mirror of
https://github.com/DNSCrypt/dnscrypt-proxy.git
synced 2025-04-04 21:57:44 +03:00
Remove support for xsalsapoly
This commit is contained in:
parent
699a6a1ebc
commit
8987906653
3 changed files with 8 additions and 28 deletions
|
@ -18,7 +18,6 @@ type CryptoConstruction uint16
|
||||||
|
|
||||||
const (
|
const (
|
||||||
UndefinedConstruction CryptoConstruction = iota
|
UndefinedConstruction CryptoConstruction = iota
|
||||||
XSalsa20Poly1305
|
|
||||||
XChacha20Poly1305
|
XChacha20Poly1305
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
|
@ -9,8 +9,6 @@ import (
|
||||||
"github.com/jedisct1/dlog"
|
"github.com/jedisct1/dlog"
|
||||||
"github.com/jedisct1/xsecretbox"
|
"github.com/jedisct1/xsecretbox"
|
||||||
"golang.org/x/crypto/curve25519"
|
"golang.org/x/crypto/curve25519"
|
||||||
"golang.org/x/crypto/nacl/box"
|
|
||||||
"golang.org/x/crypto/nacl/secretbox"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
@ -57,19 +55,9 @@ func ComputeSharedKey(
|
||||||
dlog.Criticalf("[%v] Weak XChaCha20 public key", providerName)
|
dlog.Criticalf("[%v] Weak XChaCha20 public key", providerName)
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
box.Precompute(&sharedKey, serverPk, secretKey)
|
dlog.Criticalf("[%v] Unsupported encryption system", providerName)
|
||||||
c := byte(0)
|
|
||||||
for i := 0; i < 32; i++ {
|
|
||||||
c |= sharedKey[i]
|
|
||||||
}
|
|
||||||
if c == 0 {
|
|
||||||
dlog.Criticalf("[%v] Weak XSalsa20 public key", providerName)
|
|
||||||
if _, err := crypto_rand.Read(sharedKey[:]); err != nil {
|
|
||||||
dlog.Fatal(err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
return
|
return sharedKey
|
||||||
}
|
}
|
||||||
|
|
||||||
func (proxy *Proxy) Encrypt(
|
func (proxy *Proxy) Encrypt(
|
||||||
|
@ -124,9 +112,7 @@ func (proxy *Proxy) Encrypt(
|
||||||
if serverInfo.CryptoConstruction == XChacha20Poly1305 {
|
if serverInfo.CryptoConstruction == XChacha20Poly1305 {
|
||||||
encrypted = xsecretbox.Seal(encrypted, nonce, padded, sharedKey[:])
|
encrypted = xsecretbox.Seal(encrypted, nonce, padded, sharedKey[:])
|
||||||
} else {
|
} else {
|
||||||
var xsalsaNonce [24]byte
|
err = errors.New("Unsupported encryption system")
|
||||||
copy(xsalsaNonce[:], nonce)
|
|
||||||
encrypted = secretbox.Seal(encrypted, padded, &xsalsaNonce, sharedKey)
|
|
||||||
}
|
}
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
@ -153,13 +139,7 @@ func (proxy *Proxy) Decrypt(
|
||||||
if serverInfo.CryptoConstruction == XChacha20Poly1305 {
|
if serverInfo.CryptoConstruction == XChacha20Poly1305 {
|
||||||
packet, err = xsecretbox.Open(nil, serverNonce, encrypted[responseHeaderLen:], sharedKey[:])
|
packet, err = xsecretbox.Open(nil, serverNonce, encrypted[responseHeaderLen:], sharedKey[:])
|
||||||
} else {
|
} else {
|
||||||
var xsalsaServerNonce [24]byte
|
err = errors.New("Unsupported encryption system")
|
||||||
copy(xsalsaServerNonce[:], serverNonce)
|
|
||||||
var ok bool
|
|
||||||
packet, ok = secretbox.Open(nil, encrypted[responseHeaderLen:], &xsalsaServerNonce, sharedKey)
|
|
||||||
if !ok {
|
|
||||||
err = errors.New("Incorrect tag")
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return encrypted, err
|
return encrypted, err
|
||||||
|
|
|
@ -95,11 +95,12 @@ func FetchCurrentDNSCryptCert(
|
||||||
cryptoConstruction := CryptoConstruction(0)
|
cryptoConstruction := CryptoConstruction(0)
|
||||||
switch esVersion := binary.BigEndian.Uint16(binCert[4:6]); esVersion {
|
switch esVersion := binary.BigEndian.Uint16(binCert[4:6]); esVersion {
|
||||||
case 0x0001:
|
case 0x0001:
|
||||||
cryptoConstruction = XSalsa20Poly1305
|
dlog.Noticef("[%v] Deprecated, now unsupported encryption system", *serverName)
|
||||||
|
continue
|
||||||
case 0x0002:
|
case 0x0002:
|
||||||
cryptoConstruction = XChacha20Poly1305
|
cryptoConstruction = XChacha20Poly1305
|
||||||
default:
|
default:
|
||||||
dlog.Noticef("[%v] Unsupported crypto construction", *serverName)
|
dlog.Noticef("[%v] Unsupported encryption system", *serverName)
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
signature := binCert[8:72]
|
signature := binCert[8:72]
|
||||||
|
@ -163,7 +164,7 @@ func FetchCurrentDNSCryptCert(
|
||||||
dlog.Debugf("[%v] Upgrading the construction from %v to %v", *serverName, certInfo.CryptoConstruction, cryptoConstruction)
|
dlog.Debugf("[%v] Upgrading the construction from %v to %v", *serverName, certInfo.CryptoConstruction, cryptoConstruction)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if cryptoConstruction != XChacha20Poly1305 && cryptoConstruction != XSalsa20Poly1305 {
|
if cryptoConstruction != XChacha20Poly1305 {
|
||||||
dlog.Noticef("[%v] Cryptographic construction %v not supported", *serverName, cryptoConstruction)
|
dlog.Noticef("[%v] Cryptographic construction %v not supported", *serverName, cryptoConstruction)
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue