Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add test-case for curl ipfs:// integrity controls #13

Merged
merged 1 commit into from
Sep 24, 2023
Merged

Conversation

kpcyrd
Copy link
Owner

@kpcyrd kpcyrd commented Sep 24, 2023

This tests integrity controls in the ipfs integration of curl. At the time of writing it seems there's full trust in the ipfs gateway, as demonstrated by this example plot:

sudo sh4d0wup check contrib/plot-curl-ipfs.yaml -B 0.0.0.0:443

sh4d0wup acts as a malicious ipfs gateway, resulting in this:

$ curl -sSf ipfs://QmWATWQ7fVPP2EFGu71UkfnqhYXDYH566qy47CnJDgvs8u
IPFS response has been tampered with 😈

In ipfs there's a concept of trustless gateways, but I'm not sure CAR and ipfs-car support responses that are both authenticated and still streamed.

This may or may not be a problem for you, curl is assuming the gateway runs on the local computer and is therefore as trustworthy as the curl process itself.

@kpcyrd kpcyrd merged commit ce0d654 into main Sep 24, 2023
30 checks passed
@kpcyrd kpcyrd deleted the plot-curl-ipfs branch September 24, 2023 21:49
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant