"Just FYI, it appears there is a bug in wget while using a proxy that allows wget to be forced to use the FTP port and thereby unmask the user's IP (normal usage) or at least leak the user's network adapter IP (in TAILS)."
- Comment @Reddit:
https://www.reddit.com/r/TOR/comments/3hc02l/how_can_i_download_webm_videos_longer_than_30/cu6yzv5
https://archive.is/3YYo0
- Original discovery of bug @lists.gnu.org:
https://lists.gnu.org/archive/html/bug-wget/2015-08/msg00020.html
https://archive.is/Ah3Pg
- Reported to TAILS project development list (tails-dev):
https://mailman.boum.org/pipermail/tails-dev/2015-August/009370.html
https://archive.is/nPi5h
- First response @tails-dev
https://mailman.boum.org/pipermail/tails-dev/2015-August/009383.html
https://archive.is/derHC
Another bug in wget has been discussed on Soylentnews in the past.
(Score: -1, Troll) by Anonymous Coward on Sunday August 23 2015, @05:46AM
Hahahahaahah! I wonder what other programs pass the real IP through Tor.
IMO Pidgin is a real piece of shit when it comes to privacy - both in design and
the vulnerabilities. I don't understand why TAILS doesn't switch to something
else, especially for IRC.
Why wasn't this found sooner in TBB/TAILS?
Outstanding!