Manual:Combating vandalism/cs


 * Dochází na vašem webu k vandalismu? Zanechte, prosím, zprávu na diskusní stránce nebo na fóru nebo na e-mailovém seznamu mediawiki-l, abyste získali radu. Viz také Příručka:Boj proti spamu.

Když nainstalujete novou kopii MediaWiki, je náchylná k různým druhům úmyslného vandalismu. Vzhledem k povaze webových stránek wiki, bez ohledu na to, kolik je přítomno ochran, bude vandalismus v určité míře vždy přítomen. Tato stránka popisuje, jak to omezit. Všimněte si, že Wikipedie je mnohem větší než jiné weby, které instalují MediaWiki. Má mnohem více úprav než průměrná wiki, ale také více uživatelů pro sledování vandalismu. Dynamika vandalismu u webů malých wikin je odlišná.



Typy útoků

 * Zahlcení robotů: Vandal se může pokusit spustit robota, který může upravovat/přesouvat a vytvářet stránky vysokou rychlostí nebo nahrávat nevítané verze obrázků. Toto je nejčastější druh vandalismu na většině wikin a obvykle se provádí pro účely spamu: Konkrétní rady najdete na stránce Boj proti spamu.
 * Špatná uživatelská jména: Uživatelé mohou být přejmenováni pomocí rozšíření Rename User. Vždy nejprve přejmenujte uživatele a poté proveďte další akce (zablokujte a vraťte zpět). Díky tomu budou protokoly a poslední změny co nejčistší.
 * Odstranění obsahu (částečné nebo úplné)
 * Vandalismus šablon: Vandal může upravit běžně používané šablony, aby ovlivnil mnoho stránek. Chcete-li to vyřešit, chraňte nejčastěji používané šablony, které lze vidět na stránce Special:MostLinkedTemplates (například na této wiki)



Identifikace znehodnocení/hackingu
První věc, kterou musíte udělat, je určit, zda byl web skutečně kompromitován nebo "hacknut", jak by řekli někteří. Zkuste přejít na různé stránky, abyste zjistili, zda je znehodnocení na všech. Pokud je znehodnoceno více stránek, je možné, že došlo k vandalismu společné šablony nebo upozornění na webu.

Chcete-li zjistit, zda se web stále načítá, otevřete v prohlížeči konzolu pro vývojáře a zkontrolujte kód HTML. Pokud HTML obsahuje obsah stránky, pak stránka není pravděpodobně kompromitována.

Preventative
To temporarily disable account creation and anonymous editing, a sysadmin can put this in LocalSettings.php:
 * Extension:TitleBlacklist: This helps against bad titles of pages and bad usernames
 * Extension:ConfirmEdit and Extension:QuestyCaptcha: Although Captchas are more helpful for spam, they're also somewhat helpful in dealing with vandalism in that the vandal may have to fill captchas for creating accounts, adding external links and so on. However, this will also inconvenience the genuine user, so captchas should be used and configured thoughtfully. A better option might be $wgRateLimits or VandalBrake2, which merely throttle editing rate.
 * Set $wgAccountCreationThrottle to a positive value. This is useless if you don't have vandal(s) who share the same IP during a day, but on the other hand gives fewer problems if few users register from shared IPs in any given day.
 * Extension:TorBlock to prevent vandals from evading all other prevention measures by easily changing IPs using tor, if editing the wiki anonymously is not needed.
 * Extension:SpamBlacklist if the wiki suffers from severe spamming websites which are recurring, have a pattern or are often already blocked by an existing blacklist (otherwise, maintaining the blacklist is not worth the effort).
 * Extension:AbuseFilter: An extension that monitors behaviours on the wiki and is very customizable. Different kinds of rules can be created. To see examples of filters and the work they do, see Wikipedia's filter rules. Filters can also be configured not to be visible to the public.
 * $wgAutoblockExpiry: If multiple vandal user accounts are created from the same IPs in little time, raising this may help multiply the effect of your manual blocks with autoblock enabled. Useless for manual vandals who can change their IP easily, and for vandal bots which have many IPs; harmful (over some degree) if they come from shared IPs your legitimate users may use.
 * $wgNamespaceProtection: Protect templates so only auto-confirmed users or sysops can edit templates
 * Extension:GlobalBlocking: Useful for combating anonymous vandalism on multiple wikis.
 * $wgRateLimits: Throttle anons' and newbies' activities.
 * Use user rights to take away powers that newbies don't need. E.g., you could set  if you wanted to keep non-sysops from superseding your existing images with goatse images and the like.
 * Extension:Lockdown: Useful for limiting anons and new users to editing a Draft: and/or Introduction: namespace.
 * Extension:Moderation: Sends all edits from new users to moderation. If/when the moderator approves the edit, it will appear in page history and RecentChanges. All pending edits from a vandal can be rejected in one click.
 * Lockdown

