response about the 1.39 patch for some time, I'm going to mark this ticket as resolved.
Jun 16 2025
The ML team now has security issue access!
Thank you so much @brennen!
@Wikinaut We did not try to reproduce in the version that you reported it in, just in 1.44.0. I'll find out if we can reproduce in 1.41.0
Jun 10 2025
Jun 9 2025
Security issue access granted
Thanks so much @KFrancis. @Paladox we will need you to add 2FA to your account before security issue access can be granted. Please set up 2FA.
Jun 3 2025
21:11:43 Started check-testservers 21:11:43 Executing check 'check_testservers_baremetal-1_of_1' 21:11:43 Executing check 'check_testservers_k8s-1_of_2' 21:11:43 Executing check 'check_testservers_k8s-2_of_2' 21:12:01 Check 'check_testservers_k8s-1_of_2' failed: Sending to mwdebug.discovery.wmnet... https://donate.wikimedia.org/ (/srv/deployment/httpbb-tests/appserver/test_main.yaml:230) Status code: expected 302, got 503. Location header: expected 'https://donate.wikimedia.org/wiki/Special:FundraiserRedirector', was missing. === FAIL: 151 requests sent to mwdebug.discovery.wmnet. 1 request with failed assertions.
You can update the View Policy by clicking on the Custom policy in Phab and adding a View Policy manually. I also sent a screenshot to explain
Jun 2 2025
@Yaron_Koren sorry for not making that clear, checking in the change to Gerrit was exactly what I meant.
@Yaron_Koren when you review this patch, it can go ahead and go through Gerrit since this extension is not deployed on WMF servers.
+1 to this patch and going to get this out in today's security deploy. Adding support to the phan-taint-check-plugin for these issues is a great idea and I'll ping about a follow up task in case that doesn't happen.
@KFrancis any update for the NDA since it's been signed?
May 29 2025
If you 're still able to see the task, then you can confirm that you have access. I added acl*release_security_pre_announce as a view group, I didn't replace the acl*security policy. I already did this for T392746.
I reached out to Legal and they do not have a NDA signed for @Paladox. Could you go ahead and start that process?
I'm following up with Legal and any other internal concerns and will report back with more information
May 27 2025
@Aklapper using the acl*release_security_pre_announce project worked so I'm resolving this ticket. We can reopen it if something is needed in the future.
@Dreamy_Jazz thank you for reporting this issue. I'll ask around and see if anyone is interested in working on this.
@Dreamy_Jazz are you intending to work on this ticket or should I look for another contributor?
May 23 2025
May 22 2025
Since this would only be for a few tasks per year @Aklapper, changing the View Policy for a few tasks would be okay.
May 20 2025
@Aklapper if you could create the ACL with the security team as the manager that would be great.
May 19 2025
@Aklapper I can provide more information offline, if that would be helpful.
@Reedy for the testing issues with 1.39, would you recommend just merging as is with the tests failing or taking a different approach?
Do you have any test plans or paths or code that you can point to as well for this issue?
Thank you for this report. This is not replicable in 1.44.0, If you could provide any more information, that would be appreciated
May 5 2025
@STran are these patches ready for deployment? I would like to make sure they get out sooner than later.
May 3 2025
I am not sure if this issue still exists. I tried to change the owner of my binary and wasn't able to exactly replicate this issue. However, I did fix a different update message and I added the change to this ticket.
Apr 28 2025
@STran @BlankEclair what are the status on these patches. I've reviewed them and they look good to me, but it seems that there's still active work ongoing. I can wait until next week to deploy if necessary.
Apr 24 2025
Security issue access granted
Apr 23 2025
Still working on backports for 1.39 and 1.42
@Dwisehaupt thank you for the update.
Apr 21 2025
Hey @Dwisehaupt do you have a particular date for this python package to go into production? I'll be doing a fairly quick vendor review.
Apr 16 2025
The supply chain report has been shared to all relevant persons and a lot of feedback has been taken into account. I'm marking this ticket as closed, but feel free to reopen if there is any follow up.
Apr 14 2025
Once we get the backport merged for 1_39, we want to make this ticket public. Any objections?