mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-04 04:27:36 +03:00
feat: add GREASEEncryptedClientHelloExtension (#266)
* dicttls: update ECH-related entries * wip: GREASE ECH extension * new: GREASE ECH extension * fix: GREASE ECH Read must succeed with io.EOF * new: GREASE ECH multiple payload len * new: parse ECH in EncryptedExtensions * fix: ECHConfig Length always 0 * new: GREASE ECH parrots * new: (*Config).ECHConfigs Add (*Config).ECHConfigs for future full ECH extension. * new: add GREASE ECH example Add an incomplete example of using GREASE ECH extension (Chrome 120 parrot). * fix: invalid httpGetOverConn call fix a problem in old example where httpGetOverConn was called with uTlsConn.HandshakeState.ServerHello.AlpnProtocol, which will not be populated in case TLS 1.3 is used. * new: possible InnerClientHello length
This commit is contained in:
parent
9521fba944
commit
b4de442d02
19 changed files with 925 additions and 51 deletions
127
examples/ech/main.go
Normal file
127
examples/ech/main.go
Normal file
|
@ -0,0 +1,127 @@
|
|||
package main
|
||||
|
||||
import (
|
||||
"bufio"
|
||||
"errors"
|
||||
"fmt"
|
||||
"io"
|
||||
"log"
|
||||
"net"
|
||||
"net/http"
|
||||
"net/url"
|
||||
"os"
|
||||
"time"
|
||||
|
||||
tls "github.com/refraction-networking/utls"
|
||||
"golang.org/x/net/http2"
|
||||
)
|
||||
|
||||
var (
|
||||
dialTimeout = time.Duration(15) * time.Second
|
||||
)
|
||||
|
||||
// var requestHostname = "crypto.cloudflare.com" // speaks http2 and TLS 1.3 and ECH and PQ
|
||||
// var requestAddr = "crypto.cloudflare.com:443"
|
||||
// var requestPath = "/cdn-cgi/trace"
|
||||
|
||||
// var requestHostname = "tls-ech.dev" // speaks http2 and TLS 1.3 and ECH and PQ
|
||||
// var requestAddr = "tls-ech.dev:443"
|
||||
// var requestPath = "/"
|
||||
|
||||
var requestHostname = "defo.ie" // speaks http2 and TLS 1.3 and ECH and PQ
|
||||
var requestAddr = "defo.ie:443"
|
||||
var requestPath = "/ech-check.php"
|
||||
|
||||
// var requestHostname = "client.tlsfingerprint.io" // speaks http2 and TLS 1.3 and ECH and PQ
|
||||
// var requestAddr = "client.tlsfingerprint.io:443"
|
||||
// var requestPath = "/"
|
||||
|
||||
func HttpGetCustom(hostname string, addr string) (*http.Response, error) {
|
||||
klw, err := os.OpenFile("./sslkeylogging.log", os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0600)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("os.OpenFile error: %+v", err)
|
||||
}
|
||||
config := tls.Config{
|
||||
ServerName: hostname,
|
||||
KeyLogWriter: klw,
|
||||
}
|
||||
dialConn, err := net.DialTimeout("tcp", addr, dialTimeout)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("net.DialTimeout error: %+v", err)
|
||||
}
|
||||
uTlsConn := tls.UClient(dialConn, &config, tls.HelloCustom)
|
||||
defer uTlsConn.Close()
|
||||
|
||||
// do not use this particular spec in production
|
||||
// make sure to generate a separate copy of ClientHelloSpec for every connection
|
||||
spec, err := tls.UTLSIdToSpec(tls.HelloChrome_120)
|
||||
// spec, err := tls.UTLSIdToSpec(tls.HelloFirefox_120)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("tls.UTLSIdToSpec error: %+v", err)
|
||||
}
|
||||
|
||||
err = uTlsConn.ApplyPreset(&spec)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("uTlsConn.Handshake() error: %+v", err)
|
||||
}
|
||||
|
||||
err = uTlsConn.Handshake()
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("uTlsConn.Handshake() error: %+v", err)
|
||||
}
|
||||
|
||||
return httpGetOverConn(uTlsConn, uTlsConn.ConnectionState().NegotiatedProtocol)
|
||||
}
|
||||
|
||||
func httpGetOverConn(conn net.Conn, alpn string) (*http.Response, error) {
|
||||
req := &http.Request{
|
||||
Method: "GET",
|
||||
URL: &url.URL{Scheme: "https", Host: requestHostname, Path: requestPath},
|
||||
Header: make(http.Header),
|
||||
Host: requestHostname,
|
||||
}
|
||||
|
||||
switch alpn {
|
||||
case "h2":
|
||||
log.Println("HTTP/2 enabled")
|
||||
req.Proto = "HTTP/2.0"
|
||||
req.ProtoMajor = 2
|
||||
req.ProtoMinor = 0
|
||||
|
||||
tr := http2.Transport{}
|
||||
cConn, err := tr.NewClientConn(conn)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return cConn.RoundTrip(req)
|
||||
case "http/1.1", "":
|
||||
log.Println("Using HTTP/1.1")
|
||||
req.Proto = "HTTP/1.1"
|
||||
req.ProtoMajor = 1
|
||||
req.ProtoMinor = 1
|
||||
|
||||
err := req.Write(conn)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return http.ReadResponse(bufio.NewReader(conn), req)
|
||||
default:
|
||||
return nil, fmt.Errorf("unsupported ALPN: %v", alpn)
|
||||
}
|
||||
}
|
||||
|
||||
func main() {
|
||||
resp, err := HttpGetCustom(requestHostname, requestAddr)
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
fmt.Printf("Response: %+v\n", resp)
|
||||
// read from resp.Body
|
||||
body := make([]byte, 65535)
|
||||
n, err := resp.Body.Read(body)
|
||||
if err != nil && !errors.Is(err, io.EOF) {
|
||||
panic(err)
|
||||
}
|
||||
|
||||
fmt.Printf("Body: %s\n", body[:n])
|
||||
}
|
|
@ -49,7 +49,7 @@ func HttpGetByHelloID(hostname string, addr string, helloID tls.ClientHelloID) (
|
|||
return nil, fmt.Errorf("uTlsConn.Handshake() error: %+v", err)
|
||||
}
|
||||
|
||||
return httpGetOverConn(uTlsConn, uTlsConn.HandshakeState.ServerHello.AlpnProtocol)
|
||||
return httpGetOverConn(uTlsConn, uTlsConn.ConnectionState().NegotiatedProtocol)
|
||||
}
|
||||
|
||||
// this example generates a randomized fingeprint, then re-uses it in a follow-up connection
|
||||
|
@ -80,7 +80,7 @@ func HttpGetConsistentRandomized(hostname string, addr string) (*http.Response,
|
|||
return nil, fmt.Errorf("uTlsConn.Handshake() error: %+v", err)
|
||||
}
|
||||
|
||||
return httpGetOverConn(uTlsConn2, uTlsConn2.HandshakeState.ServerHello.AlpnProtocol)
|
||||
return httpGetOverConn(uTlsConn2, uTlsConn2.ConnectionState().NegotiatedProtocol)
|
||||
}
|
||||
|
||||
func HttpGetExplicitRandom(hostname string, addr string) (*http.Response, error) {
|
||||
|
@ -112,7 +112,7 @@ func HttpGetExplicitRandom(hostname string, addr string) (*http.Response, error)
|
|||
fmt.Printf("#> ClientHello Random:\n%s", hex.Dump(uTlsConn.HandshakeState.Hello.Random))
|
||||
fmt.Printf("#> ServerHello Random:\n%s", hex.Dump(uTlsConn.HandshakeState.ServerHello.Random))
|
||||
|
||||
return httpGetOverConn(uTlsConn, uTlsConn.HandshakeState.ServerHello.AlpnProtocol)
|
||||
return httpGetOverConn(uTlsConn, uTlsConn.ConnectionState().NegotiatedProtocol)
|
||||
}
|
||||
|
||||
// Note that the server will reject the fake ticket(unless you set up your server to accept them) and do full handshake
|
||||
|
@ -152,7 +152,7 @@ func HttpGetTicket(hostname string, addr string) (*http.Response, error) {
|
|||
fmt.Println("#> This is how client hello with session ticket looked:")
|
||||
fmt.Print(hex.Dump(uTlsConn.HandshakeState.Hello.Raw))
|
||||
|
||||
return httpGetOverConn(uTlsConn, uTlsConn.HandshakeState.ServerHello.AlpnProtocol)
|
||||
return httpGetOverConn(uTlsConn, uTlsConn.ConnectionState().NegotiatedProtocol)
|
||||
}
|
||||
|
||||
// Note that the server will reject the fake ticket(unless you set up your server to accept them) and do full handshake
|
||||
|
@ -183,7 +183,7 @@ func HttpGetTicketHelloID(hostname string, addr string, helloID tls.ClientHelloI
|
|||
fmt.Println("#> This is how client hello with session ticket looked:")
|
||||
fmt.Print(hex.Dump(uTlsConn.HandshakeState.Hello.Raw))
|
||||
|
||||
return httpGetOverConn(uTlsConn, uTlsConn.HandshakeState.ServerHello.AlpnProtocol)
|
||||
return httpGetOverConn(uTlsConn, uTlsConn.ConnectionState().NegotiatedProtocol)
|
||||
}
|
||||
|
||||
func HttpGetCustom(hostname string, addr string) (*http.Response, error) {
|
||||
|
@ -253,7 +253,7 @@ func HttpGetCustom(hostname string, addr string) (*http.Response, error) {
|
|||
return nil, fmt.Errorf("uTlsConn.Handshake() error: %+v", err)
|
||||
}
|
||||
|
||||
return httpGetOverConn(uTlsConn, uTlsConn.HandshakeState.ServerHello.AlpnProtocol)
|
||||
return httpGetOverConn(uTlsConn, uTlsConn.ConnectionState().NegotiatedProtocol)
|
||||
}
|
||||
|
||||
var roller *tls.Roller
|
||||
|
@ -277,7 +277,7 @@ func HttpGetGoogleWithRoller() (*http.Response, error) {
|
|||
return nil, err
|
||||
}
|
||||
|
||||
return httpGetOverConn(c, c.HandshakeState.ServerHello.AlpnProtocol)
|
||||
return httpGetOverConn(c, c.ConnectionState().NegotiatedProtocol)
|
||||
}
|
||||
|
||||
func forgeConn() {
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue