summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2014-05-25Wire in go.net/proxy, enabling SOCKS5 via TOR_PT_PROXY.Yawning Angel
With tor patched to support 8402, obfs4 bootstraps via a SOCKSv5 proxy now. Other schemes will bail with a PROXY-ERROR, as the go.net/proxy package does not support them, and I have not gotten around to writing dialers for them yet (next on my TODO list). Part of issue #7.
2014-05-25Validate the host component of the proxy URI.Yawning Angel
Part of issue #7.
2014-05-25Parse TOR_PT_PROXY and support sending DONE/PROXY-ERROR.Yawning Angel
Currently obfs4proxy is hardcoded to always PROXY-ERROR, despite a valid proxy uri being passed in the env var. Once the dialer portion of the code is done, this will be changed. Part of issue #7.
2014-05-25Move the supplemental pt config routines to pt_extra.goYawning Angel
2014-05-24Don't use math/big when generating random numbers.Yawning Angel
2014-05-24Randomize length when the decoder receives an out-of-bound value.Yawning Angel
This makes the length error and MAC error indistinguishable to an external attacker.
2014-05-24Move utils.go to csrand/csrand.go, and clean up the interface.Yawning Angel
All of the obfs4 code except unit tests now uses the csrand wrapper routines.
2014-05-23Add support for IAT obfuscation (disabled by default).Yawning Angel
When enabled, inter-packet delay will be randomized between 0 and 10 ms in 100 usec intervals. As experiences from ScrambleSuit (and back of the envelope math based on how networks work) show, this is extremely expensive and artificially limits the throughput of the link. When enabled, bulk transfer throughput will be limited to an average of 278 KiB/s.
2014-05-23Change the maximm handshake length to 8192 bytes.Yawning Angel
* handhake_ntor_test now is considerably more comprehensive. * The padding related constants in the spec were clarified. This breaks wireprotocol compatibility.
2014-05-22Add replay detection to handshakes.Yawning Angel
This is done by maintaining a map keyed off the SipHash-2-4 digest of the MAC_C component of the handshake. Collisions, while possible are unlikely in the extreme and are thus treated as replays. In concept this is fairly similar to the ScrambleSuit `replay.py` code, with a few modifications: * There is a upper bound on how large the replay filter can grow. Currently this is set to 102400 entries, though it is unlikely that this limit will be hit. * A doubly linked list is also maintained parallel to the map, so the filter compaction process does not need to iterate over the entire filter.
2014-05-21Revert "Use the new goptlib goodies."Yawning Angel
This reverts commit 8d61c6bcc67e7acc5604f87ca2a7c7ec43fc46de. On second thought, don't do this. API not final, and some of the stuff might not be a good idea after all.
2014-05-21Fix constants in the spec to reflect the code.Yawning Angel
2014-05-21Use the new goptlib goodies.Yawning Angel
As of `15b960d55905877a840fe605a41a8139bffb5329` goptlib supports IsClient, IsServer, and handling the StateLocation. Yes this means you need to use goptlib out of git.
2014-05-21Change the MSS to 1448 bytes, because timestamps are a thing.Yawning Angel
This breaks wireprotocol compatibility.
2014-05-21Add support for a log scrubber and log a session id.Yawning Angel
This fixes #6.
2014-05-21Finish adding godoc comments to all public interfaces.Yawning Angel
2014-05-20Allow logging to be disabled (default).Yawning Angel
Part of #6, still need to make logs nicer.
2014-05-20Tweak the obfs4 handshake code.Yawning Angel
* Fixed where the code wasn't ensuring that the MAC_[C,S] was present. * Optimized the server side to only look at the tail of the (possibly incomplete handshakeRequest).
2014-05-18Actually keep the delay/threshold in the listener struct.Yawning Angel
This makes it consistent across all incoming connections, for real this time (oops).
2014-05-18Change the server failure close delay/discard length to be consistent.Yawning Angel
It will vary per bridge as it is based off the DRBG, but ever attempt at poking at any given bridge will exhibit consistent behavior.
2014-05-17Change the client connection timeout to 30 sec.Yawning Angel
This is more common than 15 seconds (It's what Firefox uses for the request timeout).
2014-05-17Update the spec with feedback from arma (No functional changes).Yawning Angel
2014-05-16Update README (No functional changes).Yawning Angel
2014-05-16Add a protocol specification.Yawning Angel
This fixes #4.
2014-05-16Treat the PrngSeed frame as part of the handshake.Yawning Angel
Clients will now always add 87 bytes of padding to the clientRequest, and Servers will always send the PRNG seed frame unpadded, and bundled with the serverResponse. Why 87 bytes? The amount of data that the server sends is 87. This fixes #5.
2014-05-16Validate that the padding length is greater than the minimum.Yawning Angel
2014-05-16Change the length field obfscation.Yawning Angel
Instead of including the previous secretbox in the input when calculating the SipHash-2-4 digest used to generate the obfuscation mask, use only the nonce. This is significantly faster, and if someone breaks obfs4 by exploiting the low amount of input entropy between each invocation (a counter incrementing by 1), I hope they publish the attack on the PRF. This breaks wire protocol compatibility.
2014-05-16Change the handshake wire format.Yawning Angel
* HMAC-SHA256 -> HMAC-SHA256-128. * Mark/MAC are now both caluclated using Public Key | NodeID. This breaks wire protocol compatibility.
2014-05-15Send the DRBG seed as a packetTypePrngSeed post server handshake.Yawning Angel
This fixes #3, and brings the code to be on par with the delopyed versions of ScrambleSuit in terms of features.
2014-05-15Load the drbg-seed from the ServerTransportOptions args.Yawning Angel
This also adds the drgb-seed option to the `-gen` obfs4proxy output.
2014-05-15Change hashDrbg to take a drbgSeed for initialization.Yawning Angel
This paves the way for having servers use the same seed for all incoming connections, across multiple startup/shutdown cycles. As opposed to the current situation where each Obfs4Listener will randomly generate it's seed at creation time. Additionally, use 256 bit seeds (128 bit SipHash-2-4 key + 16 bytes of initial material).
2014-05-15Make the output from "-gen" be more useful.Yawning Angel
2014-05-15Use os.MkdirAll() for creating the pt state directory.Yawning Angel
2014-05-15Fix up how Read() errors were processed where appropriate.Yawning Angel
2014-05-14Changed the taglne to "The obfourscator", per dcf's suggestion.Yawning Angel
2014-05-14Remove a newline to make godoc work (No functional changes).Yawning Angel
2014-05-14Change the framing Encoder/Decoder to take the destination slice.Yawning Angel
In theory this is easier on the garbage collector. Probably could reuse more of the intermediary buffers by stashing them in the connection state, but that makes the code kind of messy. This should be an improvement.
2014-05-14Fix comment (No functional changes).Yawning Angel
2014-05-14Update README (No functional changes).Yawning Angel
2014-05-14Kill Obfs4Conn.isOk with fire, and replace it with a state var.Yawning Angel
2014-05-14First pass at cleaning up the write code.Yawning Angel
2014-05-14Implement the io.WriterTo interface.Yawning Angel
2014-05-14First pass at cleaning up the read code.Yawning Angel
2014-05-14Minor stylistic fixes, no functional changes.Yawning Angel
2014-05-13Add vim modelines to some files (No functional changes).Yawning Angel
2014-05-13Fix up import.Yawning Angel
2014-05-13Fix copyLoop to break out the other goroutine on graceful exit.Yawning Angel
This should fix sockets getting stuck in CLOSE_WAIT.
2014-05-13Fix e-mail address in the copyright notice.Yawning Angel
2014-05-13Add preliminary support for packet length obfuscation.Yawning Angel
The same algorithm as ScrambleSuit is used, except: * SipHash-2-4 in OFB mode is used to create the distribution. * The system CSPRNG is used when sampling the distribution. This fixes most of #3, all that remains is generating and sending a persistent distribution on the server side to the client.
2014-05-12Fix logging again.Yawning Angel
On second thought instead of using log.Panicf(), panic() and do the logging with recover(). This somewhat centralizes logging in obfs4proxy, which will be easier to change when I invariably decide to do logging differently in the future.