Commit Graph

61 Commits (master)

Author SHA1 Message Date
Yawning Angel 645026c2ad build: Update all the dependencies 1 year ago
Yawning Angel b8da220f08 build: Bump the version to 0.0.15-dev 1 year ago
Yawning Angel 336a71d6e4 build: Do the release ritual for obfs4proxy-0.0.14 2 years ago
Yawning Angel ef832041b7 doc: Add a changelog entry and clarified a comment (NFC) 2 years ago
Yawning Angel f63befd107 build: Bump the version to 0.0.14-dev 2 years ago
Yawning Angel 77af0cba93 build: Do the release ritual for obfs4proxy-0.0.13 2 years ago
Yawning Angel 83f01d5a74 transports/meek_lite: Remove utls support
While this was a good idea back when I did it:

 * People don't like the fact that it requires a fork of utls to fix
   compatibility issues, and would rather spend 3 years complaining
   about it instead of spending a weekend to fix the issues in
   upstream.

 * Tor over meek is trivially identifiable regardless of utls or not.

 * Malware asshats ruined domain fronting for everybody.
2 years ago
Yawning Angel cbf3f3cfa0 Bump the version to 0.0.13-dev 2 years ago
Yawning Angel a564bc3840 Do the release ritual for obfs4proxy-0.0.12 2 years ago
Yawning Angel 393aca86cc internal/x25519ell2: Initial import
Replace agl's Elligator2 implementation with a different one, that fixes
the various distinguishers stemming from bugs in the original
implementation and "The Elligator paper is extremely hard to read".

All releases prior to this commit are trivially distinguishable with
simple math, so upgrading is strongly recommended.  The upgrade is fully
backward-compatible with existing implementations, however the
non-upgraded side will emit traffic that is trivially distinguishable
from random.

Special thanks to Loup Vaillant for his body of work on this primitive,
and for motivating me to fix it.
2 years ago
Yawning Angel e330d1b702 transports/meek_lite: Bump the version of the utls fork
And add the Chrome 83 fingerprint.
3 years ago
Philipp Winter f638c33f6c
Actually support unsafe logging.
Obfs4proxy implements the -unsafeLogging switch but it's been ignored so
far.  This patch makes it work.
3 years ago
Philipp Winter 40245c4a1c Update Azure's root CA certificate pins.
Microsoft recently updated the root CA certificates that are served to
Azure clients.  See the following article for more details:
https://docs.microsoft.com/en-us/azure/security/fundamentals/tls-certificate-changes

This change broke meek-lite because none of its pins work anymore.  That
means that Tor Browser users can no longer use meek-azure or moat as
both rely on meek-lite.

This patch fixes the problem by updating the certificate pins.

Signed-off-by: Yawning Angel <yawning@schwanenlied.me>
3 years ago
Yawning Angel 2d8f3c8bbf common: Replace the extra25519 import with an internal package
I really didn't want to do this, but this should make `go get` work
again, and maybe people will leave me alone.
4 years ago
Yawning Angel c357dd56df Bump the version to 0.0.12-dev 5 years ago
Yawning Angel b5a9f3c5d2 Do the release ritual for obfs4proxy-0.0.11 5 years ago
Yawning Angel 81886128f2 transports/meek_lite: Bump the version of the utls fork 5 years ago
Yawning Angel 1a6129b66f obfs4: Alter tear down behavior to be less distinctive
The old behavior closed the connection on handshake failure after:
 * The first N bytes (random on a per-server basis).
 * The first M seconds (random on a per-server basis).

Whichever came first.  As Sergey Frolov kindly points out, depending on
which conditions cause termination, the server will send either a FIN or
a RST.  This change will remove the "amount read" based termination
threshold, so that connections that cause failed handshakes will discard
all data received until the teardown time is reached.

Thanks to Sergey Frolov for bringing this issue to my attention.
5 years ago
Yawning Angel a8288437e3 Update my e-mail address (no functional changes) 5 years ago
Yawning Angel 9a12019f5a Bump the version to 0.0.11-dev 5 years ago
Yawning Angel f58291912a Do the release ritual for obfs4proxy-0.0.10 5 years ago
Yawning Angel 2ff57980e2 Bump the version to 0.0.10-dev 5 years ago
Yawning Angel 8a19b4fcb1 Do the release ritual for obfs4proxy-0.0.9 5 years ago
Yawning Angel c65aaf6407 transports/meeklite: Add a lightweight HPKP implementation
HPKP is effectively dead as far as a standard goes, but the idea has
merit in certain use cases, this being one of them.

As a TLS MITM essentially will strip whatever obfuscation that the
transport may provide, the digests of the SubjectPublicKeyInfo fields
of the Tor Browser Azure meek host are now hardcoded.

The behavior can be disabled by passing `disableHPKP=true` on the bridge
line, for cases where comaptibility is prefered over security.
5 years ago
Yawning Angel da058cb180 fixup! Bug 24793: Send the correct authorization HTTP header for basic auth. 5 years ago
Yawning Angel 4d453dab21 transports/meeklite: uTLS for ClientHello camouflage
There's still some interesting oddities depending on remote server and
what fingerprint is chosen, but I can watch videos online with the
chosen settings and the TBB Azure bridge.

Note: Despite what people are claiming in the Tor Browser bug tracker
it isn't all that hard to use the built in http client with utls.  And
yes, the `transport.go` code does negotiate correctly in a standalone
test case (apart from compatibility related oddities).
5 years ago
Yawning Angel f8bf80479f Bump the version to 0.0.9-dev 5 years ago
Yawning Angel 98730f287c Do the release ritual for obfs4proxy 0.0.8. 5 years ago
Yawning Angel 70d0e90c86 Change the canonical upstream repo location to gitlab
This commit changes the upstream repo location to:
  https://gitlab.com/yawning/obfs4.git

Additionally all the non-`main` sub-packages now have an import
comment annotation.  As a matter of courtesy, I will continue to
push to both the existing github.com and git.torproject.org repos
for the foreseeable future, though I reserve the right to stop
doing so at any time.
5 years ago
Daniel Martí 08f4d47018 port to a Go module
The biggest win is that we now declare what versions of each dependency
we require to build. This way, building a certain version of obfs4 will
always use the same source code, independent of the master branch of
each dependency.

This is necessary for reproducible builds. On top of that, go.sum
contains checksums of all the transitive dependencies and their modules,
so the build system will also recognise when the source code has been
changed.

Updated the build instructions accordingly. We don't drop support for
earlier Go versions, but those won't get the benefit of reproducible
builds unless we start vendoring the dependencies too.
6 years ago
Yawning Angel 89c21805c2 (meek_lite) Explicitly set Content-Length to zero when there is no data to send.
https://gitweb.torproject.org/pluggable-transports/meek.git/commit/?h=0.28&id=0ea861efe5873b517fbd08c4bc48027e4db16a95
6 years ago
Yawning Angel e3d4c5308d fixup! Bug 24793: Send the correct authorization HTTP header for basic auth. 6 years ago
Yawning Angel 97a875ec3c Bump the version to 0.0.8-dev, signifying development towards 0.0.8. 8 years ago
Yawning Angel 8256fac93c Do the release ritual for obfs4proxy 0.0.7. 8 years ago
Yawning Angel 64e5920c84 Add a ChgangeLog entry for the read buffer fix (No functional changes). 8 years ago
Yawning Angel 62057625ea Use the correct epoch hour when crafting the obfs4 server ntor response.
It's supposed to use the one derived from the client's handshake
(assuming the clock skew is within acceptable limits), but it was using
the one based off the current system time.
8 years ago
Yawning Angel a7a2575cab The obfs4 `iat-mode` parameter is now properly configurable.
It used to be that all of the bridge side parameters needed to be
manually specified together.  This was somewhat nonsensical, and the IAT
mode can now be set as the only obfs4 option in a `ServerTransportOptions`
torrc directive.

Thanks to dcf for reporting the issue.
8 years ago
Yawning Angel 1df5c8ffe8 Bump the version to 0.0.7-dev, signifying development towards 0.0.7. 8 years ago
Yawning Angel 896a98c427 Do the release ritual for obfs4proxy-0.0.6. 8 years ago
Yawning Angel 611205be68 Add the "meek_lite" transport, which does what one would expect.
This is a meek client only implementation, with the following
differences with dcf's `meek-client`:

 - It is named `meek_lite` to differentiate it from the real thing.
 - It does not support using an external helper to normalize TLS
   signatures, so adversaries can look for someone using the Go
   TLS library to do HTTP.
 - It does the right thing with TOR_PT_PROXY, even when a helper is
   not present.

Most of the credit goes to dcf, who's code I librerally cribbed and
stole.  It is intended primarily as a "better than nothina" option
for enviornments that do not or can not presently use an external
Firefox helper.
9 years ago
Yawning Angel 69ffcc39c6 Delay transport initialization till after logging has been setup. 9 years ago
Yawning Angel 37a709d8b4 Bump the version to 0.0.6-dev, signifying development towards 0.0.6. 9 years ago
Yawning Angel 3540313e53 Do the release ritual for obfs4proxy-0.0.5. 9 years ago
Yawning Angel a8d7134f10 Use a built in SOCKS 5 server instead of goptlibs.
Differences from my goptlib branch:
 * Instead of exposing a net.Listener, just expose a Handshake() routine
   that takes an existing net.Conn. (#14135 is irrelevant to this socks
   server.
 * There's an extra routine for sending back sensible errors on Dial
   failure instead of "General failure".
 * The code is slightly cleaner (IMO).

Gotchas:
 * If the goptlib pt.Args datatype or external interface changes,
   args.go will need to be updated.

Tested with obfs3 and obfs4, including IPv6.
9 years ago
Yawning Angel df42657079 Move logging wrappers into common/log, and add a DEBUG log level.
Implements feature #15576.
9 years ago
Yawning Angel 402fe97d85 Add support for tor feature #15435.
If the relevant enviornment variable is set, treat read errors from
Stdin as a SIGTERM.
9 years ago
Yawning Angel 4e4c9052f4 Attempt to detect if the parent crashed without killing obfs4proxy.
The ideal solution here would be to implement #15435, but till then
use one of several kludges:
 * Linux - prctl() so that the kernel SIGTERMs on parent exit.
 * Other U*ix - Poll the parent process id once a second, and SIGTERM
   ourself/exit if it changes.  Former is better since all the normal
   cleanup if any gets done.
 * Windows - Log a warning.
9 years ago
Yawning Angel aed4b72389 Change the import path for go.net.
The Go developers decided to move the go.net repository to
golang.org/x/net, and also to transition from hg to git.  This wasn't
changed when the go.crypto imports were since the 'proxy' component
doesn't have imports that break, so the old code still works.

While the change here is simple (just update the import location), this
affects packagers as it now expects the updated package.  Sorry for the
inconveneince, I blame the Go people, and myself for not just doing
this along with the go.crypto changes.
9 years ago
Yawning Angel 594d45be02 Update the ChangeLog (No functional changes). 9 years ago
Yawning Angel 6d1b69d299 Update the ChangeLog (No functional changes). 9 years ago