mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-05 04:57:35 +03:00
Merge fa20ecfcc0
into e430876b1d
This commit is contained in:
commit
af05186dfc
8 changed files with 362 additions and 42 deletions
10
ech.go
10
ech.go
|
@ -207,8 +207,16 @@ func pickECHCipherSuite(suites []echCipher) (echCipher, error) {
|
||||||
return echCipher{}, errors.New("tls: no supported symmetric ciphersuites for ECH")
|
return echCipher{}, errors.New("tls: no supported symmetric ciphersuites for ECH")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// [uTLS SECTION BEGIN]
|
||||||
func encodeInnerClientHello(inner *clientHelloMsg, maxNameLength int) ([]byte, error) {
|
func encodeInnerClientHello(inner *clientHelloMsg, maxNameLength int) ([]byte, error) {
|
||||||
h, err := inner.marshalMsg(true)
|
return encodeInnerClientHelloReorderOuterExts(inner, maxNameLength, nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
// [uTLS SECTION END]
|
||||||
|
|
||||||
|
// func encodeInnerClientHello(inner *clientHelloMsg, maxNameLength int) ([]byte, error) {
|
||||||
|
func encodeInnerClientHelloReorderOuterExts(inner *clientHelloMsg, maxNameLength int, outerExts []uint16) ([]byte, error) { // uTLS
|
||||||
|
h, err := inner.marshalMsgReorderOuterExts(true, outerExts)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
|
@ -75,9 +75,17 @@ func (hs *clientHandshakeStateTLS13) handshake() error {
|
||||||
|
|
||||||
if hs.echContext != nil {
|
if hs.echContext != nil {
|
||||||
hs.echContext.innerTranscript = hs.suite.hash.New()
|
hs.echContext.innerTranscript = hs.suite.hash.New()
|
||||||
if err := transcriptMsg(hs.echContext.innerHello, hs.echContext.innerTranscript); err != nil {
|
// [uTLS SECTION BEGIN]
|
||||||
return err
|
if hs.uconn != nil && hs.uconn.clientHelloBuildStatus == BuildByUtls {
|
||||||
|
if err := hs.uconn.echTranscriptMsg(hs.hello, hs.echContext); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
if err := transcriptMsg(hs.echContext.innerHello, hs.echContext.innerTranscript); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
// [uTLS SECTION END]
|
||||||
}
|
}
|
||||||
|
|
||||||
if bytes.Equal(hs.serverHello.random, helloRetryRequestRandom) {
|
if bytes.Equal(hs.serverHello.random, helloRetryRequestRandom) {
|
||||||
|
@ -426,7 +434,7 @@ func (hs *clientHandshakeStateTLS13) processHelloRetryRequest() error {
|
||||||
hs.uconn.Extensions[cookieIndex:]...)...)
|
hs.uconn.Extensions[cookieIndex:]...)...)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if err := hs.uconn.MarshalClientHello(); err != nil {
|
if err := hs.uconn.MarshalClientHelloNoECH(); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
hs.hello.original = hs.uconn.HandshakeState.Hello.Raw
|
hs.hello.original = hs.uconn.HandshakeState.Hello.Raw
|
||||||
|
@ -445,12 +453,25 @@ func (hs *clientHandshakeStateTLS13) processHelloRetryRequest() error {
|
||||||
// extension which may have changed is keyShares.
|
// extension which may have changed is keyShares.
|
||||||
hs.hello.keyShares = hello.keyShares
|
hs.hello.keyShares = hello.keyShares
|
||||||
hs.echContext.innerHello = hello
|
hs.echContext.innerHello = hello
|
||||||
if err := transcriptMsg(hs.echContext.innerHello, hs.echContext.innerTranscript); err != nil {
|
if hs.uconn != nil && hs.uconn.clientHelloBuildStatus == BuildByUtls {
|
||||||
return err
|
if err := hs.uconn.computeAndUpdateOuterECHExtension(hs.echContext.innerHello, hs.echContext, false); err != nil {
|
||||||
}
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
if err := computeAndUpdateOuterECHExtension(hs.hello, hs.echContext.innerHello, hs.echContext, false); err != nil {
|
hs.hello.original = hs.uconn.HandshakeState.Hello.Raw
|
||||||
return err
|
|
||||||
|
if err := hs.uconn.echTranscriptMsg(hs.hello, hs.echContext); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
} else {
|
||||||
|
if err := transcriptMsg(hs.echContext.innerHello, hs.echContext.innerTranscript); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := computeAndUpdateOuterECHExtension(hs.hello, hs.echContext.innerHello, hs.echContext, false); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
hs.hello = hello
|
hs.hello = hello
|
||||||
|
|
|
@ -106,6 +106,12 @@ type clientHelloMsg struct {
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m *clientHelloMsg) marshalMsg(echInner bool) ([]byte, error) {
|
func (m *clientHelloMsg) marshalMsg(echInner bool) ([]byte, error) {
|
||||||
|
// [uTLS SECTION BEGIN]
|
||||||
|
return m.marshalMsgReorderOuterExts(echInner, nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *clientHelloMsg) marshalMsgReorderOuterExts(echInner bool, outerExts []uint16) ([]byte, error) {
|
||||||
|
// [uTLS SECTION END]
|
||||||
var exts cryptobyte.Builder
|
var exts cryptobyte.Builder
|
||||||
if len(m.serverName) > 0 {
|
if len(m.serverName) > 0 {
|
||||||
// RFC 6066, Section 3
|
// RFC 6066, Section 3
|
||||||
|
@ -254,7 +260,7 @@ func (m *clientHelloMsg) marshalMsg(echInner bool) ([]byte, error) {
|
||||||
}
|
}
|
||||||
if len(m.supportedVersions) > 0 {
|
if len(m.supportedVersions) > 0 {
|
||||||
// RFC 8446, Section 4.2.1
|
// RFC 8446, Section 4.2.1
|
||||||
if echInner {
|
if echInner && outerExts == nil { // uTLS
|
||||||
echOuterExts = append(echOuterExts, extensionSupportedVersions)
|
echOuterExts = append(echOuterExts, extensionSupportedVersions)
|
||||||
} else {
|
} else {
|
||||||
exts.AddUint16(extensionSupportedVersions)
|
exts.AddUint16(extensionSupportedVersions)
|
||||||
|
@ -311,6 +317,21 @@ func (m *clientHelloMsg) marshalMsg(echInner bool) ([]byte, error) {
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
// [uTLS SECTION BEGIN]
|
||||||
|
// reorder OuterExtensions according to their order in the spec
|
||||||
|
if echInner && outerExts != nil {
|
||||||
|
echOuterExtsReordered := slices.Collect(func(yield func(uint16) bool) {
|
||||||
|
for _, ext := range outerExts {
|
||||||
|
if slices.Contains(echOuterExts, ext) {
|
||||||
|
if !yield(ext) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
})
|
||||||
|
echOuterExts = echOuterExtsReordered
|
||||||
|
}
|
||||||
|
// [uTLS SECTION END]
|
||||||
if len(echOuterExts) > 0 && echInner {
|
if len(echOuterExts) > 0 && echInner {
|
||||||
exts.AddUint16(extensionECHOuterExtensions)
|
exts.AddUint16(extensionECHOuterExtensions)
|
||||||
exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
|
exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
|
||||||
|
|
|
@ -476,11 +476,32 @@ func runMain(m *testing.M) int {
|
||||||
}
|
}
|
||||||
|
|
||||||
func testHandshake(t *testing.T, clientConfig, serverConfig *Config) (serverState, clientState ConnectionState, err error) {
|
func testHandshake(t *testing.T, clientConfig, serverConfig *Config) (serverState, clientState ConnectionState, err error) {
|
||||||
|
// [uTLS SECTION BEGIN]
|
||||||
|
return testUtlsHandshake(t, clientConfig, serverConfig, nil)
|
||||||
|
}
|
||||||
|
func testUtlsHandshake(t *testing.T, clientConfig, serverConfig *Config, spec *ClientHelloSpec) (serverState, clientState ConnectionState, err error) {
|
||||||
|
// [uTLS SECTION END]
|
||||||
const sentinel = "SENTINEL\n"
|
const sentinel = "SENTINEL\n"
|
||||||
c, s := localPipe(t)
|
c, s := localPipe(t)
|
||||||
errChan := make(chan error, 1)
|
errChan := make(chan error, 1)
|
||||||
go func() {
|
go func() {
|
||||||
cli := Client(c, clientConfig)
|
// [uTLS SECTION BEGIN]
|
||||||
|
var cli interface {
|
||||||
|
Handshake() error
|
||||||
|
ConnectionState() ConnectionState
|
||||||
|
Close() error
|
||||||
|
io.Reader
|
||||||
|
}
|
||||||
|
if spec != nil {
|
||||||
|
ucli := UClient(c, clientConfig, HelloCustom)
|
||||||
|
if err = ucli.ApplyPreset(spec); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
cli = ucli
|
||||||
|
} else {
|
||||||
|
cli = Client(c, clientConfig)
|
||||||
|
}
|
||||||
|
// [uTLS SECTION END]
|
||||||
err := cli.Handshake()
|
err := cli.Handshake()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
errChan <- fmt.Errorf("client: %v", err)
|
errChan <- fmt.Errorf("client: %v", err)
|
||||||
|
|
54
tls_test.go
54
tls_test.go
|
@ -2068,6 +2068,10 @@ func TestLargeCertMsg(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestECH(t *testing.T) {
|
func TestECH(t *testing.T) {
|
||||||
|
testECHSpec(t, nil, true)
|
||||||
|
}
|
||||||
|
|
||||||
|
func testECHSpec(t *testing.T, spec *ClientHelloSpec, expectSuccess bool) {
|
||||||
k, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
|
k, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
|
@ -2157,26 +2161,34 @@ func TestECH(t *testing.T) {
|
||||||
{Config: echConfig, PrivateKey: echKey.Bytes(), SendAsRetry: true},
|
{Config: echConfig, PrivateKey: echKey.Bytes(), SendAsRetry: true},
|
||||||
}
|
}
|
||||||
|
|
||||||
ss, cs, err := testHandshake(t, clientConfig, serverConfig)
|
// [uTLS SECTION BEGIN]
|
||||||
if err != nil {
|
ss, cs, err := testUtlsHandshake(t, clientConfig, serverConfig, spec)
|
||||||
t.Fatalf("unexpected failure: %s", err)
|
if expectSuccess {
|
||||||
}
|
if err != nil {
|
||||||
if !ss.ECHAccepted {
|
t.Fatalf("unexpected failure: %s", err)
|
||||||
t.Fatal("server ConnectionState shows ECH not accepted")
|
}
|
||||||
}
|
if !ss.ECHAccepted {
|
||||||
if !cs.ECHAccepted {
|
t.Fatal("server ConnectionState shows ECH not accepted")
|
||||||
t.Fatal("client ConnectionState shows ECH not accepted")
|
}
|
||||||
}
|
if !cs.ECHAccepted {
|
||||||
if cs.ServerName != "secret.example" || ss.ServerName != "secret.example" {
|
t.Fatal("client ConnectionState shows ECH not accepted")
|
||||||
t.Fatalf("unexpected ConnectionState.ServerName, want %q, got server:%q, client: %q", "secret.example", ss.ServerName, cs.ServerName)
|
}
|
||||||
}
|
if cs.ServerName != "secret.example" || ss.ServerName != "secret.example" {
|
||||||
if len(cs.VerifiedChains) != 1 {
|
t.Fatalf("unexpected ConnectionState.ServerName, want %q, got server:%q, client: %q", "secret.example", ss.ServerName, cs.ServerName)
|
||||||
t.Fatal("unexpect number of certificate chains")
|
}
|
||||||
}
|
if len(cs.VerifiedChains) != 1 {
|
||||||
if len(cs.VerifiedChains[0]) != 1 {
|
t.Fatal("unexpect number of certificate chains")
|
||||||
t.Fatal("unexpect number of certificates")
|
}
|
||||||
}
|
