The "OSM Standard tile layer" looks wrong (white lines, abusive comments etc.)

What I did was set the tile.openstreetmap.org CDN to not consider any tiles before Wed Apr 10 2024 05:00:00 GMT (time after revert) as valid and instead retrieve new tiles. Light version of a shift-F5 or similar.

The render backend will then normally supply a fresh tile rendered after Wed Apr 10 2024 05:00:00 GMT, but if the render backend is overloaded / slow it might supply an older tile back to the CDN.

Most of the tiles with vandalism were for tiles render before Wed Apr 10 2024 05:00:00 GMT. If a tile with vandalism was viewed then it may still be in local browser cache. The result is, if user sees vandalism then ctrl-F5 or shift-F5 is best route for them to try get a fresh non-cached tile without vandalism.

2 Likes

I found this (zoom +1) : Feissons sur salins | OpenStreetMap

Moderation: Map image with inappropriate and offensive street names removed

1 Like

As described above, the actual data has probably already been fixed, but it’d be great if you could run through the steps above just to make sure?

There’s a (fairly technical) description of what the process is between data being fixed and you looking at a map above here, and according to this post above the people in charge of the displayed maps are trying to fix the problem that you are seeing.

1 Like

Most of these are/were horrible, but I must admit the “Andy Townsend is butch” one makes me laugh. It’s nearly the etymology of Andy, and usually quite flattering besides.

2 Likes

Hey Andy, whether you’ve been called worse or not, I imagine it’s still a horrible thing to experience. So, just want to say thanks for what you do.

23 Likes

The day before got the weekly community activity summary. The “I’ve been called worse” reply was listed as a popular post. :no_mouth:

I made a visualization showing the majority (788) of the vandalized ways, derived from a revert changeset (149801026):

At z13:

A single way:

Existing ways got their node refs replaced by some random node ids from all over the world.

In total, there were three user accounts involved, with 46 changesets and 1737 changes.

The vandalism started on April 10 at 2am UTC. The revert by mavl started one hour later and was done in 25 minutes (except some broken relations).

19 Likes

That’s the important bit - the data was fixed very quickly (with the exception of a few problems related to well-meaning people who didn’t understand what was happening doing individual single-changeset reverts using online revert tools). Also, the limits on what “new” accounts can do worked well.

All of the discussion above was about people seeing things in local cache (mostly) or from the CDN (less often, but now fixed).

8 Likes

That’s amazing!
It’s like a Picasso from outa space, drawn by Jean-Luc Picard himself in this case.

1 Like

It’s a shame that a lot of valuable time has to be spent to clean this scrap up, but it’s good to know that there are people behind OSM able to handle such cases fast and effectively. Thanks to everybody helping to clean up the mess!

8 Likes

Hi, just checking in to see if people still don’t think we have a cybersecurity problem :popcorn:

I note that a couple petty vandals in a few minutes with sock puppet accounts can waste a lot of time by many other people. As usual, this will not be a wake-up call for the project to understand that they need to think a lot harder about things like user trust and data integrity.

I am thankful for folks that clean this stuff up, but I resent that they are wasting their time on it rather than pursuing more fruitful pursuits.

8 Likes

I’ve no doubt people did the best they could with the tools available to them, but it seems a bit of a stretch to call the cleanup “fast and effective”. Some users were still seeing the vandalism around a week after it occurred (?).

I’m sure this sort of thing is already being considered, but perhaps we need a “cache busting” mechanism that can force clients to request fresh tiles in this kind of situation?

1 Like

In my opinion, cleaning the database from the effects of vandalism is not wasted time.

4 Likes

So - what parts of how OSM works would you change, in areas such as:

  • What people need to provide when creating a “new account”?
  • Assuming they’ve cleared that hurdle, how much editing (and where) they’re allowed to do and in what period of time?
1 Like

I’ve said on several occasions that what the project needs is a cybersecurity professional. Someone with expertise in protecting digital assets. While our use case is fairly unique in the scheme of things, it is no less important to consider cybersecurity protections and how we might protect what’s important to the project. It’s naive to think that those of us who casually dabble in security at the minimal level needed to write code and launch websites are equipped to correctly assess and identify the best controls that balance protection with access. I put myself in that category as someone who knows just enough about Internet security to operate a public-facing web site, but definitely not enough to secure a popular and complex global enterprise.

So with that caveat,

I think the way it is now, where users can essentially spin up accounts anonymously is fine, however, those new accounts should live in a highly restricted sandbox. In that sandbox, new users should be allowed to do the typical types of edits that new users might make. Namely, low volume and geographically compact.

I think we should let new accounts out of that sandbox when they do certain things. Link a cell phone or authenticate with two-factor authentication? Your trust goes up. Account ages and you make edits for awhile? Your trust goes up. More trust=looser restrictions. This is a general principle, not a recipe.

There is probably some need for a (presently non-existing) feature where users can crowd-source the trust factor in a neutral way. Getting lots of :+1: from highly trusted users? The shackles come off faster.

You’re asking good questions but I think it’s a trap to think that there’s a simple formula on how to do this. These days, people get college degrees in cyber security yet somehow we don’t seem to have anyone around on the project applying that expertise to our rampant vandalism problem.

I can do my taxes, but that doesn’t qualify me to audit a company’s financial statements. I can brew a cup of coffee in the morning, but that doesn’t qualify me to hire baristas and open a coffee shop. I can dig a hole in the ground but it doesn’t make me an archaeologist. Likewise, I can write code, but that doesn’t make me competent in designing a cyber security plan for a major global project. But I can certainly recognize that we have a problem.

I think our failing here is thinking that it’s easy and not asking for the right expertise.

11 Likes

Maybe - but we as a community need to decide what sort of usage is and is not OK.

Someone external to OSM may well be able to help with detecting and preventing access and usage that we don’t want - but without knowledge of the OSM community they won’t know what we’re trying to prevent and what we’re trying to explicitly encourage - see for example the discussions elsewhere in this forum with e.g. new armchair contributors “just trying to add 1000 round buildings after some emergency”.

7 Likes

I hope we can agree that drawing roads thousands of miles long with obscenities on it is so clearly in the “not OK” bucket that it doesn’t need discussion. Let’s leave the “squishy gray area” stuff to the humans already adjudicating edits and put some controls in to protect against the “obviously wrong” stuff.

I find it hard to believe that there aren’t people “internal to OSM” (whatever that means) with this type of expertise.

It’s a strawman argument that someone is going to come in like a bull in a china shop and break things with some kind of ham-fisted approach that’s wrong for our community. Yes, by all means let’s not ask for help because we’re afraid we won’t get good help.

…which is a case that can easily be resolved with the right access and privilege controls and the ability for trusted overseers like yourself to increase user privileges in exceptional cases when it’s assessed that users are editing in good faith.

Yes, securing and protecting our data while still maximizing the ability of users to contribute and minimizing the impact of administering the works is hard work. But, if done right it will be less work than constant whack-a-mole and bad press we get every time some potty-mouth kid at a keyboard has the brilliant idea to draw long lines and type in obscenities.

Which by the way, could be easily detected with some basic heuristics like a dirty word list applied to new users triggering an auto account-lockout. We won’t get it right immediately but over time I’m sure we could compile a list of triggers that are clear vandalism and work out the false positives over time.

Imagine:

“Hello, NewUser123. The is the automated system at OpenStreetMap. Your account has been locked because your account is new and we detected edits that appear to be vandalism. If you think this message is in error, please email data@openstreetmap.org and reference ticket number 123456789”

1 Like

Gentlemen, please tone it down a notch. You are both right, in a certain sense.

Brian has a point that we do need security experts to advise us what kind of measures we should apply to prevent large-scale vandalism…

…but then, Andy is also right that we first ought to define “business requirements” how to separate potentially harmful activity from normal good-faith editing practices, identify gray areas, specify use cases where exceptions may apply (mapathons which involve newbies working under auspices of experienced users, alternative accounts for automated editing…) and so on.

Before the recent string of incidents (Ukraine/Russia name clashes; vandalism from new accounts belonging experienced long-term abusers; to name the most prominent ones), our basic defense was “assume good faith”, trust that malevolent actors are just not interested in OSM, and that any revert or DWG intervention will be sufficiently quick. However, that worldview is obviously too naive for the today’s world, and we have to work in both directions (cybersecurity expertise and subject area knowledge) to reduce the future risk.

6 Likes

In my experience this is the problem OSM community faces quite often: the outsiders who would like to help (be it with validation, data sources, imports, software development or even communications work) are not as useful as we (or they) would’ve hoped. It takes intentional effort to learn how the OSM community operates due to it being a semi-anarchy. Having to hand-hold outsiders slows things down.

There are people who can easily get into any new field and not experience any mental blocks, but they’re rare.

3 Likes

If it can’t be done in English someone will use their own language so we’ll have to include many languages and the dirty word list will get very, very long.

This is my first thought but I have no idea if the list can be done in the real world.

Otherwise it sounds like a good idea to me.

Also limiting a changeset to 1 km² (sounds rather complicated to implement) and limiting way length (between two connected nodes) to 1 km sounds reasonable to me.