Commit Graph

52 Commits (393aca86cc3b1a5263018c10f87ece09ac3fd5ed)

Author SHA1 Message Date
Yawning Angel 393aca86cc internal/x25519ell2: Initial import
Replace agl's Elligator2 implementation with a different one, that fixes
the various distinguishers stemming from bugs in the original
implementation and "The Elligator paper is extremely hard to read".

All releases prior to this commit are trivially distinguishable with
simple math, so upgrading is strongly recommended.  The upgrade is fully
backward-compatible with existing implementations, however the
non-upgraded side will emit traffic that is trivially distinguishable
from random.

Special thanks to Loup Vaillant for his body of work on this primitive,
and for motivating me to fix it.
2 years ago
Yawning Angel e330d1b702 transports/meek_lite: Bump the version of the utls fork
And add the Chrome 83 fingerprint.
3 years ago
Philipp Winter f638c33f6c
Actually support unsafe logging.
Obfs4proxy implements the -unsafeLogging switch but it's been ignored so
far.  This patch makes it work.
4 years ago
Philipp Winter 40245c4a1c Update Azure's root CA certificate pins.
Microsoft recently updated the root CA certificates that are served to
Azure clients.  See the following article for more details:
https://docs.microsoft.com/en-us/azure/security/fundamentals/tls-certificate-changes

This change broke meek-lite because none of its pins work anymore.  That
means that Tor Browser users can no longer use meek-azure or moat as
both rely on meek-lite.

This patch fixes the problem by updating the certificate pins.

Signed-off-by: Yawning Angel <yawning@schwanenlied.me>
4 years ago
Yawning Angel 2d8f3c8bbf common: Replace the extra25519 import with an internal package
I really didn't want to do this, but this should make `go get` work
again, and maybe people will leave me alone.
4 years ago
Yawning Angel c357dd56df Bump the version to 0.0.12-dev 5 years ago
Yawning Angel b5a9f3c5d2 Do the release ritual for obfs4proxy-0.0.11 5 years ago
Yawning Angel 81886128f2 transports/meek_lite: Bump the version of the utls fork 5 years ago
Yawning Angel 1a6129b66f obfs4: Alter tear down behavior to be less distinctive
The old behavior closed the connection on handshake failure after:
 * The first N bytes (random on a per-server basis).
 * The first M seconds (random on a per-server basis).

Whichever came first.  As Sergey Frolov kindly points out, depending on
which conditions cause termination, the server will send either a FIN or
a RST.  This change will remove the "amount read" based termination
threshold, so that connections that cause failed handshakes will discard
all data received until the teardown time is reached.

Thanks to Sergey Frolov for bringing this issue to my attention.
5 years ago
Yawning Angel a8288437e3 Update my e-mail address (no functional changes) 5 years ago
Yawning Angel 9a12019f5a Bump the version to 0.0.11-dev 5 years ago
Yawning Angel f58291912a Do the release ritual for obfs4proxy-0.0.10 5 years ago
Yawning Angel 2ff57980e2 Bump the version to 0.0.10-dev 5 years ago
Yawning Angel 8a19b4fcb1 Do the release ritual for obfs4proxy-0.0.9 5 years ago
Yawning Angel c65aaf6407 transports/meeklite: Add a lightweight HPKP implementation
HPKP is effectively dead as far as a standard goes, but the idea has
merit in certain use cases, this being one of them.

As a TLS MITM essentially will strip whatever obfuscation that the
transport may provide, the digests of the SubjectPublicKeyInfo fields
of the Tor Browser Azure meek host are now hardcoded.

The behavior can be disabled by passing `disableHPKP=true` on the bridge
line, for cases where comaptibility is prefered over security.
5 years ago
Yawning Angel da058cb180 fixup! Bug 24793: Send the correct authorization HTTP header for basic auth. 5 years ago
Yawning Angel 4d453dab21 transports/meeklite: uTLS for ClientHello camouflage
There's still some interesting oddities depending on remote server and
what fingerprint is chosen, but I can watch videos online with the
chosen settings and the TBB Azure bridge.

Note: Despite what people are claiming in the Tor Browser bug tracker
it isn't all that hard to use the built in http client with utls.  And
yes, the `transport.go` code does negotiate correctly in a standalone
test case (apart from compatibility related oddities).
5 years ago
Yawning Angel f8bf80479f Bump the version to 0.0.9-dev 5 years ago
Yawning Angel 98730f287c Do the release ritual for obfs4proxy 0.0.8. 5 years ago
Yawning Angel 70d0e90c86 Change the canonical upstream repo location to gitlab
This commit changes the upstream repo location to:
  https://gitlab.com/yawning/obfs4.git

Additionally all the non-`main` sub-packages now have an import
comment annotation.  As a matter of courtesy, I will continue to
push to both the existing github.com and git.torproject.org repos
for the foreseeable future, though I reserve the right to stop
doing so at any time.
5 years ago
Daniel Martí 08f4d47018 port to a Go module
The biggest win is that we now declare what versions of each dependency
we require to build. This way, building a certain version of obfs4 will
always use the same source code, independent of the master branch of
each dependency.

This is necessary for reproducible builds. On top of that, go.sum
contains checksums of all the transitive dependencies and their modules,
so the build system will also recognise when the source code has been
changed.

Updated the build instructions accordingly. We don't drop support for
earlier Go versions, but those won't get the benefit of reproducible
builds unless we start vendoring the dependencies too.
6 years ago
Yawning Angel 89c21805c2 (meek_lite) Explicitly set Content-Length to zero when there is no data to send.
https://gitweb.torproject.org/pluggable-transports/meek.git/commit/?h=0.28&id=0ea861efe5873b517fbd08c4bc48027e4db16a95
6 years ago
Yawning Angel e3d4c5308d fixup! Bug 24793: Send the correct authorization HTTP header for basic auth. 6 years ago
Yawning Angel 97a875ec3c Bump the version to 0.0.8-dev, signifying development towards 0.0.8. 8 years ago
Yawning Angel 8256fac93c Do the release ritual for obfs4proxy 0.0.7. 8 years ago
Yawning Angel 64e5920c84 Add a ChgangeLog entry for the read buffer fix (No functional changes). 8 years ago
Yawning Angel 62057625ea Use the correct epoch hour when crafting the obfs4 server ntor response.
It's supposed to use the one derived from the client's handshake
(assuming the clock skew is within acceptable limits), but it was using
the one based off the current system time.
8 years ago
Yawning Angel a7a2575cab The obfs4 `iat-mode` parameter is now properly configurable.
It used to be that all of the bridge side parameters needed to be
manually specified together.  This was somewhat nonsensical, and the IAT
mode can now be set as the only obfs4 option in a `ServerTransportOptions`
torrc directive.

Thanks to dcf for reporting the issue.
8 years ago
Yawning Angel 1df5c8ffe8 Bump the version to 0.0.7-dev, signifying development towards 0.0.7. 8 years ago
Yawning Angel 896a98c427 Do the release ritual for obfs4proxy-0.0.6. 8 years ago
Yawning Angel 611205be68 Add the "meek_lite" transport, which does what one would expect.
This is a meek client only implementation, with the following
differences with dcf's `meek-client`:

 - It is named `meek_lite` to differentiate it from the real thing.
 - It does not support using an external helper to normalize TLS
   signatures, so adversaries can look for someone using the Go
   TLS library to do HTTP.
 - It does the right thing with TOR_PT_PROXY, even when a helper is
   not present.

Most of the credit goes to dcf, who's code I librerally cribbed and
stole.  It is intended primarily as a "better than nothina" option
for enviornments that do not or can not presently use an external
Firefox helper.
9 years ago
Yawning Angel 69ffcc39c6 Delay transport initialization till after logging has been setup. 9 years ago
Yawning Angel 37a709d8b4 Bump the version to 0.0.6-dev, signifying development towards 0.0.6. 9 years ago
Yawning Angel 3540313e53 Do the release ritual for obfs4proxy-0.0.5. 9 years ago
Yawning Angel a8d7134f10 Use a built in SOCKS 5 server instead of goptlibs.
Differences from my goptlib branch:
 * Instead of exposing a net.Listener, just expose a Handshake() routine
   that takes an existing net.Conn. (#14135 is irrelevant to this socks
   server.
 * There's an extra routine for sending back sensible errors on Dial
   failure instead of "General failure".
 * The code is slightly cleaner (IMO).