if len(cs.VerifiedChains[0]) != 1 {
|
||||||
if !cs.VerifiedChains[0][0].Equal(secretCert) {
|
t.Fatal("unexpect number of certificates")
|
||||||
t.Fatal("unexpected certificate")
|
}
|
||||||
|
if !cs.VerifiedChains[0][0].Equal(secretCert) {
|
||||||
|
t.Fatal("unexpected certificate")
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
if err == nil {
|
||||||
|
t.Fatalf("unexpected handshake success, expected failure")
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
// [uTLS SECTION END]
|
||||||
}
|
}
|
||||||
|
|
127
u_conn.go
127
u_conn.go
|
@ -14,7 +14,10 @@ import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"hash"
|
"hash"
|
||||||
"net"
|
"net"
|
||||||
|
"slices"
|
||||||
"strconv"
|
"strconv"
|
||||||
|
|
||||||
|
"golang.org/x/crypto/cryptobyte"
|
||||||
)
|
)
|
||||||
|
|
||||||
type ClientHelloBuildStatus int
|
type ClientHelloBuildStatus int
|
||||||
|
@ -487,15 +490,119 @@ func (uconn *UConn) ApplyConfig() error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (uconn *UConn) MarshalClientHello() error {
|
func (uconn *UConn) extensionsList() []uint16 {
|
||||||
if len(uconn.config.ECHConfigs) > 0 && uconn.ech != nil {
|
|
||||||
if err := uconn.ech.Configure(uconn.config.ECHConfigs); err != nil {
|
outerExts := []uint16{}
|
||||||
return err
|
for _, ext := range uconn.Extensions {
|
||||||
}
|
buffer := cryptobyte.String(make([]byte, 2000))
|
||||||
return uconn.ech.MarshalClientHello(uconn)
|
ext.Read(buffer)
|
||||||
|
var extension uint16
|
||||||
|
buffer.ReadUint16(&extension)
|
||||||
|
outerExts = append(outerExts, extension)
|
||||||
|
}
|
||||||
|
return outerExts
|
||||||
|
}
|
||||||
|
|
||||||
|
func (uconn *UConn) computeAndUpdateOuterECHExtension(inner *clientHelloMsg, ech *echClientContext, useKey bool) error {
|
||||||
|
// This function is mostly copied from
|
||||||
|
// https://github.com/refraction-networking/utls/blob/e430876b1d82fdf582efc57f3992d448e7ab3d8a/ech.go#L408
|
||||||
|
var encapKey []byte
|
||||||
|
if useKey {
|
||||||
|
encapKey = ech.encapsulatedKey
|
||||||
}
|
}
|
||||||
|
|
||||||
return uconn.MarshalClientHelloNoECH() // if no ECH pointer, just marshal normally
|
encodedInner, err := encodeInnerClientHelloReorderOuterExts(inner, int(ech.config.MaxNameLength), uconn.extensionsList())
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
encryptedLen := len(encodedInner) + 16
|
||||||
|
outerECHExt, err := generateOuterECHExt(ech.config.ConfigID, ech.kdfID, ech.aeadID, encapKey, make([]byte, encryptedLen))
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
echExtIdx := slices.IndexFunc(uconn.Extensions, func(ext TLSExtension) bool {
|
||||||
|
_, ok := ext.(EncryptedClientHelloExtension)
|
||||||
|
return ok
|
||||||
|
})
|
||||||
|
if echExtIdx < 0 {
|
||||||
|
return fmt.Errorf("extension satisfying EncryptedClientHelloExtension not present")
|
||||||
|
}
|
||||||
|
oldExt := uconn.Extensions[echExtIdx]
|
||||||
|
|
||||||
|
uconn.Extensions[echExtIdx] = &GenericExtension{
|
||||||
|
Id: extensionEncryptedClientHello,
|
||||||
|
Data: outerECHExt,
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := uconn.MarshalClientHelloNoECH(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
serializedOuter := uconn.HandshakeState.Hello.Raw
|
||||||
|
serializedOuter = serializedOuter[4:]
|
||||||
|
encryptedInner, err := ech.hpkeContext.Seal(serializedOuter, encodedInner)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
outerECHExt, err = generateOuterECHExt(ech.config.ConfigID, ech.kdfID, ech.aeadID, encapKey, encryptedInner)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
uconn.Extensions[echExtIdx] = &GenericExtension{
|
||||||
|
Id: extensionEncryptedClientHello,
|
||||||
|
Data: outerECHExt,
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := uconn.MarshalClientHelloNoECH(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
uconn.Extensions[echExtIdx] = oldExt
|
||||||
|
return nil
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
func (uconn *UConn) MarshalClientHello() error {
|
||||||
|
if len(uconn.config.EncryptedClientHelloConfigList) > 0 {
|
||||||
|
inner, _, ech, err := uconn.makeClientHello()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// copy compressed extensions to the ClientHelloInner
|
||||||
|
inner.keyShares = KeyShares(uconn.HandshakeState.Hello.KeyShares).ToPrivate()
|
||||||
|
inner.supportedSignatureAlgorithms = uconn.HandshakeState.Hello.SupportedSignatureAlgorithms
|
||||||
|
inner.sessionId = uconn.HandshakeState.Hello.SessionId
|
||||||
|
inner.supportedCurves = uconn.HandshakeState.Hello.SupportedCurves
|
||||||
|
|
||||||
|
ech.innerHello = inner
|
||||||
|
|
||||||
|
sniExtIdex := slices.IndexFunc(uconn.Extensions, func(ext TLSExtension) bool {
|
||||||
|
_, ok := ext.(*SNIExtension)
|
||||||
|
return ok
|
||||||
|
})
|
||||||
|
if sniExtIdex < 0 {
|
||||||
|
return fmt.Errorf("sni extension missing while attempting ECH")
|
||||||
|
}
|
||||||
|
|
||||||
|
uconn.Extensions[sniExtIdex] = &SNIExtension{
|
||||||
|
ServerName: string(ech.config.PublicName),
|
||||||
|
}
|
||||||
|
|
||||||
|
uconn.computeAndUpdateOuterECHExtension(inner, ech, true)
|
||||||
|
|
||||||
|
uconn.echCtx = ech
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := uconn.MarshalClientHelloNoECH(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// MarshalClientHelloNoECH marshals ClientHello as if there was no
|
// MarshalClientHelloNoECH marshals ClientHello as if there was no
|
||||||
|
@ -651,8 +758,10 @@ func (uconn *UConn) SetTLSVers(minTLSVers, maxTLSVers uint16, specExtensions []T
|
||||||
}
|
}
|
||||||
|
|
||||||
uconn.HandshakeState.Hello.SupportedVersions = makeSupportedVersions(minTLSVers, maxTLSVers)
|
uconn.HandshakeState.Hello.SupportedVersions = makeSupportedVersions(minTLSVers, maxTLSVers)
|
||||||
uconn.config.MinVersion = minTLSVers
|
if uconn.config.EncryptedClientHelloConfigList == nil {
|
||||||
uconn.config.MaxVersion = maxTLSVers
|
uconn.config.MinVersion = minTLSVers
|
||||||
|
uconn.config.MaxVersion = maxTLSVers
|
||||||
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
108
u_conn_test.go
108
u_conn_test.go
|
@ -743,3 +743,111 @@ func TestUTLSMakeConnWithCompleteHandshake(t *testing.T) {
|
||||||
|
|
||||||
serverTls.Write(serverMsg)
|
serverTls.Write(serverMsg)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestUTLSECH(t *testing.T) {
|
||||||
|
chromeLatest, err := utlsIdToSpec(HelloChrome_Auto)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
firefoxLatest, err := utlsIdToSpec(HelloFirefox_Auto)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, test := range []struct {
|
||||||
|
name string
|
||||||
|
spec *ClientHelloSpec
|
||||||
|
expectSuccess bool
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "latest chrome",
|
||||||
|
spec: &chromeLatest,
|
||||||
|
expectSuccess: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "latest firefox",
|
||||||
|
spec: &firefoxLatest,
|
||||||
|
expectSuccess: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "ech extension missing",
|
||||||
|
spec: &ClientHelloSpec{
|
||||||
|
CipherSuites: []uint16{
|
||||||
|
GREASE_PLACEHOLDER,
|
||||||
|
TLS_AES_128_GCM_SHA256,
|
||||||
|
TLS_AES_256_GCM_SHA384,
|
||||||
|
TLS_CHACHA20_POLY1305_SHA256,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
|
||||||
|
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
|
||||||
|
TLS_RSA_WITH_AES_128_GCM_SHA256,
|
||||||
|
TLS_RSA_WITH_AES_256_GCM_SHA384,
|
||||||
|
TLS_RSA_WITH_AES_128_CBC_SHA,
|
||||||
|
TLS_RSA_WITH_AES_256_CBC_SHA,
|
||||||
|
},
|
||||||
|
CompressionMethods: []byte{
|
||||||
|
0x00, // compressionNone
|
||||||
|
},
|
||||||
|
Extensions: ShuffleChromeTLSExtensions([]TLSExtension{
|
||||||
|
&UtlsGREASEExtension{},
|
||||||
|
&SNIExtension{},
|
||||||
|
&ExtendedMasterSecretExtension{},
|
||||||
|
&RenegotiationInfoExtension{Renegotiation: RenegotiateOnceAsClient},
|
||||||
|
&SupportedCurvesExtension{[]CurveID{
|
||||||
|
GREASE_PLACEHOLDER,
|
||||||
|
X25519Kyber768Draft00,
|
||||||
|
X25519,
|
||||||
|
CurveP256,
|
||||||
|
CurveP384,
|
||||||
|
}},
|
||||||
|
&SupportedPointsExtension{SupportedPoints: []byte{
|
||||||
|
0x00, // pointFormatUncompressed
|
||||||
|
}},
|
||||||
|
&SessionTicketExtension{},
|
||||||
|
&ALPNExtension{AlpnProtocols: []string{"h2", "http/1.1"}},
|
||||||
|
&StatusRequestExtension{},
|
||||||
|
&SignatureAlgorithmsExtension{SupportedSignatureAlgorithms: []SignatureScheme{
|
||||||
|
ECDSAWithP256AndSHA256,
|
||||||
|
PSSWithSHA256,
|
||||||
|
PKCS1WithSHA256,
|
||||||
|
ECDSAWithP384AndSHA384,
|
||||||
|
PSSWithSHA384,
|
||||||
|
PKCS1WithSHA384,
|
||||||
|
PSSWithSHA512,
|
||||||
|
PKCS1WithSHA512,
|
||||||
|
}},
|
||||||
|
&SCTExtension{},
|
||||||
|
&KeyShareExtension{[]KeyShare{
|
||||||
|
{Group: CurveID(GREASE_PLACEHOLDER), Data: []byte{0}},
|
||||||
|
{Group: X25519Kyber768Draft00},
|
||||||
|
{Group: X25519},
|
||||||
|
}},
|
||||||
|
&PSKKeyExchangeModesExtension{[]uint8{
|
||||||
|
PskModeDHE,
|
||||||
|
}},
|
||||||
|
&SupportedVersionsExtension{[]uint16{
|
||||||
|
GREASE_PLACEHOLDER,
|
||||||
|
VersionTLS13,
|
||||||
|
VersionTLS12,
|
||||||
|
}},
|
||||||
|
&UtlsCompressCertExtension{[]CertCompressionAlgo{
|
||||||
|
CertCompressionBrotli,
|
||||||
|
}},
|
||||||
|
&ApplicationSettingsExtension{SupportedProtocols: []string{"h2"}},
|
||||||
|
&UtlsGREASEExtension{},
|
||||||
|
}),
|
||||||
|
},
|
||||||
|
expectSuccess: false,
|
||||||
|
},
|
||||||
|
} {
|
||||||
|
t.Run(test.name, func(t *testing.T) {
|
||||||
|
testECHSpec(t, test.spec, test.expectSuccess)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
|
@ -483,7 +483,7 @@ func (c *UConn) clientHandshake(ctx context.Context) (err error) {
|
||||||
}()
|
}()
|
||||||
}
|
}
|
||||||
|
|
||||||
if ech != nil {
|
if ech != nil && c.clientHelloBuildStatus != BuildByUtls {
|
||||||
// Split hello into inner and outer
|
// Split hello into inner and outer
|
||||||
ech.innerHello = hello.clone()
|
ech.innerHello = hello.clone()
|
||||||
|
|
||||||
|
@ -578,3 +578,23 @@ func (c *UConn) clientHandshake(ctx context.Context) (err error) {
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (c *UConn) echTranscriptMsg(outer *clientHelloMsg, echCtx *echClientContext) (err error) {
|
||||||
|
// Recreate the inner ClientHello from its compressed form using server's decodeInnerClientHello function.
|
||||||
|
// See https://github.com/refraction-networking/utls/blob/e430876b1d82fdf582efc57f3992d448e7ab3d8a/ech.go#L276-L283
|
||||||
|
encodedInner, err := encodeInnerClientHelloReorderOuterExts(echCtx.innerHello, int(echCtx.config.MaxNameLength), c.extensionsList())
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
decodedInner, err := decodeInnerClientHello(outer, encodedInner)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := transcriptMsg(decodedInner, echCtx.innerTranscript); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue