summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2014-05-13Add preliminary support for packet length obfuscation.Yawning Angel
The same algorithm as ScrambleSuit is used, except: * SipHash-2-4 in OFB mode is used to create the distribution. * The system CSPRNG is used when sampling the distribution. This fixes most of #3, all that remains is generating and sending a persistent distribution on the server side to the client.
2014-05-12Fix logging again.Yawning Angel
On second thought instead of using log.Panicf(), panic() and do the logging with recover(). This somewhat centralizes logging in obfs4proxy, which will be easier to change when I invariably decide to do logging differently in the future.
2014-05-12Log and propagate errors between the 2 goroutines in copyLoop.Yawning Angel
This fixes #1.
2014-05-12Fix a comment (No functional changes).Yawning Angel
2014-05-12Preliminary support padding, log on panic.Yawning Angel
This adds preliminary support for data padding by adding another layer of encapsulation inside each AEAD frame containing a type and length. For now, data is still sent unpadded, but the infrastructure for supporting it is mostly there. Additionally, use log.Panic[f]() instead of panic through out the code so that some panics are logged.
2014-05-12Remove support for Write deadlines since it wasn't working.Yawning Angel
Write timeouts are obnoxious to handle as the frame encoder state already is updated to cover the entire payload for the Write() call that timed out. In theory it is possible to buffer the pending data, but that causes Write() to voilate the semantics of the interface.
2014-05-12Set a timeout on outgoing handshakes as well.Yawning Angel
2014-05-12Reject clients that do not authenticate quickly enough.Yawning Angel
The current timeout value before the server fails the handshake is 15 s. This may need to be increased for clients over slow links.
2014-05-12Close connections that fail to authenticate after a while.Yawning Angel
Like ScrambleSuit, a random interval between 1x and 5x of additional data from the peer is read and immediately discarded before closing. Additionally, obfs4 will close off invalid connections anywhere between 0 and 60 seconds after it determines that the incoming connection will never complete the handshake successfully.
2014-05-12Clean up the logging a bit.Yawning Angel
2014-05-12Run go fmt on obfs4proxy.go (No functional changes).Yawning Angel
2014-05-12Move to a unified client/server binary, and fix bugs.Yawning Angel
* The old and the busted: obfs4-[client,server]. * The new hotness: obfs4client. * Add obfs4.ServerHandshake() that servers need to call after a successful return from Accept(). This allows implementations to move the handshake into a goroutine or whatever.
2014-05-11Change documentation/comments to reflect reality (No functional changes).Yawning Angel
2014-05-09Remove a comment that I forgot to delete, no functional changes.Yawning Angel
2014-05-09Initial import.Yawning Angel