summaryrefslogtreecommitdiff
path: root/framing/framing.go
AgeCommit message (Collapse)Author
2014-08-17Massive cleanup/code reorg.Yawning Angel
* Changed obfs4proxy to be more like obfsproxy in terms of design, including being an easy framework for developing new TCP/IP style pluggable transports. * Added support for also acting as an obfs2/obfs3 client or bridge as a transition measure (and because the code itself is trivial). * Massively cleaned up the obfs4 and related code to be easier to read, and more idiomatic Go-like in style. * To ease deployment, obfs4proxy will now autogenerate the node-id, curve25519 keypair, and drbg seed if none are specified, and save them to a JSON file in the pt_state directory (Fixes Tor bug #12605).
2014-06-25Change the import paths to point to the tp.o repository.Yawning Angel
2014-06-02Change how the length obfsucation mask is derived.Yawning Angel
Instead of using the nonce for the secret box, just use SipHash-2-4 in OFB mode instead. The IV is generated as part of the KDF. This simplifies the code a decent amount and also is better on the off chance that SipHash-2-4 does not avalanche as well as it is currently assumed. While here, also decouple the fact that *this implementation* of obfs4 uses a PRNG with 24 bytes of internal state for protocol polymorphism instead of 32 bytes (that the spec requires). THIS CHANGE BREAKS WIRE PROTCOL COMPATIBILITY.
2014-05-28Change the weighted distribution algorithm be uniform.Yawning Angel
The old way was biasted towards the earlier values. Thanks to asn for pointing this out and suggesting an alternative. As an additional tweak, do not reuse the drbg seed when calculating the IAT distribution, but instead run the seed through SHA256 first, for extra tinfoil goodness.
2014-05-26Use io.ReadFull in places where it is appropriate.Yawning Angel
2014-05-24Randomize length when the decoder receives an out-of-bound value.Yawning Angel
This makes the length error and MAC error indistinguishable to an external attacker.
2014-05-21Change the MSS to 1448 bytes, because timestamps are a thing.Yawning Angel
This breaks wireprotocol compatibility.
2014-05-16Change the length field obfscation.Yawning Angel
Instead of including the previous secretbox in the input when calculating the SipHash-2-4 digest used to generate the obfuscation mask, use only the nonce. This is significantly faster, and if someone breaks obfs4 by exploiting the low amount of input entropy between each invocation (a counter incrementing by 1), I hope they publish the attack on the PRF. This breaks wire protocol compatibility.
2014-05-14Change the framing Encoder/Decoder to take the destination slice.Yawning Angel
In theory this is easier on the garbage collector. Probably could reuse more of the intermediary buffers by stashing them in the connection state, but that makes the code kind of messy. This should be an improvement.
2014-05-14Fix comment (No functional changes).Yawning Angel
2014-05-12Fix logging again.Yawning Angel
On second thought instead of using log.Panicf(), panic() and do the logging with recover(). This somewhat centralizes logging in obfs4proxy, which will be easier to change when I invariably decide to do logging differently in the future.
2014-05-12Preliminary support padding, log on panic.Yawning Angel
This adds preliminary support for data padding by adding another layer of encapsulation inside each AEAD frame containing a type and length. For now, data is still sent unpadded, but the infrastructure for supporting it is mostly there. Additionally, use log.Panic[f]() instead of panic through out the code so that some panics are logged.
2014-05-11Change documentation/comments to reflect reality (No functional changes).Yawning Angel
2014-05-09Initial import.Yawning Angel