RfC: Approving the updated proposal

The following discussion is closed. Please do not modify it. Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.


The purpose of this discussion is to create a process for the interface administrator right on the English Wikipedia. Please take a look at and give feedback on the proposals below. Thanks, Mz7 (talk) 23:02, 7 September 2018 (UTC)[reply]

Direct links to all proposals
  1. #Original proposal
  2. #Alternative / modified proposal: Grant for admins on request without process
  3. #Alternative proposal, with 'indication of need'
  4. #Alternative proposal, quick expiry only

Original proposal

Should we adopt the following process regarding the interface administrator permission?

Process for requesting

Administrators who wish to request this permission may make a new request at Wikipedia:Interface administrators' noticeboard (WP:IANB). A notice should be posted to WP:VPT and WP:AN to invite community participation. Those making a request are encouraged to answer the following two questions:

  • Please describe any relevant on-wiki experience you have for this role.
  • Please outline, without breaching your personal privacy, any off-wiki experience or technical expertise you may have for this role.

Requests will be open for one week, during which any editor may comment on the request. Editors are encouraged to comment on the requester's level of trust and technical ability. Requests will be closed by a bureaucrat.

Removal of permissions

Permission should be removed by bureaucrats in the following circumstances:

  1. Interface administrators who have made no edits or other logged action for at least 12 months should have the user right removed.
  2. Voluntary request by the interface administrator at the bureaucrats' noticeboard.
  3. After misuse of the access, by consensus at Wikipedia:Administrators' noticeboard.
  4. Upon removal of administrator access, for any reason.
  5. By request of the Arbitration Committee.

To be clear, this is the text that is currently on the main Wikipedia:Interface administrators page, authored primarily by Enterprisey in the section "Yet another proposed granting process" above. Mz7 (talk) 00:51, 2 September 2018 (UTC) Note: Per #Sysop_as_requirement, at this time only sysops can request this right.[reply]

Straw poll (Sept 2)

Support (Sept 2)
  1. Support. After much informal discussion, I think we've refined a proposal to the point where we can make it formal. It's clear that as a community we need to pass something, and I think this is as good a starting point as any. As many others have explained before me, the intent of creating this permission was to improve the overall security of Wikimedia projects. Allowing all administrators access to JS and CSS pages that affect other users increases the risk of attackers compromising an account and running malicious code on another Wikipedia user's computer, which is a situation that has occurred on several occasions before. This proposal limits this access to individuals who have a need for the access.
    Previous proposals made the discussion time frame 24 hours and allowed requests to be rejected if any two administrators object, but many editors thought that was too short and that objections should be open to other editors, not just admins (see the section "RfC: Approving the current proposal"). Enterprisey authored the current proposal, which increases the discussion length to seven days and allows any editor to comment, the result to be determined by a bureaucrat (see the section "Yet another proposed granting process"). There was also debate as to whether we should host nominations at the newly created Wikipedia:Interface administrators' noticeboard or at WP:BN (see the section "Noticeboard?")—this proposal is going with the intadmin noticeboard idea.
    I hope this version of the proposal accommodates everyone's concerns. Again, it's clear we need to pass something at this point; if it needs tweaking (e.g. allowing non-admins to request the right, requiring a consensus of bureaucrats to grant instead of a single 'crat's discretion), we can tweak it in a future discussion. Mz7 (talk) 00:51, 2 September 2018 (UTC)[reply]
  2. Support, with a note (to my peers that preferred creating a process for non-admins) that, as Mz7 said, we can always go back and modify the process to support that in the future. Enterprisey (talk!) 04:55, 2 September 2018 (UTC)[reply]
  3. Support - happy with this for now. I think there may be circumstances where non-admins should be allowed to have access, but we can discuss that later if needed. -- Ajraddatz (talk) 05:21, 2 September 2018 (UTC)[reply]
  4. Support as well. Like others here, I also think we should look into a process for non-admins once we get this proposal implemented. — AfroThundr (u · t · c) 06:20, 2 September 2018 (UTC)[reply]
  5. Support and hope his will be extended to non admins who need it also. –Ammarpad (talk) 07:03, 2 September 2018 (UTC)[reply]
  6. Support reasonable, though I'd prefer that the activity requirements be three or six months rather than twelve months (but making it a simple request at WP:BN to get back the rights if they were removed for activity), and 1 week seems rather unnecessarily long for discussion, though I suppose after the first few rounds new intadmins will be rare. Galobtter (pingó mió) 08:12, 2 September 2018 (UTC)[reply]
  7. Support, sounds reasonable.--Ymblanter (talk) 08:30, 2 September 2018 (UTC)[reply]
  8. Support sounds great Hhkohh (talk) 09:16, 2 September 2018 (UTC)[reply]
  9. Support Seems logical, fair, and a reasonable process to me. ~Oshwah~(talk) (contribs) 09:25, 2 September 2018 (UTC)[reply]
  10. Support, and agree with comments above by Galobtter re activity and regaining the bit, and Ajraddatz on non-admins, Though as this is actually a species of admin, a RFIA would probably be the way to go. · · · Peter (Southwood) (talk): 13:34, 2 September 2018 (UTC)[reply]
  11. Support looks good --Danski454 (talk) 16:30, 2 September 2018 (UTC)[reply]
  12. Support. I personally would support reducing the time to 48 hours - I don't think a week-long discussion is really necessary and I don't want to make the process for granting requests like a second RfA. However, this proposal seems reasonable, and I hold no objections to getting this going and then making modifications from there.--SkyGazer 512 Oh no, what did I do this time? 16:42, 2 September 2018 (UTC)[reply]
    Note: I've supported the option below, as I do think it's better than this option. (#Alternative proposal with waiting period)--SkyGazer 512 Oh no, what did I do this time? 15:13, 18 September 2018 (UTC)[reply]
  13. Support Per my comments above. 48-72h would be better, but, meh. ~ Amory (utc) 18:07, 2 September 2018 (UTC)[reply]
    Expanding on my comment here rather than in the oppose section. Regarding the idea that this will be just another RfA process (JARfA?), I think the better analogy is WP:EFM: users with a demonstrated technical ability and use/need ask, and folks assess the need based on that. Quiet, technical, and like the edit filter, something most people don't interact with, so free from drama. Second, separating this ability from RfA can only make RfA better; it means the risk of any given sysop will be lowered, so while it won't make RfA perfect, a little less risk can only help. Thirdly, just because we've existed with a risky situation doesn't mean we should continue it; the risk is on par with a Bureaucrat account. Kevin expands below on just some of the things one could do with this ability, but there are more. Wikipedia is the 5th most visited site in the world, and I am consistently surprised we haven't had an incident where someone does something "for the lulz." ~ Amory (utc) 12:03, 3 September 2018 (UTC)[reply]
  14. Support not perfect but it gets things moving. --Rschen7754 18:08, 2 September 2018 (UTC)[reply]
  15. Support – a clean and straightforward process. We need more of those. — JFG talk 21:35, 2 September 2018 (UTC)[reply]
    Extra remark: like other commenters, once this process is in place, and if at all possible technically, I'd like to see it open to tech-savvy non-admins. — JFG talk 21:42, 2 September 2018 (UTC)[reply]
  16. Support Logical, efficient, and fair. SemiHypercube 22:20, 2 September 2018 (UTC)[reply]
  17. Support for non-admins, but oppose for admins - see oppose below. WJBscribe (talk) 22:45, 2 September 2018 (UTC)[reply]
  18. Support. I don't fully agree with all elements of this proposal, but I think something needs to be adopted that can be amended later. I don't agree with the community's decision that only admins should hold this permission, but as long as that decision is the consensus of the community, this policy is acceptable to me. At risk of violating BEANS, I suggest that some of the opposes may not quite appreciate the degree of access that IAdmin has – with a click or two, IAdmins can assign themselves CU/OS and mass-access highly sensitive data that way; violate the privacy of and run malicious code on the computer of every person who views Wikipedia (until discovered); run cryptocurrency mining rigs on Wikipedia readers' computers (this has happened on other WMF projects); etc. I personally doubt that this will turn IAdmin requests into an RfA 2.0 – just look at the ease with which all of the temporary IAdmins have been granted the permission above. I also think this process is insufficient for non-admins – I envision a proper RfA-like process for those who are trusted enough to pass an RfA but don't meet some of the other requirements (content creation/etc.). For admins, a lightweight noticeboard request and comment is appropriate in my view. Kevin (aka L235 · t · c) 23:34, 2 September 2018 (UTC)[reply]
  19. Support to get something going. As far as the opposition comments so far, this was designed with "higher expectations for membership" (than administrator) in mind, and it is not the first time such a technical control has been implemented globally (for example bigdelete was removed from admins, not at the request of the local community - but unlike bigdelete the local community has been empowered to issue iadmin access to users). I'm not strongly opposed to the idea of non-admin iadmins - but would rather get this in to production before what I anticipate will be a much more contentious discussion for such a future amendment option. — xaosflux Talk 01:19, 3 September 2018 (UTC)[reply]
  20. Support, but prefer the shorter procedures proposed below. We need to get ourselves out of the limbo of not being able to grant this permission formally. Deryck C. 11:55, 3 September 2018 (UTC)[reply]
    We can also do that by just allowing crats to assign the permission to any admin who asks, can't we? So why do you support this specific proposal? Regards SoWhy 13:45, 3 September 2018 (UTC)[reply]
    @SoWhy: What Deryck is trying to say is, that right now, there exists no process of granting this permission on a permanent basis, and that having no process at all is worse the having a flawed process. He's just supporting the fact that this group needs a process, and it needs it now. That's how I interpret his rationale.—CYBERPOWER (Chat) 13:54, 3 September 2018 (UTC)[reply]
    @Cyberpower678: That might be a possible interpretation but saying "I support proposal X because it creates a process" does not explain why you support X and not Y or Z. Hence my question. Regards SoWhy 15:20, 3 September 2018 (UTC)[reply]
    Where's Y and Z. I only see X, while the opposers are creating Y.—CYBERPOWER (Chat) 15:52, 3 September 2018 (UTC)[reply]
    @SoWhy: I would much rather crats simply granted interface-administrator to any admin who asked for it at their own discretion, but User:Xaosflux has refused on behalf of crats to even grant the permission temporarily [1] [2] unless there is a community mandate. So I am willing to support any proposal that instructs crats to grant interface-administrator to current admins. If anyone drafts a simpler proposal I am happy to support that as well, like how I have supported all the draft proposals above. Deryck C. 16:16, 3 September 2018 (UTC)[reply]
    @Deryck Chan: just to note, I am the author of the temporary access processes currently running on this page. If the community wants to approve "must grant to any sysop at anytime without question" then you don't really need bureaucrats involved: start the us-vs-them fight with the developer team by requesting a configuration change to allow admins to addself/removeself from this group (though I expect it will end up at meta:Limits to configuration changes. — xaosflux Talk 16:30, 3 September 2018 (UTC)[reply]
    Oh stop it, there is no "us vs them" Back to the point, there are two issues here. First, everybody who was a sysop as of last month had the rights of what is now an interface administrator, so I believe these users should be allowed to claim their permission through an expedited process. Second, we do have a number of permissions such as rollback and filemover and where we trust individual admins with full discretion to grant rights to any user, subject to policy but not community discussion; I think the process for bureaucrats to grant interface administrator rights should be kept simple in a similar vein. Deryck C. 17:22, 3 September 2018 (UTC)[reply]
  21. Support no obvious issues that would cause me to prevent the intadmin pool from being expanded at this time. Anything else can be hammered out later. --SarekOfVulcan (talk) 16:08, 3 September 2018 (UTC)[reply]
  22. Support addresses my concerns raised in the above discussions. Amory's comment above on how this is different from an RFA clone aleviated most of my concerns on that front. I am strongly opposed to giving this ability to all admins which seems to be the main alternative offered by the oppose rationales. This is not a situation to wait around for problems to appear if we gave it to all admins: compromised or malicious accounts can run malicious code on readers' computers and threatens data or economic loss for readers that we cannot fix. That we've been lucky so far is no reason to keep doing it. This bit should be given to as few people as possible, and only for as long as they continue to use it. I am open to non-admins going throught this same process for the bit but appreciate the concerns raised by Kevin. Wugapodes [thɔk] [ˈkan.ˌʧɻɪbz] 17:26, 3 September 2018 (UTC)[reply]