Gotchas:
 * If the goptlib pt.Args datatype or external interface changes,
   args.go will need to be updated.

Tested with obfs3 and obfs4, including IPv6.
9 years ago
Yawning Angel df42657079 Move logging wrappers into common/log, and add a DEBUG log level.
Implements feature #15576.
9 years ago
Yawning Angel 402fe97d85 Add support for tor feature #15435.
If the relevant enviornment variable is set, treat read errors from
Stdin as a SIGTERM.
9 years ago
Yawning Angel 4e4c9052f4 Attempt to detect if the parent crashed without killing obfs4proxy.
The ideal solution here would be to implement #15435, but till then
use one of several kludges:
 * Linux - prctl() so that the kernel SIGTERMs on parent exit.
 * Other U*ix - Poll the parent process id once a second, and SIGTERM
   ourself/exit if it changes.  Former is better since all the normal
   cleanup if any gets done.
 * Windows - Log a warning.
9 years ago
Yawning Angel aed4b72389 Change the import path for go.net.
The Go developers decided to move the go.net repository to
golang.org/x/net, and also to transition from hg to git.  This wasn't
changed when the go.crypto imports were since the 'proxy' component
doesn't have imports that break, so the old code still works.

While the change here is simple (just update the import location), this
affects packagers as it now expects the updated package.  Sorry for the
inconveneince, I blame the Go people, and myself for not just doing
this along with the go.crypto changes.
9 years ago
Yawning Angel 594d45be02 Update the ChangeLog (No functional changes). 9 years ago
Yawning Angel 6d1b69d299 Update the ChangeLog (No functional changes). 9 years ago
Yawning Angel 714581df51 Do the release ritual for obfs4proxy-0.0.4. 9 years ago
Yawning Angel 0066cfc393 Add support for acting as a ScrambleSuit client.
This allows obfs4proxy to be used as a ScrambleSuit client that is wire
compatible with the obfs4proxy implementation, including session ticket
support, and length obfuscation.

The current implementation has the following limitations:
 * IAT obfuscation is not supported (and is disabled in all other
   ScrambleSuit implementations by default).
 * The length distribution and probabilites are different from those
   generated by obfsproxy and obfsclient due to a different DRBG.
 * Server support is missing and is unlikely to be implemented.
9 years ago
Yawning Angel cdeda57241 Change the import path for go.crypto.
The Go developers decided to move the go.crypto repository to
golang.org/x/crypto, and also to transition from hg to git.  The tip of
tree code.google.com copy of the code is broken due to the import paths
pointing at the new repository.

While the change here is simple (just update the import location), this
affects packagers as it now expects the updated package.  Sorry for the
inconveneince, I blame the Go people.
10 years ago
Yawning Angel 4932821bda Improve the performance of the obfs4 handshake test.
Exhaustively testing padding combinations is really slow, and was
causing timeouts during the Debian ARM package build process.  Attempt
to improve the situation by:

 * Reusing the client and server keypair for all of the tests, to cut
   runtime down by  ~50%.
 * Splitting the client side and server side tests up, as it appears
   the timeout is per-test case.

If this doesn't fix things, the next thing to try would be to reduce
the actual number of padding lengths tested, but that is a last resort
at the moment.
10 years ago
Yawning Angel fc00015ee2 Do the release ritual for obfs4proxy-0.0.3. 10 years ago
Yawning Angel 6cd81ec42f Change the bridge line format to be more compact.
Instead of "node-id" and "public-key" that are Base16 encoded, use
"cert" which contains the "node-id" and "public-key" in Base64 encoded
form.  This is more compact and cuts the length down by 49 characters.
10 years ago
Yawning Angel 213495d3b9 Do the release ritual for obfs4proxy-0.0.2. 10 years ago
Yawning Angel 514c3c6053 Write an example obfs4 bridge line to "obfs4_bridgeline.txt".
Write an example client bridge line suitable for use with the running
obfs4 server instance to "obfs4_bridgeline.txt" for the convenience of
bridge operators.
10 years ago
Yawning Angel 09633500b3 Add a man page for obfs4proxy. 10 years ago