User Details
- User Since
- Jan 18 2018, 6:32 PM (357 w, 5 d)
- Roles
- Disabled
- LDAP User
- Unknown
- MediaWiki User
- JBennett (WMF) [ Global Accounts ]
Mar 24 2022
Mostly exploratory/discovery work at this point but as part of discovery we are looking at what it might take to decouple authentication from MediaWIki.
Mar 4 2022
Feb 28 2022
Approved
Approved
Feb 17 2022
approved
Approved.
Feb 2 2022
I'm not aware of prior management decisions or risk assessments to prohibit no-transform and I'm only seeing an upside to making this change. Seems like the evidence we have suggests performance issues are negligible, increased analytics in areas where we are seeking growth and we have improved security and privacy by not proxying and this feels like a relatively easy fix. I'm supportive of making this change happy to discuss other options but in the interest of mitigating immediate concerns and risks this seems like a good fit so can we go ahead and add no-transform?
Dec 15 2021
Oct 27 2021
More documentation
Oct 14 2021
Oct 13 2021
Jun 2 2021
Approved from my end.
May 21 2021
Apr 29 2021
Apr 8 2021
The Security team is updating their readiness review SOP to reflect a new change that any request that has aged 90 days without being in a reviewable state will be declined. We do this to help keep our work area current, accurate and reflective of actual work. If the status of your project changes please re-tag us and we will get this work scheduled.
The Security team is updating their readiness review SOP to reflect a new change that any request that has aged 90 days without being in a reviewable state will be declined. We do this to help keep our work area current, accurate and reflective of actual work. If the status of your project changes please re-tag us and we will get this work scheduled.
The Security team is updating their readiness review SOP to reflect a new change that any request that has aged 90 days without being in a reviewable state will be declined. We do this to help keep our work area current, accurate and reflective of actual work. If the status of your project changes please re-tag us and we will get this work scheduled.
The Security team is updating their readiness review SOP to reflect a new change that any request that has aged 90 days without being in a reviewable state will be declined. We do this to help keep our work area current, accurate and reflective of actual work. If the status of your project changes please re-tag us and we will get this work scheduled.
Apr 6 2021
Mar 5 2021
Feb 11 2021
I'm going to chime in here:
Feb 9 2021
Oct 23 2020
Nothing we need to keep, good to cleanup, thanks!
Oct 9 2020
Feb 20 2020
Feb 3 2020
Jan 28 2020
Jan 16 2020
approved
Jan 2 2020
Looks good, thanks!
Dec 4 2019
Approved
Dec 2 2019
approved
Nov 13 2019
Oct 28 2019
How is the patch coming along? When do we expect this to be deployed?
Oct 4 2019
Aug 30 2019
Aug 27 2019
Sure, charter is at https://www.mediawiki.org/wiki/Wikimedia_Security_Team/Council
Jul 18 2019
Jul 17 2019
May 21 2019
Approved
Apr 24 2019
@Eevans @Clarakosi This one is a bit out of our wheelhouse and something we can provide only a cursory review of. I'd like to propose the following: The Security team can perform a basic security review of this but I would recommend a secondary review by our 3rd party partners at BishopFox. That said, the 2nd review would incur some cost but I'm not sure how much. Do you have any budget available for something like that??
Mar 26 2019
Mar 20 2019
Mar 17 2019
Todays updates sent to wikitech-l https://lists.wikimedia.org/pipermail/wikitech-l/2019-March/091769.html
Jan 18 2019
Approved
Dec 12 2018
Dec 11 2018
Dec 7 2018
Dec 4 2018
Dec 3 2018
- With respect to the WMF charter and the values and manifestation thereof, it seems the exception process and/or the bar for each use case is at the discretion of WMF leadership and probably specifically most informed by WMF technical leadership. I'll defer to @JBennett who has more information.
Nov 30 2018
Nov 27 2018
Nov 26 2018
I'm in favor of removing unblock self. It's overly permissive to allow admins to unlock themselves and we should follow some level of separation of duties to ensure proper governance. Let's go ahead and make this change.
Nov 1 2018
Oct 29 2018
+1 from me
Oct 26 2018
I'm not 100% sure who should be claiming this task. Could one of you please claim it in support of this recent security incident?
Oct 10 2018
Sep 27 2018
Sep 17 2018
Sep 13 2018
Our process around security incident response is evolving and something the security team is working to improve. We're not there yet but we are definatley making improvements.
Sep 11 2018
This 1st round is really to address changes to our wiki password policy. Phase 2 is being planned and will address 2FA for privileged users.
Sep 7 2018
Sep 4 2018
In progress