  23. Support: I don't understand why people are opposing. As Kevin explains, the risks of this right are enormous so removing it from admin privileges was both the right move and not something we have authority to overturn. As Deryck Chan says, we need a process imminently so that we have at least a sizeable quantity of iadmins while we squabble over the precise details. I would probably support a slightly more lax procedure but opposing doesn't argue for a less strict procedure; it just stops any procedure from being put into practice. I also think fears this would become RfA2 are unwarranted, as this is a very technical area that I wouldn't expect many users without substantial technical knowledge to watch closely. Bilorv(c)(talk) 19:11, 3 September 2018 (UTC)[reply]
  24. Support Admins need to stop seeing this as the masses rising with pitchforks with some kind of RfA sequel (maybe we are :'/), but more importantly, it's as Anomie said above. We're gravely underestimating what a compromised here-there might do. I doubt this proposal will be opened up to non-admins in the near future, every unbundling has an impressive amount of resistance; but the point about security questions is undebatable. --QEDK () 19:55, 3 September 2018 (UTC)[reply]
    Support: It's not a perfect solution, but it's definitely a step in the right direction. I need more time to thoroughly review this after reading more of those who opposed. Neovu79 (talk) 08:43, 4 September 2018 (UTC)[reply]
  25. Support Better is the enemy of good enough. --Ahecht (TALK
    PAGE
    ) 15:25, 4 September 2018 (UTC)[reply]
  26. Support - with even more conditions. IAs should be required to identify with the WMF. My concerns and reasons are noted below, under Oppose #1 by Courcelles. - wolf 18:58, 4 September 2018 (UTC)[reply]
    I would strongly oppose identification with the WMF as a requirement. Bureaucrats, those granting the right, are not required to identify. That aside, in all the time in which all administrators held this right, has it ever been used maliciously? Bottom line: the fewer roles that require identification to the WMF, the better; anonymity should be respected unless, quite frankly, the WMF forces those wishing to serve in a certain capacity to identify. — Godsy (TALKCONT) 19:26, 4 September 2018 (UTC)[reply]
    "...has [IA] ever been used maliciously?" - Not that I know of. Can you say for certain is hasn't? If not, we should do everything we can to ensure there is never a first time. But should that occur, we should be able to hold those responsible for the abuse accountable. That might require more than a simple desysop and a block. That's where identification comes in. Perhaps every anonymous user with access to this right should identify, considering the kind of access we're talking about here. - wolf 22:05, 4 September 2018 (UTC)[reply]
  27. Support this looks fair enough. This process isn't RfA, the bureaucrat isn't being asked to assess the consensus of the discussion. It just provides people with an opportunity to comment on the request. I don't think this should be given to all admins either. Admins who don't have the relevant technical experience shouldn't have the right. Hut 8.5 21:23, 4 September 2018 (UTC)[reply]
    It's not RfA v.2 indeed, but still a bureaucrat has to assess consensus of the commenters. Otherwise, you're suggesting that, even if the consensus of the commenters shows clearly the user is not suitable for the right, the bureaucrat can just disregard that and assign the permission since he "...isn't being asked to assess the consensus of the discussion.". –Ammarpad (talk) 07:17, 5 September 2018 (UTC)[reply]
    I'm suggesting it comes down to a judgement call by a bureaucrat. Obviously the bureaucrat will read the comments and take them into account when making the judgement call, but it is still down to the judgement of the bureaucrat and not the commenters. Hut 8.5 19:59, 5 September 2018 (UTC)[reply]
  28. Support I've said what I needed to say many times on this page, but in summary: Demonstrated need is the biggest requirement, not trust (admins already have proven that), and we need time to evaluate that someone meets this criteria. A week of waiting seems trivial for someone who doesn't regularly edit site/user JS/CSS (most of these accounts already have access!). I'd even be okay with 4 or 5 days, but definitely need more than 24 hours which was the original proposal. MusikAnimal talk 03:53, 5 September 2018 (UTC)[reply]
  29. Support seems fair. Dreamy Jazz 🎷 talk to me | my contributions 18:44, 8 September 2018 (UTC)[reply]
  30. Support Could be better, but this isn't bad. I think a shorter discussion time would be bad, a week is about right since it allows people who only edit on certain days of the week to be able to have a say. Ideally it wouldn't be arbitrarily limited to admins and there would be some provision for removing it from someone who remains active in other areas but hasn't made use of the right itself in a while (as in some of the counterproposals below). Anomie 00:11, 9 September 2018 (UTC)[reply]
  31. Support. Being totally open is a nice idea but the internet is no longer nice (for example, an admin was detained by state authorities until the admin divulged their password). Johnuniq (talk) 01:40, 9 September 2018 (UTC)[reply]
  32. Support. I'm not crazy about another RfA-like process, but I am willing to trust bureaucrats to ignore irrelevant material and make a sound decision. If process becomes problematic, we can revisit.--agr (talk) 01:59, 9 September 2018 (UTC)[reply]
  33. Support because of two very useful security measures: Automatic removal after inactivity, and demonstration of experience. This reduces the amount of unnecessary "hacking targets" and adds a level of community scrutiny for the dangerous privilege. A positive side-effect is that anyone with the rights will be aware of the enormous amount of trust and responsibility pressing on their shoulders. ~ ToBeFree (talk) 18:09, 9 September 2018 (UTC)[reply]
  34. Support. Looks fair and reasonable. Anarchyte (work | talk) 00:00, 10 September 2018 (UTC)[reply]
  35. Support. Seems to be the best among the lot. —Gazoth (talk) 03:39, 10 September 2018 (UTC)[reply]
  36. Support. It invites community participation, it invites the basic question of use/competence (filtering out "hat collectors"), and it's fairly lightweight. I doubt it will needlessly produce IAs, and it includes a balanced timeline for removal via inactivity, so minimizing the attack surface further seems needless to me. I'd support a two-factor authentication requirement as well once some of the UX limitations with that are hammered out, but we can always amend the process later. This isn't "perfect", but it's sane and balanced. ((Nihiltres |talk |edits)) 16:19, 17 September 2018 (UTC)[reply]
  37. Support To allow only those administrators who really need the user right. Anatoliatheo (talk) 09:07, 21 September 2018 (UTC)[reply]
Oppose (Sept 2)
Very weak oppose because of removal criterion #4, which appears to imply that interface-administrator is necessarily a position of higher trust than sysop. I can imagine an emerging troop of editors who hold templateeditor + interface-administrator but not sysop because they're technically highly competent to be trusted to edit important code, but not sufficiently diplomatically talented to be trusted with the delete and block buttons. #4 would also tie the hands of AN and ArbCom, preventing them from letting a user continue as interface-administrator but revoking sysop, which is something the community might like to try at some point in the future. Deryck C. 21:18, 2 September 2018 (UTC)[reply]
Though another discussion was closed which requires all applicants of the permission to be an admin to begin with. So that's not really debatable.—CYBERPOWER (Chat) 22:15, 2 September 2018 (UTC)[reply]
The proposed policy is a starting point more than it is a final policy and is more to get things going for those admins who want the tool back (even if they didn't want to take Xaosflux up on the opportunity to have the interim tool). There are a number of questions like "non-admins" that I think are reasonable, but I think there is a significant divide on that question that we should talk about it separately to "give the ones who knew how to use it before and had the permission before", which is the current proposal. --Izno (talk) 23:46, 2 September 2018 (UTC)[reply]
Point taken. Switch to support for now since it's better to have a granting policy than not to have one. Deryck C. 11:54, 3 September 2018 (UTC)[reply]
  1. Far too complicated a process for my taste, which is to just give it to all admins who ask. Courcelles (talk) 21:37, 2 September 2018 (UTC)[reply]
    The main objection to this approach when we discussed it before is that there will inevitably be administrators who ask for the right but never use it. As interface administrators essentially have the ability to run code on another user's computer, the intent of the process was to limit the size of the user group only to those that truly need it. The worry is that by opening it up to "any admin that asks", we risk inflating the user group in the long run and ending up with the same security problem we did before. Mz7 (talk) 23:37, 2 September 2018 (UTC)[reply]
    "...just give it to all admins who ask.". Sorry, but no. Make that hell no. We have, what? About 1200 admins? Do you trust every one of them right now? Every one? Including the ones that got the bit back in the days when it was given to anyone who asked for it? (RfAs passed in a couple days with a !vote of 6-0... not exactly "running a gauntlet"). What about admins that have shown some truly disturbing behaviour? Admins that have had their bit taken and returned? More than once? Would you trust every one of them with say, your banking info? But you would allow any one of them fuck around with your computer? "The ability to edit CSS/JS that is executed in other users' browsers is very powerful and potentially dangerous in the hands of a malicious user" Sorry, but no. We have many good admins, some great admins in fact. But just becasue they passed an RfA doesn't mean you truly know them, and it certainly doesn't mean you can trust all of them with that particular type of access. (and yes, I know these comments will be unpopular in some circles) - wolf 21:40, 3 September 2018 (UTC)[reply]
    I don't think the issue is trust... it's attack surface. I can't count how many times this has been reiterated on this page. Granting access upon request defeats the purpose. MusikAnimal talk 03:55, 5 September 2018 (UTC)[reply]
  2. I agree with Courcelles above. I'm really not crazy about following RFA's format either as I mentioned in the comments below. SQLQuery me! 21:51, 2 September 2018 (UTC)[reply]
    It only follows RFA format in the length of time. Maybe the policy should make it clearer that it is not RFA 2 and that the only judgement in the request for IA is whether the admin has technical trust rather than just the social trust garnered at RFA? --Izno (talk) 23:46, 2 September 2018 (UTC)[reply]
    There is an encouragement to keep it to technical ability, but no requirement to do so. I'm not sure what to say if you don't think that there are strong parallels here to RFA. The process described sounds identical to me. SQLQuery me! 00:31, 3 September 2018 (UTC)[reply]
    I get that, though I would say the intent is rather to mirror the process for WP:EFM rather than RfA. ~ Amory (utc) 01:14, 3 September 2018 (UTC)[reply]
  3. Oppose per Courcelles. I don't see why any admin who needs this cannot just have it, as they always have done so. I don't see the need for non-admins to have it either. Aiken D 22:19, 2 September 2018 (UTC)[reply]
