Background
The number of accounts created from the same IP address is rate limited, using the $wgAccountCreationThrottle config.
The number of temporary accounts created is not currently rate limited. This task is to determine whether we should apply a rate limit, and if so what that limit should be.
Why we might want rate limiting
It can be relatively easy to block cookies for a given website, in which case each edit is assigned to a new temporary account, even within a browser session.
Q: How much do we expect this to happen, and how much would this need to happen in order to create database storage problems or difficulties for patrollers?
A:
- KH: we should take the worst case scenario as the guideline for this, which is scripted temporary account creation, and that is currently bounded by the limit of 8 edits per minute per IP. We can work out a more constricted rate limit in T357771: Analyze how many distinct devices edit per day from a given IP address
- KH: we can also consider a tiered system for the rate limits; we have a hard limit that denies the edit/temp account creation entirely after it's been tripped, and a soft limit that prompts for CAPTCHA completion. That would allow for limiting scripted abuse while still allowing good faith users from a particular IP to make an initial edit.
Why we might not want rate limiting
Some IPs are shared by a large number of people, e.g. covering a large geographical area. Rate limiting could significantly harm the ability of people using these IPs to edit.
Q: If we decide to implement rate limiting, how can we monitor to what extent this is happening?
A: T357763: [Epic] Create a temporary accounts initiative Grafana dashboard would provide insight into this
Other considerations
Q: Is the rate limit on anon edits still applied correctly with temp account creation enabled?
A: yes, the $wgRateLimits['edit']['ip'] applies to edits that result in temp acocunt creation.