If you use Extension:AbuseFilter, an admin can (with varying degrees of success depending on configuration and situation) quickly enable or disable IPs with a filter on:

(user_age == 0)

See Manual:Preventing access for other ways to prevent access.

Edit approval

 * Extension:FlaggedRevs: approve changes to the stable version of a page
 * Extension:Approved Revs: a lightweight alternative to FlaggedRevs

Cleaning up
After dealing with spam, it's necessary to clean up existing spam. If you allow existing spam to remain, then antispam features may interfere with people attempting to make legitimate edits.

If the problem is limited to a few pages, it can be cleaned up by hand using normal administrative functions.

Standard cleanup tools
If you identified a set of pages to delete, the maintenance/deleteBatch.php script is helpful.

If the problem is limited to a few IPs or users, Extension:Nuke can systematically remove all their contributions. If submitted without a user or page pattern, the Nuke feature also allows you to list recently created pages and tick checkboxes for which ones to delete or not, which can be a very effective spam cleanup tool if you have a few valid pages and a lot of spam.

The maintenance script rollbackEdits.php can be used to rollback all edits of a given user or IP, if these edits are the latest edits of a page.

Extension:SmiteSpam adds similar block and deletion tools for the entire recent changes.

A slightly more drastic approach involves maintenance scripts after the batch deletion, such as:
 * deleteArchivedRevisions.php to purge deleted edits from your database,
 * removeUnusedAccounts.php to also purge accounts.

cleanup.php
If spam is widespread and performed by many users, you may find this spam cleanup extension useful. This script automatically goes back and removes matching spam on your wiki after you make an update to the spam blacklist. It does this by scanning the entire wiki, and where spam is found, it reverts to the latest spam-free revision.

Procedure:
 * 1) Copy cleanup.php to the extensions/SpamBlacklist folder
 * 2) Login using openssh.
 * 3) Navigate to the extensions/SpamBlacklist subdirectory
 * 4) type "dir" to confirm that cleanup.php is in the directory
 * 5) type "php cleanup.php" to run the script

Other cleanup tools

 * Extension:Nuke: sysops can mass delete page created by a certain user or IP (included in standard download)
 * Extension:Renameuser: so you can rename bad usernames (included in standard download)
 * Enable Rollback permissions by adding the following to your LocalSettings.php and give the rollback right in user rights management to trusted users, so they can revert vandalism easier when it happens:

Features bolded above are easy and quick to install and will help you a lot, so definitely install those.
 * Extension:CheckUser: allows the finding of user IP addresses in order to block the underlying IP addresses of serial vandals.

Restrict editing
In some cases, it is sufficient (and appropriate) to restrict editing pages to those users who have created an account. This restriction will halt a number of automated attacks. This approach can be coupled with, for example, requiring a captcha during account registration, as described above, or blocking usernames matching a certain regular expression using the TitleBlacklist extension.

It is also possible to configure MediaWiki to require e-mail verification before editing certain pages ($wgEmailConfirmToEdit = true). See the preventing access page for more details on these methods.


 * "Preventing access" overview
 * $wgGroupPermissions configuration

Even when editing is restricted to account holders, spammers can automatically create accounts and flood a wiki with new account spam. This can largely be avoided by disabling account creation and transferring authentication to a service such as Extension:OpenID. New account creation is disabled with this line in LocalSettings.php: The MediaWiki:Loginprompt can be updated from the default to suggest that new users create accounts with an OpenID. Current accounts are unaffected, and new users often already have an account with one of the OpenID providers.

Lock down (lazy solution)
You can disallow editing by anonymous users, forcing them to create an account with a username and sign in prior to editing. As a last resort, spam can be nearly eliminated by creating a "gated community" in which new users cannot create a new account and must request one from you.

People often naively suggest lock-down as the best solution to wiki spam. It does reduce spam, but it is a poor solution and a lazy solution, because you are introducing something which massively inconveniences real users. Having to choose a username and password is a big turn off for many people. The wiki way is to be freely and openly editable. This "soft security" approach is one of the key strengths of the wiki concept. Are you going to let the spammers spoil that?

...if so, you can easily lock down your MediaWiki installation by adding the following to your LocalSettings.php:

Note that this only reduces spam. MediaWiki installations are routinely targeted by spambots which perform automated registrations, and so this setting will result in a lot of bogus user accounts in the database, usually with names that follow some recognizable pattern. Spammers may create numerous sleeper accounts, which are accounts that do nothing and then are used for spam at a later time. You should combine this with other measures such as CAPTCHAs (see above) on user registration and/or blocking spammer IPs.

Account creation by spammers may be reduced by transferring authentication to a service such as Extension:OpenID. New account creation is disabled with this line in LocalSettings.php: $wgGroupPermissions['*']['createaccount'] = false; The MediaWiki:Loginprompt can be updated from the default to suggest that new users create accounts with an OpenID. Current accounts are unaffected, and new users often already have an account with one of the OpenID providers.

Some spammers don't supply e-mail addresses, or supply invalid e-mail addresses. To deal with these, you can require e-mail validation before editing with Manual:$wgEmailConfirmToEdit:

As a last resort, spam can be almost entirely eliminated by creating a "gated community" where new users can't even register without asking you to set up an account for them. To do this, add the following to your LocalSettings.php:

You can then visit Special:UserLogin while signed in to create new accounts. See Manual:User rights and Manual:Preventing access for more information.

Tips and Points to remember

 * One-time vandalism (or spam) from an IP address may deserve only a temporary block (1 month or a 1 week etc.) unless there is recurrent vandalism/spam from an IP address that is static.
 * Configure your protection systems such that they should not significantly inconvenience the average user.

Administration related shortcuts
Keep a page for administrators on the wiki related to quick links for dealing with vandalism. Click "Edit" for this section and copy the code below:
 * User related
 * User rename: Special:RenameUser (requires Extension:Renameuser)
 * New users log: Special:Log/newusers
 * User list: Special:ListUsers
 * Block related
 * Block IP: Special:Block
 * IP block ranges (perform block ranges carefully and in most cases only temporarily such as 24 hours, 3 days, 2 weeks, 3 months and so on depending on the situation):
 * Table of sample ranges
 * IPv6 ranges
 * Nejčastěji používané (vzorové bloky):
 * IPv4
 * 69.208.0.0/16 (pro blokování 69.208.x.x)
 * 69.208.52.0/24 (pro blokování 69.208.52.x)
 * IPv6
 * 2001:db8::/64 (pro blokování 2001:db8:0:0:x:x:x:x)
 * 2001:db8:90:ac:fdec:9aec::/96 (pro blokování 2001:db8:90:ac:fdec:9aec:x:x)
 * Protokol blokování: Special:Log/block
 * Odblokování a seznam aktuálních bloků: Special:BlockList
 * Další zkratky
 * Skrýt revize: Pro skrytí špatných uživatelských jmen, která zůstala v protokolech nebo špatných komentářů k úpravám atd



Typické kroky pro řešení vandalismu

 * 1) Přejmenujte uživatele, pokud je uživatelské jméno špatné
 * 2) Blokujte uživatelské jméno na dobu neurčitou (nebo cokoli, co považujete za vhodné)
 * 3) * Nebo pokud se jedná o IP, zablokujte IP dočasně (neurčité blokování IP se ve většině případů nedoporučuje)
 * 4) Vraťte zpět úpravy provedené tímto uživatelem zaškrtnutím příspěvků. Všimněte si, že pokud jste přejmenovali uživatele, příspěvky bude mít nové uživatelské jméno, nikoli původní uživatelské jméno.
 * 5) V případě stránek vytvořených vandalismem nebo přesměrováním tyto stránky a přesměrování smažte.
 * 6) V případě potřeby skryjte revize. To je užitečné při skrytí komentářů k úpravám nebo špatných uživatelských jmen pro úpravu, takže protokoly stránek zůstanou čisté