  4. Oppose per Courcelles. I'm OK with this for non-admins requesting the right, but not for admins. This used to be something all admins could do, there was no enwiki consensus to remove this ability from admins, and it seems to me on that basis any admin in good standing should be able to request restoration of the ability to edit these pages. WJBscribe (talk) 22:46, 2 September 2018 (UTC)[reply]
    Regarding "all admins had this and now don't", realistically, if user scripts had been built today rather than 15 years ago (if they were built at all!), this user right would have been required from the start. Most admins neither need nor want this. I don't think it's unreasonable to ask admins to have some technical skill and to Know What They Are Doing; as it happens, most don't (and most probably have a reasonable approach on the point). --Izno (talk) 23:46, 2 September 2018 (UTC)[reply]
    On the other had, should we approve this proposal, that would essentially be a consensus that not all sysops should have it. At any rate, giving IA to any sysop and using the above process for non-sysops would have the opposite effect of the intent behind the change — it'd open up the right to edit these pages to more users, not fewer, creating a larger threat. ~ Amory (utc) 01:14, 3 September 2018 (UTC)[reply]
    That's assuming all admins request this permission. I trust admins to only request it if they have a genuine need for it, which will be a small subset of the total number of admins. WJBscribe (talk) 23:56, 3 September 2018 (UTC)[reply]
    @WJBscribe: kind of like how they only hold on to sysop if they have a genuine need.... From last months inactivity report of admins that "kept" that access see 1, 2, 3, 4, 5 examples of actual behavior. — xaosflux Talk 00:04, 4 September 2018 (UTC)[reply]
    Actually, I more had in mind edit filters as a comparison. It's not like every admin adds that for the sake of it... WJBscribe (talk) 11:14, 4 September 2018 (UTC)[reply]
  5. Like the previous four above me, it seems like an invitation for RFA round two. I'm fine with this process for those who are not admins, but admins have already had this ability and it should be readily given to them. Killiondude (talk) 23:13, 2 September 2018 (UTC)[reply]
    Re: admins have already had this ability, the point is that this ability was recently removed from all admins for security reasons, and now it can be added back to admins who request it and demonstrate a need. It would be unfair to give it more-or-less automatically to newly-minted admins, while the corps of current admins would have to request it specifically. — JFG talk 23:50, 2 September 2018 (UTC)[reply]
    Yes, I am aware of the background and proposal. I like Izno's thought above in reply to SQL. Killiondude (talk) 00:16, 3 September 2018 (UTC)[reply]
    I don't see this as necessarily a bad thing, there are quite a few admins who are not trusted by the community, or for whom this would essentially be their first RFA. --Rschen7754 02:34, 3 September 2018 (UTC)[reply]
  6. Oppose - Per Courcelles and WJBscribe. - FlightTime (open channel) 23:47, 2 September 2018 (UTC)[reply]
  7. Oppose Just make it the same as for the AbuseFilter. Most admins have never been vetted to be allowed to edit this, most admins are not vettted for the mediawiki namespace. This results in just another RfA-type process, frustrating the hell out of people, and capable people not getting access because some people have axes to grind, or because you have some broken mops in the cupboard. This is a slippery slope towards limiting access to the MediaWiki namespace or module namespace. We only need clear process for when the right was removed from you, that you are not allowed to self-reinstate. --Dirk Beetstra T C 03:38, 3 September 2018 (UTC)[reply]
    In addition to my earlier post (thinking about it a bit further), I will move to Strongly Oppose - I think that ALL admins should standard have this bit enabled (or at the very least enable it at will per my original comment), and only have it removed when they have grossly misused or abused it (where re-instating the right without discussion would be abuse of rights). The reason for that is that when someone with the bit does break the wiki I expect a large editor base to be able to revert to an earlier version, not just the few who have been specifically granted the bit. Admins have had this right for a long time, and most stay away from editing (as they stay away from the MediaWiki namespace) because they know of themselves that they do not have the capability to work in that area and that if they would break something there that the community would at least WP:TROUT them (I've seen enough blacklist requests of admins that knew that they could but did not want to because they were afraid to break something). The risk of them breaking something is minimal, and is outweighed by the need to quickly revert. --Dirk Beetstra T C 07:26, 3 September 2018 (UTC)[reply]
    The right was removed because it posed a demonstrable security risk to the Wikimedia projects. It’s not just about whether we can trust administrators not to misuse this ability, it’s about reducing the pool of accounts that attackers can compromise to run malicious code on someone else’s computer. To return the permission to all adminisrators would reintroduce the security flaw that was identified by the technical community. Mz7 (talk) 07:50, 3 September 2018 (UTC)[reply]
    @Mz7: Absolutely NOT convincing at all, and more a reason to strongest possible oppose to NOT hand it out to all administrators.  1) In all the years that administrators had this ability no account was compromised and subsequently used to insert malicious code.  2) even if we hand this out to a sub-significant number of accounts, those would be the accounts to hack (do you really think that a hacker who wants to exploit this would be so stupid as to try to hack a random admin account?).  3) if one of the now granted iadmin bit accounts is being hacked and that account starts to damage Wikipedia, there is only a small number of other accounts that can repair the situation (and blocking the compromised account is obviously not enough, admins cannot undo).  (and 4) there is no reason to hammer all opposers of this process as if we do not know why it was taken out).  --Dirk Beetstra T C 08:15, 3 September 2018 (UTC)[reply]
    While I'm on the oppose side for this specific RFC, I want to make sure I point out this threat is absolutely not imaginary, and has actually happened. example SQLQuery me! 08:41, 3 September 2018 (UTC)[reply]
    I know, the same goes for the not-imaginary f*ck up on that could occur on the MediaWiki namespace: once a mistaken edit on the meta spam blacklist resulted in all domains with a 't' to be blacklisted on all 700+ MediaWiki wikis (and many outside). The solution was a quick revert and then solve the problem, but that needs a significant pool of editors that can do said revert. Realizing where the mistaken edit (which complex broken regex?) took place may take time (there was significant time between the blacklisting and de-blacklisting, the blacklisting admin may already have been in bed).
    The paradox is difficult to solve - you want a small pool of editors that possibly could get hacked, but you want a significant pool of editors that can solve a problem in case one of the editors does get hacked, or one of the editors screws up. Or you have to completely take the right. --Dirk Beetstra T C 08:54, 3 September 2018 (UTC)[reply]
    I'm with ya there, and I probably placed my reply in a bad place. I just wanted to make sure we were all aware that this isn't a 'what if' situation. SQLQuery me! 09:13, 3 September 2018 (UTC)[reply]
    I think I'm just not convinced that anything but total removal of 'our' rights to edit the interface is going to solve this issue. We have about 300 active administrators here, but I think a 'healthy base' of interface admins would probably amount to at least half of that. You don't want a hacked piece of code to stay for anything more than 2-3 minutes, and a broken piece of software not more than about 30 minutes. With our current base of 6 interface admins I doubt that a smart choice of hacking an account (which leaves 5) of which 2 others are also asleep (assuming that those three are on the same side of the planet), 1 having dinner, and 1 doing something important at work .. that may be quite a bit longer. --Dirk Beetstra T C 10:17, 3 September 2018 (UTC)[reply]
    Meh - if there is a hacked piece of code, then that's enough of an emergency that the 30 or so pretty active stewards can act too and so can the crats. Granted, the amount should probably be more like ~15 or something, not 6, but I don't think 150 interface admins are needed. Galobtter (pingó mió) 10:25, 3 September 2018 (UTC)[reply]
    I think a solid base of 20 or so should be able to handle requests in a fairly timely fashion, and any incidental changes that arise. I'll add too that I think the worry is less about an accidental screw up and more that someone malicious can do something that would require devs to fix. Interface admins won't necessarily be able to undo it, but having fewer accounts capable of doing something like that reduces the threat. ~  Amory (utc) 14:26, 3 September 2018 (UTC)[reply]
    (edit conflict) If the risk is really so low that it is always quickly resolved, then there was no much reason to separate it, and to minimize the number of people who could possibly break it in the first place.  Still, I am also fine with the bureaucrats just handing out the bits 'at their own discretion' to people who can reasonably show that they need it. --Dirk Beetstra T C 14:32, 3 September 2018 (UTC)[reply]
    In reply to User:Xaosflux: I also would not be opposed to having non-admins this particular bit, but that I think that that does need a separate process.  --Dirk Beetstra T C 07:26, 3 September 2018 (UTC)[reply]
    This has repeatedly been said on this page (not just by me), but the issue is not trust, it's a matter of security, to reduce the attack surface (accounts that could be compromised in order to cause damage). AbuseFilter is child's play compared to what JavaScript can do. Can you use edit filters for monetary gain, to cause permanent damage to the site, to people's privacy, and consequently even potentially endangering people's lives? Of course not. Can you with JavaScript? Yes. No, it hasn't happened on enwiki yet, but it has elsewhere, and we shouldn't wait for it to happen here and then decide to change our ways. MusikAnimal talk 04:34, 5 September 2018 (UTC)[reply]
    @MusikAnimal: OK, we are now getting seriously in WP:BEANS territory, but this is implementing a false security. Again, whether we have 1, 10, or 100 editors with access to iAdmin, it does not matter except for maybe the amount of effort it takes to find someone with access to attack that is not having sufficient security levels (and if it is a proper hacker, they are not stupid). But still, my main problem is with the procedure of how to get the bit when you need it. --Dirk Beetstra T C 08:10, 5 September 2018 (UTC)[reply]
    Interface admin was carefully thought out by the technical community, including the security experts (not me :). It's the best we have right now. All I can say is a smaller pool of accounts to hack definitely helps, even if it's easy to see which accounts those are. MusikAnimal talk 16:21, 5 September 2018 (UTC)[reply]
  8. Oppose Per Courcelles. Further, I still haven't understood when or where did the community gain consensus to remove this right from administrators. Pending that, the default should be what Courcelles or Rob suggests – that administrators should be granted this right on request. Lourdes 05:02, 3 September 2018 (UTC)[reply]
    The right was removed from administrators on all Wikimedia projects as a consensus of the Wikimedia technical community, not by local projects, because it posed a significant computer security flaw. Mz7 (talk) 07:50, 3 September 2018 (UTC)[reply]
  9. Oppose per above. Admins were able to do this for years and no one blew up the wiki—those who shouldn't be screwing with something tend to know they shouldn't do that, and don't. If needed even occasionally or just for a few specific tasks, an admin should be able to request the right and just have it granted. They've already demonstrated community trust by passing RfA. Besides, given how people currently treat the RfA process and those who dare step into it, I don't want to make any more processes that are anything at all like it. Seraphimblade Talk to me 05:43, 3 September 2018 (UTC)[reply]
  10. Oppose - Per Courcelles and WJBscribe. Limiting the access is probably a good idea to prevent mistakes (I don't need or want the access, I have no interest) but any admin that requests it should automatically get it. This shouldn't be a "super admin" bit. I would even support admin being able to enable and disable the bit themselves, like abuse filter. I don't have a problem if the default state is "not enabled", but admin do not need Crats to decide if they are technically capable as we've already walked through the gauntlet and the community has decided our judgement can be trusted. Having the Crats decide who can and can't obtain the bit would be putting a new duty on Crats that I'm not convinced is a good idea. I'm neutral as to non-admin obtaining the bit, and see little harm, but there would need to be some process of community approval rather than just Crat approval, imho. Dennis Brown - 11:48, 3 September 2018 (UTC)[reply]
  11. Oppose per Courcelles and Dennis Brown. Admins are already trusted users and thus should be able to request any such right that allows them to improve the wiki without a new RFA-style process for creating "admin+" or "super admins" as Dennis aptly puts it. IA should be the same as the edit filter: Available when needed but not assigned to the majority of admins. That said, I personally still believe the whole IA change misguided anyway because clearly the last 15+ years have demonstrated the risks are minimal. But if we have to have this change, at least don't force admins to jump through hoops to get it. Regards SoWhy 13:42, 3 September 2018 (UTC)[reply]
  12. Oppose this talk page is a relative backwater. I still support having a 48 hour hold at BN, which is much more watched and transparent (and less likely for notices to be ignored.) That, and the fact that even if this were grant on demand means that we’d still have something like a 99% reduction in users with access means the security concerns here are really overstated: any restrictions here are good. The question of how good is relative and needs to be balanced with community usefulness. The safest would be to let no one have it, but it also wouldn’t be useful then. TonyBallioni (talk) 15:45, 3 September 2018 (UTC)[reply]
    @TonyBallioni: as far as visibility goes, there are just over 1000 watchers at BN, this proposal requires notices at AN (~4500 watchers) and VPT (~3100 watchers). — xaosflux Talk 16:09, 3 September 2018 (UTC)[reply]
    @Xaosflux: it’s the noise to request ratio. Any post at BN will have significantly more attention than a post at VPT/AN because things don’t get posted there often. Also, I generally have misgivings about letting people who are primarily technical contributors have control over technical things that impact other users: there is often a real disconnect, and having it not be as visible to the entire community runs the risk that we’d have artificially higher standards than the community as a whole wants. TonyBallioni (talk) 16:22, 3 September 2018 (UTC)[reply]
    @TonyBallioni: I got the impression from some of the earlier discussion that general notifications aren't useful - but this could easily be integrated to T:CENT or MediaWiki:Watchlist-messages. Alternatively, adding WP:BN to the places to notify could be added in without otherwise cluttering up BN. — xaosflux Talk 16:33, 3 September 2018 (UTC)[reply]
  13. Oppose anything beyond a hold and a clearly-stated need. Specifically, oppose requiring admins to go through an RFA-like process just to get access to do something the community never even agreed to remove from their toolset. I understand restricting access to this, but a hold and need accomplishes that. ~ Rob13Talk 16:39, 3 September 2018 (UTC)[reply]
    @BU Rob13: what sort of potential opposition are you trying to say should be invalid? It should be trivial for 'crats to apply "less weight" to opposition along the lines of "I don't like BU Rob13", but I don't think we should disregard something like "Oppose, BU Rob13 was admonished by ArbCom last week for edit warring in the MediaWiki space". — xaosflux Talk 16:50, 3 September 2018 (UTC)[reply]
    I'm saying anything along the lines of oppositions based on lack of trust should be invalid. If we genuinely don't trust an admin to be able to use this, they shouldn't be an admin. I trust admins not to mess with this/request this if they aren't technically able. I trust them not to edit war, etc. ~ Rob13Talk 19:17, 3 September 2018 (UTC)[reply]
  14. Oppose This is a technical right and yet, unlike other technical rights, this is being reserved for admins who can have it at the asking so long as there isn't political resistance from the hoi polloi. If WMF, in the depths of their ignorance, will not simply allow admins to edit JS/CSS, then we need a thought-out selection process for technical editors or we're just passing out candy. Chris Troutman (talk) 17:53, 3 September 2018 (UTC)[reply]
  15. Oppose - Given the result of the section above requiring Sysop, we really only need to answer three questions when evaluating an IA request: Has anything come up since the RFA that massively changes the trust the community has placed in them? Are we confident that the same person is in control of the account? Does the user have the technical skill to evaluate complex JS/CSS to ensure it does what it is expected to do and is not malicious? Those are the only germane questions. The solution, therefore is not to create another pseudo-RfA, and subject users to another broken inquisition-like process where anything and everything should be dredged up. Instead the discussion should be shorter, lasting only 2-3 days, and advertised only to the boards that can speak to those questions (VPT and BN), and not to broader community boards, where people will bring up points unrelated to the questions above. We also need an aggressive clerking system to filter out and strike comments that are not very explicitly germane to one of the above questions. This proposal results in a new RfA being formed that will ultimately discourage qualified admins from applying. (On a sidenote, it is a perfect application process for non-admins if sysop as a requirement gets overturned. I'd hate to force someone like Enterprisey to go through an RFA just so they can apply for this. Tazerdadog (talk) 19:55, 3 September 2018 (UTC)[reply]
  16. Oppose This should be looked at by bureaucrats and nothing more. Give the right to them if they ask unless there is a history of problematic usage of the right. If you want non-admins to have this right, then set up a different process. Nihlus 21:19, 3 September 2018 (UTC)[reply]
  17. Oppose - Bureaucrats should grant this as necessary. No need to create another RfA-like process. — Godsy (TALKCONT) 03:22, 4 September 2018 (UTC)[reply]
  18. Oppose per WJBScribe. The need to be able to understand js/css script is unnecessary. Can I write code? No. Can I read an edit request on a js/css talk page, confirm that the person making the request understands what they are doing and that there is consensus to make the change? Yes. That is all that is required, and therefore the permission should be given to all admins on request. (Also it would allow me to change css/js on my alternative account without the need to log in separately.) Voice of Clam (formerly Optimist on the run) (talk) 14:06, 4 September 2018 (UTC)[reply]
  19. Oppose per Voice of Clam, TonyBallioni, and SoWhy. I can see this quickly devolving into RfA 2.0, we don't need that. Supporting the alt proposal below. — Insertcleverphrasehere (or here) 00:28, 5 September 2018 (UTC)[reply]
  20. Oppose Making people jump through hoops again just to do something that they had been able to do for years is downright silly. It should be a simple process, not another vote. OhanaUnitedTalk page 01:04, 5 September 2018 (UTC)[reply]
  21. Oppose In general, I don't think that the RfX processes here are really set up to check someone's technical and security skills, they focus on social/policy skills. The former are more important than the latter for Interface admins while the latter get more focus in regular admins. Maybe I'd agree with an RfA-like process for non-admin Interface admins but not in general. Jo-Jo Eumerus (talk, contributions) 15:25, 5 September 2018 (UTC)[reply]
  22. Oppose per Courcelles and WJBscribe, and the above in general—I think the bureaucrats can, and should, handle this. Ale_Jrbtalk 14:28, 9 September 2018 (UTC)[reply]
    Addendum: I think it's a good idea to note, regarding security, that the only part of this proposal that meaningfully improves security is the one week delay—and that is already pointlessly long. If someone doesn't notice their account is fully compromised after 48 hours, I'm unconvinced that an extra couple of days will make a difference. A technical restriction, such as "must have had 2FA enabled for >1 month", could serve a useful purpose. However, if an already-trusted account (which basically all sysops fall into by definition) is compromised, then the need to post here for an RfA-style process as opposed to a bureaucrat request is irrelevant, as the decision will be de facto based on the account history regardless. If it's instead a question of who is trusted to make the changes, then I'm also opposed to a second version of RfA for granting technical rights, but it's also no longer reasonable to claim that the main purpose is improving site security. Ale_Jrbtalk 21:56, 11 September 2018 (UTC)[reply]
  23. Oppose Does looks like RfA 2.0. Give it to only those who are truly interested. Kraose (talk) 07:35, 10 September 2018 (UTC)[reply]
  24. Oppose, far too bureaucratic and inefficient. WaggersTALK 11:48, 10 September 2018 (UTC)[reply]
  25. Oppose per Courcelles and WJBscribe. I don't think turning this into another RfX process is good. Yes, this was taken away for security reasons, but I think the security concerns were mostly unfounded. I think any admin should be able to get this tool if requested, and I think it should be similar to the abuse filter tool where they can turn on the bit themselves. If people really want a "check and balance" I'd be fine with having it required that crats twiddle the bit. I don't know that it would make any difference either way, though. ···日本穣 · 投稿 · Talk to Nihonjoe · Join WP Japan! 20:25, 11 September 2018 (UTC)[reply]
  26. Oppose Well-intentioned but too bureaucratic a process. If we can't trust admins to not intentionally obtain and misuse the interface administrator permission, they cannot be trusted to not jump through the hoops put up by this process and then do the same either. Restricting the permission to admins who self-certify that they know what they are doing and that they need access to the tools suffices to limit unintentional misuse. And that frankly is the best we can hope to do unless we decide to go the whole-hog and require revelation of real-life identities and signing of legally-enforceable agreements from holders of these permissions. Abecedare (talk) 21:49, 11 September 2018 (UTC)[reply]
  27. Oppose per Nihonjoe and Abedecare. Too much bureaucracy. De728631 (talk) 01:11, 12 September 2018 (UTC)[reply]
  28. Oppose Credit admins with the intelligence to ask for it if they need it, and are comfortable in using it. Stephen 02:19, 12 September 2018 (UTC)[reply]
  29. Oppose, I appreciate the intent behind reducing potential attack surfaces, but the proposed RFX process is unnecessarily bureaucratic and encourages "hat collecting." Titoxd(?!?) 02:26, 12 September 2018 (UTC)[reply]

Discussion (Sept 2)

Alternative / modified proposal: Grant for admins on request without process

A number of editors have expressed their opposition to the proposed implementation for creating too many hurdles and a number of supporters have explicitly only supported just to have any process in place, however flawed. I thus propose that instead of implementing a flawed process and trying to fix it later, we KISS and just implement a simpler process now and think about a more difficult process if (and only if) this process does not work out:

Process for requesting

Administrators who wish to request this permission may make a new request at Wikipedia:Bureaucrats' noticeboard (WP:BN). Bureaucrats are authorized to grant the permission to any administrator asking for it without any further requirements. Administrators are encouraged to only request the permission if they plan to use it continuously and request one-time edits at WP:IANB instead. Administrators are expected to relinquish the permission if they no longer need it.

Removal of permissions

Permission should be removed by bureaucrats in the following circumstances:

  1. Interface administrators who have made no edits or other logged action for at least 2 months or who have made no edits using the permission for at least 6 months should have the user right removed.
  2. Voluntary request by the interface administrator at the bureaucrats' noticeboard.
  3. After misuse of the access by consensus (e.g. at Wikipedia:Administrators' noticeboard).
  4. Upon removal of administrator access, for any reason.
  5. By request of the Arbitration Committee.

I think this addresses the concerns of those favoring a stricter process by imposing shorter limits on acceptable inactivity, thus reducing risks of accounts being inactive while having the right. After all, if you can get the right by just asking, you won't mind relinquishing it whenever you are inactive for a period of time. Thoughts? Regards SoWhy 17:48, 3 September 2018 (UTC)[reply]

Discuss Alternative / modified proposal

@SoWhy: I think the best place for one-time edits would be to use the edit request process on the associated talk-pages, they would be more likely to be seen by watchers of those pages. — xaosflux Talk 18:27, 3 September 2018 (UTC)[reply]
@Xaosflux: Yes but that requires that those pages are monitored. Not all those pages are watchlisted at all or by all IA permission holders. On the other hand, they probably all monitor the IANB, so requests there will likely be seen by more editors. Regards SoWhy 19:10, 3 September 2018 (UTC)[reply]
I missed this comment earlier, but I'm with Xaosflux on this. We shouldn't pull history away from the relevant talk pages, and folks should continue to use edit requests, as they do now. My intent when making the board was to help fuel a discussion above. To quote myself below, [t]he initial intent of IANB was to have 1. a place where IA nominations (and removals) could be discussed (like the edit filter) and 2. to discuss bigger-picture edits, perhaps involving coordination amongst editors. ~ Amory (utc) 11:46, 4 September 2018 (UTC)[reply]
The only reason I can think of is if the admin is currently under discussion at AN/ARBCOM with the threat of desysopping. But even then, a 24-hour-period like for resysops should suffice. Regards SoWhy 19:18, 3 September 2018 (UTC)[reply]
I'm no expert but I'm pretty sure a bot could do that, no? Regards SoWhy 19:18, 3 September 2018 (UTC)[reply]

Alternative proposal with waiting period

Because of popular demand, here's a proposal that tries to address the comments above while still keeping it simple:

Process for requesting

Administrators who wish to request this permission may make a new request at Wikipedia:Bureaucrats' noticeboard (WP:BN). Bureaucrats are authorized to grant the permission to any administrator asking for it without any further requirements after an 48-hour waiting period (similar to the process of re-granting administrator status after inactivity) for first-time requesters; administrators whose permission was removed within the last two years for inactivity or voluntarily can be re-granted the permission without a waiting period. Administrators are encouraged to only request the permission if they plan to use it continuously and request one-time edits at WP:IANB using the process for requested edits outlined on this page instead. Administrators are expected to relinquish the permission if they no longer need it.

Removal of permissions

Permission should be removed by bureaucrats in the following circumstances:

  1. Interface administrators who have made no edits or other logged action for at least 2 months or who have made no edits using the permission for at least 6 months should have the user right removed.
  2. Voluntary request by the interface administrator at the bureaucrats' noticeboard.
  3. After misuse of the access by consensus (e.g. at Wikipedia:Administrators' noticeboard).
  4. Upon removal of administrator access, for any reason.
  5. By request of the Arbitration Committee.

This adds a waiting period for first-time requesters while still making it simple to gain and lose the permission for already experienced admins without having to wait 48 hours each time, thus promoting a voluntary removal. Regards SoWhy 09:56, 4 September 2018 (UTC)[reply]

Collapsing large and over-length comment ~Oshwah~(talk) (contribs) 15:20, 4 September 2018 (UTC)[reply]
That "process" is so full of holes any "letter of the law" administrator could use to go from having been "de-sysoped" years ago right back to having the "mop" plus a "right" that what, all of a dozen or so "interface adminstrators" seem to have ever used period but now seems to be quite the "essential" right to "regain" like suddenly being told they're "losing" something they may not have known they "had" or even known how to use that the ways an "existing administrator" could "wiki-lawyer" his or her way into "promoting" themselves right to "interface editor" simply by going to the Arbitration Committee and "requesting" that "access" (which can't really BE misused while actual EDITS USING IT are an entirely different story - one of those holes in your "process" I mentioned so nobody can demand an "example" of a hole in the process begging to be exploited) without the "casual observer" of RFAs having any idea an "existing administrator" with whom they may have differences is suddenly "interface administrator" and with a new "tool" that seems to make possible editing user and talk pages so their "owners" could be unable to find or access them. Or even EDIT them. I'm completely ignorant on the whole .css and .js things and couldn't code my way into my own home security system if I had one, but a "right" or "access" that has been used so rarely by so few editors and so many of them only having used it a few times and long ago must be really something special all of a sudden since so many "existing administrators" are just proposing and discussion and debating up a STORM to make sure "existing administrators" get it back even if they've never used it before. And oddly enough the list of editors who have used it and the list of very interesting and involved "existing administrators" who are suddenly very concerned with regaining "access" and "protecting" it hardly overlap at all.
I've even seen "existing administrators" requesting the "temporary" rights and....justifying would be the right word, I guess...their "access" and its "return" so they can keep doing what must be important work that requires it but they don't show up on the list of interface editors who have actually used it. Makes me wonder just how qualified "sysops" who seem to be pretty unfamiliar with that "access" and their own use or non-use of that access they're so concerned about really are operate a "system" nobody ever seems to mention as their "priority" during an RFA. Not only does that access have to be something only a tiny fraction of a percent of all admins ever have "needed" to use, it has to be the most "unused" access and "tool" in history still considered "necessary" since that relative handful of editors have only edited with it maybe 400 times in its whole history and HALF of those are "recent" and were performed by two editors with one of those two responsible for 90% of that half.
If I'm not mistaken there is already a process for getting "temporary" interface administrator privileges and I believe somewhere around 5-10 "temporary" interface administrators already have had their "access" returned and I think those 5-10 individuals are the only "existing administrators" and ACTIVE EXISTING ADMINISTRATORS on the "all-time user list". Its hard to imagine something so "useless" is really something that "existing administrators" who have never used it should be spending so much time "proposing" and "discussing" alternative ways to get "temporary" access the only experienced interface administrators and a majority of the interface administrators to have ever used it have "temporary" access to. And what "inactive administrators" who were "de-sysoped" years ago could want or need with that "bit" or "mop" so badly it would drive them to decided to pick up their original "bit" or "mop" again and start doing the work they were "elected" to do after an extended "Wikibreak" from "sysoping" is something apparently only you know. So could you provide an example of a situation where that would be the case and maybe toss out a quick "plain English" summary of what that "access" gives "interface administrators" the ability to do so non-coder Java Script "virgins" like me at least know what kind of "power" administrators who have never used it will suddenly be wielding for the first time ever? I say "wielding" because your "process" also mentions that they're "expected to relinquish" that "access" when its no longer "needed". More "holes" but someone reading that in GOOD FAITH and TRUSTING an "existing administrator" to not be "wikilawyering" a bunch of "loopholes" into a process might assume that in an "emergency" for some important and heretofore unnecessary "sysoping" an "existing administrator" would NEED to go straight to Arbcom with their sudden request for "temporary" access and of course not being "first-time requesters" and "trusted" existing administrators "exempt" from a "48-hour waiting period" for a "temporary" access.
And some further expansion on the "process" for "relinquishing" the access as they would be "expected to" might be nice. And on the subject of "first-time requesters" and the "48-hour waiting period" before THEIR "temporary" access could be "approved", just what is a "first-time requester" in that process and why would someone who has never "requested" that "bit" or "mop" suddenly need it but yet could wait 48 hours or MORE to get it? Its just kind of strange that an "emergency" for a "first-time requester" could "wait" while an "existing administrator" even if "inactive" for YEARS would just need to "request" access and they could be an "interface editor" apparently IMMEDIATELY and with a "consensus of one" since you don't really mention any specifics about "Arbcom" and just what "authority" to "approve" or "grant" that access your "proposal" empowers them with would actually require FROM THEM in the way of "discussion" or "consensus" and how many "Arbom members" even need to have that access "requested" from them.
Seems like an "existing editor" could sure end up with a fast-track to a whole new "position" and that ARBCOM MEMBERS THEMSELVES could "approve" or "grant" THEMSELVES that "access" and "re-sysop" themselves even if THEY "lost" or were "denied" the "bit" or "mop" in the past and regardless of when, why, how many times or for what reasons. And all it takes is a "first-time request" to go from "48-hour wait" to "front of the line". Hmm. Can you elaborate a little on what kind of "first-time request" is required for that VIP front of the line treatment? And are you talking about "administrators" ONLY being permitted to request that "temporary" access and is their "administrator" status - of whatever specific "type" such as "inactive" or "existing", etc - the real "protection" of that "access" someone might think is the whole point of your "process" because "administrators" already had it and therefore should have it again?
I'm assuming their "first-time request" for that "access" that was "bundled" in with the "bit" or "mop" whether they knew it or not so they had it previously and are therefore "qualified" to have it "restored" - temporarily and only as "needed" of course - would be considered their "RFA" and hopefully a SUCCESSFUL "first-time request" that was SUCCESSFUL is REQUIRED so a "non-existent administrator" who was maybe denied or "lost" the "bit"or "mop" can't game the system and jump right back to "interface editor" maybe even after having been "desysoped" by the community. Sure seems like someone so concerned about protecting that "access" would be much more specific in a "proposal" and would call it more of a "draft" and would have an RFC on it somewhere rather than throwing it out there as a "cut and paste" policy all packaged up and ready to go and without any "consensus" having ever been reached on whether or not that "access" which was "removed" is SUPPOSED to be "restored" to every "administrator" who wants it but has never used it.
From what VERY little I know about that "bit" or "mop" and judging by the removal of that "access" from all but "interface editors" who have USED IT PREVIOUSLY, the primary concern and reason FOR restricting "access" TO "interface editors" who have USED IT was that it could be used or abused by "sysops" who are clearly WP:NOTHERE if they spend their valuable "free time" editing scripts or codes or whatever on pretty much anybody's user and/or talk pages. Certainly plenty of "existing administrators" have very strong feelings about the "unwelcome" and "uninvited" editing of their OWN talk and user pages period so what would they say if some "existing administrator" who may have been an "inactive administrator" maybe "desysoped" YEARS AGO and "missing" for years suddenly returned from the dead and "gamed the system" to get that "bit" or "mop" and started editing scripts or code or whatever on THEIR user or talk page? And exactly WHAT could THEY do about it except "edit war"?
I think there needs to be a lot more discussion about what exactly is being "accessed" and why its suddenly so important to a relative handful of "existing administrators" who have never used that access that they not only have it "restored" to them but be so involved in "proposing" just how, when, where and why and to whom that "access" IS "restored". Presumably as "sysops" and trustworthy and capable and qualified "sysops" it never would have been "restricted" if whomever did the "restricting" considered every "administrator" worthy of the "access" simply because he or she hasn't used or abused it previously. I'm also pretty sure that "proposals" for how to "restore" that access were being drafted, posted and debated and "existing administrators" were more or less "demanding" it be restored before they even knew what they had "lost". And I wouldn't call any "existing administrator" who claims they need it "restored" to continue to do whatever work they were doing prior to "losing" it "worthy" of access they either have used but have somehow don't show up on the "all-time user list" OR mistaking for some other "bit" or "mop" they have used. Or think they've used.
I'm kind of reminded of kids who will completely ignore a toy they received as a gift and don't like and don't want and would just as soon throw away as look at and be reminded asking for a specific gift and getting it are two different things suddenly falling in love with that gift if a sibling or other relative starts playing with it or a parent threatens to or actually does give it away to someone who will appreciate it. Its also amazing how often the same "existing administrators" who "strongly oppose" any change to Wikipedia that gives "editors" more or easier access to simple "tools" that "existing administrators" seem to "grant" to "registered users" and that are otherwise in the "administrator toolbox" and without "consensus" that a mere "editor" should be "granted" ADMINISTRATOR TOOLS, or who ban/block/restrict "users" and "editors" who somehow offend them with no "consensus" (unless its that "consensus of one" thing again) and "indefinitely" and even REVOKE THE USER'S OR EDITOR'S TALK PAGE ACCESS RENDERING HE OR SHE UNABLE TO "APPEAL" THEIR ARBITRARY ACTIONS THAT HAVE NOTHING TO DO WITH "OPERATING" ANY "SYSTEM" OR ANY OF THEIR OTHER "BITS" OR "MOPS" AND WHEN THAT USER OR EDITOR WOULDN'T EVEN BE ON THEIR "RADAR" IF THEY DIDN'T EDIT THINGS LIKE "ABUSE FILTERS" AND IN GENERAL "VANDALIZE" WIKIPEDIA AS THEY PLAY "CYBER COP" WHICH ISN'T "MOPPING" OR "PULLING A CART" AT ALL. They think its their "duty" to block/ban/delete/attack/belittle/abuse anybody and everybody who doesn't "comply" with their "requirements" for what is "acceptable" existence on and inclusion in "Wikipedia". But when a "right" or "access" or "tool" they probably didn't even know existed and they had suddenly is "threatened" and they find out about the "threat" because "administrator" and/or "right" and/or "access" and/or "tools" and/or "edit" trip some "filter" which causes some "bot" to immediately notify them of where, when, how, why and who somebody is DARING to reduce/restrict/remove THEIR "access" to ANYTHING and EVERYTHING they can possibly "edit" on Wikipedia, the "rescue party" of "existing administrators" who have "protect all administrator power at all costs" as one of their "areas of focus" on Wikipedia, well....I think your "process" and all those "proposals" and how suddenly important "debate" and "consensus" and "politeness" and "good faith" become to "existing administrators" who otherwise seem to be here only to "build an encyclopedia" by making sure THEIR "contributions" stay and everything that isn't up to their "standards" - including people just trying to contribute - end up "restricted". — Preceding unsigned comment added by 68.234.100.169 (talk) 15:16, 4 September 2018 (UTC)[reply]
Discuss alternative proposal with waiting period

Alternative proposal, with 'indication of need'

Process for requesting

Administrators who wish to request this permission may make a new request at Wikipedia:Bureaucrats' noticeboard (WP:BN). Bureaucrats are authorized to grant the permission to any administrator who can, within reason, show needdemonstrate use[Amended 17:22, 8 September 2018 (UTC)] for the permission. Bureaucrats are encouraged to hand out the access for a limited time, sufficient to complete the intended tasks, and to only hand out long periods to administrators who have repeatedly shown need and use for the permission.

Removal of permissions

Permission should be removed by bureaucrats in the following circumstances:

  1. Voluntary request by the interface administrator at the bureaucrats' noticeboard.
  2. After misuse of the access by consensus (e.g. at Wikipedia:Administrators' noticeboard).
  3. Upon removal of administrator access, for any reason.
  4. By request of the Arbitration Committee.

And with 'limited time', I mean up to a week. (and with this, one could even hand this out for a day to a non-admin). --Dirk Beetstra T C 15:01, 5 September 2018 (UTC)[reply]

Comment: I have ran this query. In the last 3 months only 40 .js/.css pages in the MediaWiki namespace were edited. Spot check on some of them for edits in that period: vector.css got 1 edit, timeless.css got 2 edits in 1 day, RefToolbarLegacy.js 2 edits 1 month apart. That hardly seems to warrant anyone getting 'permanent' access to iadmin. For most actions a couple of hours is more than enough. If security is a big deal, no-one should have access, and only request short-term access when they need it (and there it should be given fast).

@Xaosflux: This is neither a test edit nor a bot process, so that section does not apply. Only those two types of edits are allowed by bot accounts in their own userspace. @Beetstra: To be very clear, my comment was meant for you to use to demonstrate "need" in a future request for IA. In a very real sense, what you were told to do when you applied for IA above is a policy violation, which the editors in that discussion did not understand. That is sufficient to get the right. ~ Rob13Talk 11:44, 8 September 2018 (UTC)[reply]
@BU Rob13: if you truly think the spirit of Wikipedia:Bot_policy#Valid_operations_without_approval prohibits using a bot flagged account to manually edit its own configuration page hosted in its own userspace, to make a Small change, for example to fix problems or improve the operation of a particular task as in changing from User:Bot/config1.css to User:Bot/config1.json let's follow this up at WP:BOTN or WT:BOTBOL. This is certainly the wrong venue for this discussion. — xaosflux Talk 16:07, 8 September 2018 (UTC)[reply]
@BU Rob13: We should not need to 'demonstrate need', use is enough (I should reword my proposal). That is the problem. The elitarian 'do it in a different way' by editors who themselves have hardly any reason to use more than once every two weeks.
@Xaosflux: I still think that that type of editing falls under IAR. I can hardly see it as controversial to improve Wikipedia in this way, and would call enforcing that as policy overly bureaucratic. Seems to go around here, bureaucracy. --Dirk Beetstra T C 17:01, 8 September 2018 (UTC)[reply]
Oppose The original proposal in this RFC is better. This also lacks any provision for removal based on inactivity beyond encouraging 'crats to do so when handing it out. This could work as a process for (temporarily) regaining the permission after it was removed for inactivity-in-the-area after being granted per the original RFC. Anomie 00:28, 9 September 2018 (UTC)[reply]
@Anomie: the crux of my proposal there is that expiry shouldbe fast (and the bar togrant next to zero), order of hours to days. On most accounts that I checked activity means an hour or two now, then hundreds (to thousands) of hours of inactivity. I trust that if ever we get iadmins with long periods of having the bit (for which the need seems unlikely .. we really never edit .css and .js in NS#8), that I think that or there should still be a 'refresh cycle' every 6-12 months, or except that that account loses the bit when s.o. notices their inactivity (in this field). --Dirk Beetstra T C 04:00, 11 September 2018 (UTC)[reply]

Alternative proposal, quick expiry only

Process for requesting

Administrators who wish to request this permission may make a new request at Wikipedia:Bureaucrats' noticeboard (WP:BN).  Bureaucrats should hand out the access for a limited time (1-5 days), and to only hand out long periods to administrators who have repeatedly/continuously shown need and use for the permission.

Removal of permissions

Permission should be removed by bureaucrats in the following circumstances:

  1. Voluntary request by the interface administrator at the bureaucrats' noticeboard.
  2. After misuse of the access by consensus (e.g. at Wikipedia:Administrators' noticeboard).
  3. Upon removal of administrator access, for any reason.
  4. By request of the Arbitration Committee
  5. After 3 months of not using the access (for administrators who have acquired long-term access).

As above the main 'problem' seems to be that the people have problems with administrators needing to explain themselves what they want to do, etc., here a proposal without any need for explanation of why one would need the bit.

I still believe that keeping the bit for long time on administrators drastically increases the chance that the account gets compromised while having the bit. This also minimizes the risk of compromised accounts having long-term access to the bit (short term access is easier to monitor and decreases the window of access). --Dirk Beetstra T C 07:04, 13 September 2018 (UTC)[reply]

Comments (quick expiry only)

General discussion

It's a little discouraging that we've had a lot more discussion on images to be used than the pros and cons of the different aspects of each proposal with respect to the risks they address. So I thought I would start a list; feel free to add on and modify it. isaacl (talk) 18:43, 8 September 2018 (UTC)[reply]

Side note: There’s been a bit more discussion than what’s currently on this page. Some of it is archived at Wikipedia talk:Interface administrators/Archive 1. Mz7 (talk) 21:53, 8 September 2018 (UTC)[reply]
Yes, I participated in it. Twice I've asked for a discussion on what risks are being mitigated by various parts of each proposal, and both times there's been no follow up. I understand people just like to vote on whole proposals. Personally I think doing this analysis would have helped avoid the proliferation of proposals. Anyway, it's in the past now; nonetheless, I thought it may still be useful to examine how the proposals address the various risks. isaacl (talk) 00:58, 9 September 2018 (UTC)[reply]

Risk: number of interface-admin-privileged accounts to attack being larger than desirable

Approaches to address this:

Risk: interface-admin-privileged accounts being unknowingly compromised

Approaches to address this:

Risk: administrative overhead discourages editors from obtaining privileges to Wikipedia's detriment

Approaches to address this:

Closing

Discussion above has slowed, and there are lots of ideas spread among the sections above, I suggest an uninvolved admin (or small group) review the above and get a closure together - which could incorporate provisions from each of the sections. Some of the criterion that I think should be included (not all equally important) are below. There may be more or less as determined by the closer(s).

Thank you! Does anyone have anything to add as for what we are looking for from a closure? — xaosflux Talk 15:17, 30 September 2018 (UTC)[reply]
The discussion above is closed. Please do not modify it. Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.

Undeleting

Another job for interface administrators is undeleting or deleting user .js or .css pages. For example there is an outstanding request here: Wikipedia:Requests for undeletion#User:FlightTime/Mark-blocked.js. Normally I would be doing undeletes of these user .js pages, but that now needs an interface administrator. Does anyone here want to action the request? Graeme Bartlett (talk) 04:05, 18 September 2018 (UTC)[reply]

Note when I attempt to restore I get a partly misleading message:
"Permission error
You do not have permission to view a page's deleted history, for the following reason:
The action you have requested is limited to users in one of the groups: Administrators, Oversighters, Researchers, Checkusers."
So probably some mediawiki page needs updating. Graeme Bartlett (talk) 04:12, 18 September 2018 (UTC)[reply]
The issue with the error message is phab:T203083. — JJMC89(T·C) 04:37, 18 September 2018 (UTC)[reply]
That is exactly what I described! Also phab:T202989 applies. So no more need to discuss here, though note ability to see a deleted revision could allow cooperation with a user to recreate a page. So its not totally useless. Graeme Bartlett (talk) 07:55, 18 September 2018 (UTC)[reply]

:So my next question is where is the page to ask for actions from an interface administrator? (as per the undelete/delete requests for user .js/.css?) Graeme Bartlett (talk) 07:55, 18 September 2018 (UTC)[reply]

OK the answer is Wikipedia:Interface administrators' noticeboard. Graeme Bartlett (talk) 08:04, 18 September 2018 (UTC)[reply]

Geonotices

The following discussion is closed. Please do not modify it. Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.


As that page is widely edited, and it is basically a 'settings' page (not true script), would it not be worth to turn that into a regular MediaWiki page so it can be edited by all admins again? The current situation with that particular page is rather disruptive, and many editors basically now need the bit solely to edit that page. --Dirk Beetstra T C 14:50, 18 September 2018 (UTC)[reply]

Is this technically possible? I had thought that something more involved was necessary (phab:T198758), but if not we should just do it. I don't think anyone in this discussion has objected to admins using geonotice as before.--Pharos (talk) 15:10, 18 September 2018 (UTC)[reply]
There is a text on the notices page that states 'Currently, MediaWiki:Gadgets-definition specifies the geonotices to be listed at MediaWiki:Gadget-geonotice-list.js.' I have to parse this gadget better, but I have the feeling that there is a JSON parse of that .js. Movi g the .js to a .json andpointing the script there may be sufficient. .json is freely editable (by admins). --Dirk Beetstra T C 15:29, 18 September 2018 (UTC)[reply]
So, one option is having a bot regularly (~5 minutes) copy the text of some fully-protected page into MediaWiki:Gadget-geonotice-list.js. This isn't optimal from a security standpoint, but at least we could block the bot instantly if it edits any other page. Enterprisey (talk!) 21:16, 18 September 2018 (UTC)[reply]
The advantage to JS here is that it is behind ResourceLoader, which wouldn't be the case for JSON. We might want to give phab:T198758#4473145 a try, just to see if that works (using something other than geonotice for testing!). I'm confused how wikitext is any better than JSON, as it would seem we'd have to source it on every page load, too? I'll ask Tgr about it. If that doesn't work, then Enterprisey's idea to use a syncing bot seems like a viable alternative, at least until the core issue is resolved. I would be happy to help with that. MusikAnimal talk 22:08, 18 September 2018 (UTC)[reply]
Wikitext has transclusion; but ResourceLoader loads the source, not the rendered version, so of course that didn't work. The bot is not a bad approach security-wise, as long as it actually verifies that the content is JSON (and it is set up safely). --Tgr (talk) 00:33, 19 September 2018 (UTC)[reply]
I don't think it would be too bad to IAR our way through a intadmin-bot BRFA, but we should have a VPPR discussion about it first. I don't think waiting for the current granting-process discussions to conclude would be necessary, either, as this is a somewhat different issue. Enterprisey (talk!) 08:00, 19 September 2018 (UTC)[reply]

Proposal: Bot-synced geonotices

As a temporary measure until T198758 is fixed, a new fully-protected page will be created at Wikipedia:Geonotice/list.json, and a bot with the intadmin permission will copy the text of that page to MediaWiki:Gadget-geonotice-list.js every five minutes. This means all admins will be able to update geonotices again. The bot will verify that the text has only JSON and that it won't cause issues when copied; the bot will still have to go through a BRFA. Enterprisey (talk!) 19:03, 22 September 2018 (UTC)[reply]

  • PS, Enterprisey pointed me to Special:ListGroupRights#interface-admin, which notes that the interface administrator user group doesn't have any general admin rights except editing MediaWiki pages; interface admins can't unblock themselves unless they're also administrators. Nyttend (talk) 04:04, 23 September 2018 (UTC)[reply]
The discussion above is closed. Please do not modify it. Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.