diff options
author | Yawning Angel <yawning@schwanenlied.me> | 2014-05-23 04:04:31 +0000 |
---|---|---|
committer | Yawning Angel <yawning@schwanenlied.me> | 2014-05-23 04:04:31 +0000 |
commit | 272fb852e72ac282144fe8608fea62ab74b9549c (patch) | |
tree | ed5afd35f72cc3739caf75395674b612f812ce76 /doc/obfs4-spec.txt | |
parent | fd4e3c7c74ad4d1acb37c43fde8d18786616846a (diff) |
Change the maximm handshake length to 8192 bytes.
* handhake_ntor_test now is considerably more comprehensive.
* The padding related constants in the spec were clarified.
This breaks wireprotocol compatibility.
Diffstat (limited to 'doc/obfs4-spec.txt')
-rw-r--r-- | doc/obfs4-spec.txt | 75 |
1 files changed, 71 insertions, 4 deletions
diff --git a/doc/obfs4-spec.txt b/doc/obfs4-spec.txt index e4092ed..1ac2f30 100644 --- a/doc/obfs4-spec.txt +++ b/doc/obfs4-spec.txt @@ -58,7 +58,7 @@ obfs4 provides integrity and confidentiality of the underlying traffic, and authentication of the server. -3. Notation, Constants and Terminology +3. Notation and Terminology All Curve25519 keys and Elligator 2 representatives are transmitted in the Little Endian representation, for ease of integration with current @@ -81,6 +81,71 @@ The server distributes the public component of the identity key (B) and NODEID to the client via an out-of-band mechanism. + Data sent as part of the handshake are padded to random lengths to attempt to + obfuscate the initial flow signature. The constants used are as follows: + + MaximumHandshakeLength = 8192 + + Maximum size of a handshake request or response, including padding. + + MarkLength = 16 + + Length of M_C/M_S (A HMAC-SHA256-128 digest). + + MACLength = 16 + + Length of MAC_C/MAC_S (A HMAC-SHA256-128 digest). + + RepresentativeLength = 32 + + Length of a Elligator 2 representative of a Curve25519 public key. + + AuthLength = 32 + + Length of the ntor AUTH tag (A HMAC-SHA256 digest). + + InlineSeedFrameLength = 53 + + Length of a unpadded TYPE_PRNG_SEED frame. + + ServerHandshakeLength = 96 + + The length of the non-padding data in a handshake response. + + RepresentativeLength + AuthLength + MarkLength + MACLength + + ServerMaxPadLength = 8096 + + The maximum amount of padding in a handshake response. + + MaximumHandshakeLength - ServerHandshakeLength + + ServerMinPadLength = InlineSeedFrameLength + + The minimum amount of padding in a handshake response. + + ClientHandshakeLength = 64 + + The length of the non-padding data in a handshake request. + + RepresentativeLength + MarkLength + MACLength + + ClientMinPadLength = 85 + + The minimum amount of padding in a handshake request. + + (ServerHandshakeLength + ServerMinPadLength) - ClientHandshakeLength + + ClientMaxPadLength = 8128 + + The maximum amount of padding in a handshake request. + + MaximumHandshakeLength - ClientHandshakeLength + + The amount of padding is chosen such that the smallest possible request and + response (requests and responses with the minimum amount of padding) are + equal in size. For details on the InlineSeedFrameLength, see section 7. + The client handshake process is as follows. 1. The client generates an ephemeral Curve25519 keypair X,x and an @@ -89,7 +154,7 @@ 2. The client sends a handshake request to the server where: X' = Elligator 2 representative of X (32 bytes) - P_C = Random padding [85, 1384] bytes long + P_C = Random padding [ClientMinPadLength, ClientMaxPadLength] bytes M_C = HMAC-SHA256-128(B | NODEID, X') E = String representation of the number of hours since the UNIX epoch @@ -145,7 +210,7 @@ Y' = Elligator 2 Representative of Y (32 bytes) AUTH = The ntor authentication tag (32 bytes) - P_S = Random padding [0, 1352] bytes long + P_S = Random padding [ServerMinPadLength, ServerMaxPadLength] bytes M_S = HMAC-SHA256-128(B | NODEID, Y') E' = E from the client request MAC_S = HMAC-SHA256-128(B | NODEID, Y' | AUTH | P_S | M_S | E') @@ -228,7 +293,9 @@ part of the serverResponse if it always sends the frame immediately following the serverResponse body. If implementations chose to do this, the TYPE_PRNG_SEED frame MUST have 0 bytes of padding, and P_S MUST - consist of [0,1299] bytes of random padding. + be generated with a ServerMinPadLength of 0 (P_S consists of [0,8096] + bytes of random data). The calculation of ClientMinPadLength however is + unchanged (P_C still consists of [85,8128] bytes of random data). 7. References |