Last modified: 2013-02-05 11:50:02 UTC

Wikimedia Bugzilla is closed!

Wikimedia migrated from Bugzilla to Phabricator. Bug reports are handled in Wikimedia Phabricator.
This static website is read-only and for historical purposes. It is not possible to log in and except for displaying bug reports and their history, links might be broken. See T39395, the corresponding Phabricator task for complete and up-to-date bug report information.
Bug 37395 - Treat 6to4 addresses equivalent to IPv4 addresses when checking user blocking
Treat 6to4 addresses equivalent to IPv4 addresses when checking user blocking
Status: NEW
Product: MediaWiki
Classification: Unclassified
User blocking (Other open bugs)
unspecified
All All
: Normal major (vote)
: ---
Assigned To: Nobody - You can work on this!
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2012-06-07 19:38 UTC by Liangent
Modified: 2013-02-05 11:50 UTC (History)
7 users (show)

See Also:
Web browser: ---
Mobile Platform: ---
Assignee Huggle Beta Tester: ---


Attachments

Description Liangent 2012-06-07 19:38:14 UTC
See also bug 35542 but I would bump severity for this.

We already have IPv6 enabled on Wikimedia but we only gave sysops rights to do range blocks of /64. However with 6to4, holder of an IPv4 address can get an IPv6 range of /48, which renders IP blocking completely useless if vandals know about 6to4.
Comment 1 Aaron Schulz 2012-06-07 19:45:14 UTC
(In reply to comment #0)
> See also bug 35542 but I would bump severity for this.
> 
> We already have IPv6 enabled on Wikimedia but we only gave sysops rights to do
> range blocks of /64. However with 6to4, holder of an IPv4 address can get an
> IPv6 range of /48, which renders IP blocking completely useless if vandals know
> about 6to4.

The /64 limit will change next upgrade.
Comment 2 Jasper Deng 2012-06-08 18:08:37 UTC
I think this can be resolved as "RESOLVED INVALID" based on Aaron's comment here.

I once recommended 6to4 blocking like you described, but now I don't because the original purpose of IPv6 deployment for the WMF was to avoid collateral damage.
Comment 3 slakr 2012-06-12 01:59:09 UTC
We should also consider applying IPv4 blocks to the XORed IPv4 on Teredos, or, at the very least, update the Checkuser plugin to take it into account.

Otherwise, someone who'd otherwise be prevented from editing due to an IPv4 block could presumably just use IPv6.
Comment 4 slakr 2012-06-12 02:20:23 UTC
Added the see also to https://bugzilla.wikimedia.org/show_bug.cgi?id=35542

I'd say the primary difference between 35542 and this one is that we could easily worry about the BIKESHED/display/UI aspects later, as long as we deal with any obvious security issues that can be actively exploited (e.g., an IPv4 user bouncing through a Teredo to avoid blocks/checkuser hits).

Even worse, because the rest of the stuff comes *before* the XORed IPv4, parsing the Teredo space (2001:0::/32) separately from normal IPv6 addresses is even more important, as the same IPv4 could simply hop to different Teredo servers to avoid blocks, as well.
Comment 5 Jasper Deng 2012-06-12 02:21:58 UTC
Not that many of our end-users know how to switch it on on-demand, and you could just block the corresponding 6to4 when needed ("when needed" is very important here). Collateral damage should be minimized as much as possible.
Comment 6 Jasper Deng 2012-06-12 02:24:33 UTC
On the topic of Teredo, Teredo is very easy to rangeblock. It might be easy to just treat teredo users as open proxies. After all, teredo should be only temporary.
Comment 7 slakr 2012-06-12 02:45:05 UTC
Rangeblocking Teredo would require blocking the entire server, as the XORed port precedes the IPv4 IP, and you can't use wildcards to skip over it.

Regardless, I'd still strongly suggest that if the problem still exists, we just fix it quickly and never have to worry about the worst-case scenarios--of which there are no doubt plenty--or teaching people how to deal with Teredo blocks versus the rest of IPv6.

Plus it would already apply to already-active blocklist entries and/or RC contribs that would be queried by the CU plugin.

Whether or not Teredo, as a whole, should be blocked falls outside the scope of Mediawiki and/or its plugins, and is primarily a policy issue for the various wikis.
Comment 8 Jasper Deng 2012-06-12 02:49:14 UTC
A possibility is a checkbox like "Apply this block to 6to4 tunnels from this address".
Comment 9 slakr 2012-06-12 03:10:10 UTC
If an IPv4 block matches the XORed IPv4 address on a *Teredo* client, I can't think of any instance where you'd want to treat it any differently on a block-by-block basis. For example, even a legitimate IPv4 NAT that's using Teredo *should* be blocked by an IPv4 block, even if that block is anon-only.

That said, a global wg* option would make sense for people who'd want to en-/dis-able the automagic functionality.
Comment 10 Jasper Deng 2012-06-12 03:43:14 UTC
Someone could write an extension for such Teredo blocks, but MediaWiki currently supports none more than simply blocking the server range.

Note You need to log in before you can comment on or make changes to this bug.


Navigation
Links