originally filed in https://www.mediawiki.org/wiki/Extension_talk:OpenID#x.24wgOpenIDTrustRoot_35640
Version: master
Severity: normal
originally filed in https://www.mediawiki.org/wiki/Extension_talk:OpenID#x.24wgOpenIDTrustRoot_35640
Version: master
Severity: normal
Status | Subtype | Assigned | Task | ||
---|---|---|---|---|---|
Open | Feature | None | T66475 Make crosswiki bits and pieces truly global (tracking) | ||
Declined | Feature | None | T15631 Wikimedia should become an OpenID provider | ||
Declined | None | T31254 [SUGGESTION] Expose group memberships for query through OpenID teams extension | |||
Declined | Wikinaut | T25735 Allow different user grouping for OpenID users | |||
Declined | None | T61631 Enable Facebook login on Wikimedia wikis | |||
Declined | None | T11604 Get OpenID extension to a state where it could be used on Wikimedia projects as a provider | |||
Invalid | Wikinaut | T59478 MediaWiki as OpenID server: make $wgOpenIDTrustRoot protocol-independent |
The question is, whether making it protocol-independent is really safe.
We are talking about the server-side implementation (MediaWiki as OpenID Server).
When the MediaWiki can be accessed via http: _and_ https: in the same way, then the consumer should trust one of them - not both, because the server could deliver different services, depending whether it is accessed via http or https.
So I changed my mind and think, that the $wgOpenIDTrustRoot value should _always_ reflect the actual way, a consumer has authenticated.
Closing as INVALID.