[Bug 40968] Add protocol parameter to mw.Api.

2012-10-14 Thread bugzilla-daemon
https://bugzilla.wikimedia.org/show_bug.cgi?id=40968 --- Comment #6 from Tyler Romeo tylerro...@gmail.com 2012-10-15 05:05:44 UTC --- The only problem is that I do not want to fail when not over HTTPS. There needs to be some way for the user to be forwarded to HTTPS when they try to log in.

[Bug 40968] Add protocol parameter to mw.Api.

2012-10-12 Thread bugzilla-daemon
https://bugzilla.wikimedia.org/show_bug.cgi?id=40968 --- Comment #5 from Krinkle krinklem...@gmail.com 2012-10-12 09:34:06 UTC --- Lets translate it to non-ajax: When enabling $wgSecureLogin the login link outputted by the server points to https, so the login procedure goes entirely over https.

[Bug 40968] Add protocol parameter to mw.Api.

2012-10-11 Thread bugzilla-daemon
https://bugzilla.wikimedia.org/show_bug.cgi?id=40968 Krinkle krinklem...@gmail.com changed: What|Removed |Added Priority|Unprioritized |Normal

[Bug 40968] Add protocol parameter to mw.Api.

2012-10-11 Thread bugzilla-daemon
https://bugzilla.wikimedia.org/show_bug.cgi?id=40968 --- Comment #2 from Tyler Romeo tylerro...@gmail.com 2012-10-12 02:37:20 UTC --- Say you're using an extension like Extension:Persona. It does login through an AJAX API request. However, if you have $wgSecureLogin enabled, it cannot (or rather

[Bug 40968] Add protocol parameter to mw.Api.

2012-10-11 Thread bugzilla-daemon
https://bugzilla.wikimedia.org/show_bug.cgi?id=40968 Daniel Friesen mediawiki-b...@nadir-seen-fire.com changed: What|Removed |Added CC|

[Bug 40968] Add protocol parameter to mw.Api.

2012-10-11 Thread bugzilla-daemon
https://bugzilla.wikimedia.org/show_bug.cgi?id=40968 --- Comment #4 from Tyler Romeo tylerro...@gmail.com 2012-10-12 04:10:49 UTC --- Yes, but that is irrelevant. If the script is compromised in a MITM attack, the security of the login process does not matter because the attacker will have