document https downgrade sslstrip defenses - wget vs curl vs scurl

Information

ID: 673
PHID: PHID-TASK-ag7e242onamjwq2xidqq
Author: Patrick
Status at Migration Time: resolved
Priority at Migration Time: Normal

Description

We sometimes need commands such as the following in the wiki.

 wget https://www.torproject.org/dist/torbrowser/7.0a3/sandbox-0.0.6-linux64.zip.asc

wget is more usable than plain curl in command line. But is wget secure?

There was a pretty strange bug. Not sure it was ever fixed.

https://lists.gnu.org/archive/html/bug-wget/2012-07/msg00015.html

Is wget vulnerable to sslstrip?


Simple wrapper called scurl, that adds “–tlsv1 --proto =https” in front of all invocations of “curl” when running “scurl”.

https://github.com/Whonix/scurl/blob/master/usr/bin/scurl

scurl makes things simpler than typing --tlsv1.2 --proto =https. But it’s still inconvenient.

I used to use like…

scurl https://www.torproject.org/dist/torbrowser/7.0a3/sandbox-0.0.6-linux64.zip.asc > sandbox-0.0.6-linux64.zip.asc

Which is cumbersome.

Perhaps scurl should also prepend --remote-name? Then we could simply use:

 scurl https://www.torproject.org/dist/torbrowser/7.0a3/sandbox-0.0.6-linux64.zip.asc

(Which would result in:)

curl --tlsv1.2 --proto =https --remote-name https://www.torproject.org/dist/torbrowser/7.0a3/sandbox-0.0.6-linux64.zip.asc

scurl isn’t the answer either, since it’s mostly only available in Whonix so it does not work for instructions generally everywhere.

Is curl with --proto =https required? Is curl otherwise vulnerable to sslstrip?


TODO:

  • ask if curl is vulnerable to sslstrip / https downgrade attacks
  • ask if wget is vulnerable to sslstrip / https downgrade attacks

Comments


Patrick

2017-05-07 13:22:58 UTC


Patrick

2017-05-08 12:52:01 UTC


HulaHoop

2017-05-09 15:52:38 UTC


HulaHoop

2017-05-09 16:44:56 UTC


Patrick

2017-05-16 15:30:32 UTC


Patrick

2017-05-24 21:12:25 UTC


Patrick

2023-02-17 10:52:15 UTC