mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-04 20:47:36 +03:00
fix: remove keepPSK and minor
- Removed all presence of keepPSK flag. - Added check before using the field of a map.
This commit is contained in:
parent
06e15fba90
commit
b7e167fa5e
3 changed files with 65 additions and 21 deletions
76
u_common.go
76
u_common.go
|
@ -7,6 +7,7 @@ package tls
|
||||||
import (
|
import (
|
||||||
"crypto/hmac"
|
"crypto/hmac"
|
||||||
"crypto/sha512"
|
"crypto/sha512"
|
||||||
|
"encoding/json"
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"hash"
|
"hash"
|
||||||
|
@ -189,7 +190,9 @@ func (chs *ClientHelloSpec) ReadCompressionMethods(compressionMethods []byte) er
|
||||||
|
|
||||||
// ReadTLSExtensions is a helper function to construct a list of TLS extensions from
|
// ReadTLSExtensions is a helper function to construct a list of TLS extensions from
|
||||||
// a byte slice into []TLSExtension.
|
// a byte slice into []TLSExtension.
|
||||||
func (chs *ClientHelloSpec) ReadTLSExtensions(b []byte, keepPSK, allowBluntMimicry bool) error {
|
//
|
||||||
|
// If keepPSK is not set, the PSK extension will cause an error.
|
||||||
|
func (chs *ClientHelloSpec) ReadTLSExtensions(b []byte, allowBluntMimicry bool) error {
|
||||||
extensions := cryptobyte.String(b)
|
extensions := cryptobyte.String(b)
|
||||||
for !extensions.Empty() {
|
for !extensions.Empty() {
|
||||||
var extension uint16
|
var extension uint16
|
||||||
|
@ -201,11 +204,6 @@ func (chs *ClientHelloSpec) ReadTLSExtensions(b []byte, keepPSK, allowBluntMimic
|
||||||
return fmt.Errorf("unable to read data for extension %x", extension)
|
return fmt.Errorf("unable to read data for extension %x", extension)
|
||||||
}
|
}
|
||||||
|
|
||||||
if extension == extensionPreSharedKey && !keepPSK {
|
|
||||||
return fmt.Errorf("PSK extension is not allowed unless keepPSK is set")
|
|
||||||
// continue // skip PSK, this will result in fingerprint change!!!!
|
|
||||||
}
|
|
||||||
|
|
||||||
extWriter := ExtensionIDToExtension(extension)
|
extWriter := ExtensionIDToExtension(extension)
|
||||||
if extWriter != nil {
|
if extWriter != nil {
|
||||||
if extension == extensionSupportedVersions {
|
if extension == extensionSupportedVersions {
|
||||||
|
@ -263,16 +261,26 @@ func (chs *ClientHelloSpec) AlwaysAddPadding() {
|
||||||
//
|
//
|
||||||
// TLSVersMin/TLSVersMax are set to 0 if supported_versions is present.
|
// TLSVersMin/TLSVersMax are set to 0 if supported_versions is present.
|
||||||
// To prevent conflict, they should be set manually if needed BEFORE calling this function.
|
// To prevent conflict, they should be set manually if needed BEFORE calling this function.
|
||||||
func (chs *ClientHelloSpec) ImportTLSClientHello(data map[string][]byte, keepPSK bool) error {
|
func (chs *ClientHelloSpec) ImportTLSClientHello(data map[string][]byte) error {
|
||||||
var tlsExtensionTypes []uint16
|
var tlsExtensionTypes []uint16
|
||||||
var err error
|
var err error
|
||||||
|
|
||||||
|
if data["cipher_suites"] == nil {
|
||||||
|
return errors.New("cipher_suites is required")
|
||||||
|
}
|
||||||
chs.CipherSuites, err = helper.Uint8to16(data["cipher_suites"])
|
chs.CipherSuites, err = helper.Uint8to16(data["cipher_suites"])
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if data["compression_methods"] == nil {
|
||||||
|
return errors.New("compression_methods is required")
|
||||||
|
}
|
||||||
chs.CompressionMethods = data["compression_methods"]
|
chs.CompressionMethods = data["compression_methods"]
|
||||||
|
|
||||||
|
if data["extensions"] == nil {
|
||||||
|
return errors.New("extensions is required")
|
||||||
|
}
|
||||||
tlsExtensionTypes, err = helper.Uint8to16(data["extensions"])
|
tlsExtensionTypes, err = helper.Uint8to16(data["extensions"])
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
|
@ -284,22 +292,31 @@ func (chs *ClientHelloSpec) ImportTLSClientHello(data map[string][]byte, keepPSK
|
||||||
log.Printf("[Warning] Unsupported extension %d added as a &GenericExtension without Data", extType)
|
log.Printf("[Warning] Unsupported extension %d added as a &GenericExtension without Data", extType)
|
||||||
chs.Extensions = append(chs.Extensions, &GenericExtension{extType, []byte{}})
|
chs.Extensions = append(chs.Extensions, &GenericExtension{extType, []byte{}})
|
||||||
} else {
|
} else {
|
||||||
if extType == extensionSupportedVersions {
|
|
||||||
chs.TLSVersMin = 0
|
|
||||||
chs.TLSVersMax = 0
|
|
||||||
}
|
|
||||||
switch extType {
|
switch extType {
|
||||||
case extensionSupportedPoints:
|
case extensionSupportedPoints:
|
||||||
|
if data["pt_fmts"] == nil {
|
||||||
|
return errors.New("pt_fmts is required")
|
||||||
|
}
|
||||||
_, err = extension.Write(data["pt_fmts"])
|
_, err = extension.Write(data["pt_fmts"])
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
case extensionSignatureAlgorithms:
|
case extensionSignatureAlgorithms:
|
||||||
|
if data["sig_algs"] == nil {
|
||||||
|
return errors.New("sig_algs is required")
|
||||||
|
}
|
||||||
_, err = extension.Write(data["sig_algs"])
|
_, err = extension.Write(data["sig_algs"])
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
case extensionSupportedVersions:
|
case extensionSupportedVersions:
|
||||||
|
chs.TLSVersMin = 0
|
||||||
|
chs.TLSVersMax = 0
|
||||||
|
|
||||||
|
if data["supported_versions"] == nil {
|
||||||
|
return errors.New("supported_versions is required")
|
||||||
|
}
|
||||||
|
|
||||||
// need to add uint8 length prefix
|
// need to add uint8 length prefix
|
||||||
fixedData := make([]byte, len(data["supported_versions"])+1)
|
fixedData := make([]byte, len(data["supported_versions"])+1)
|
||||||
fixedData[0] = uint8(len(data["supported_versions"]) & 0xff)
|
fixedData[0] = uint8(len(data["supported_versions"]) & 0xff)
|
||||||
|
@ -309,16 +326,28 @@ func (chs *ClientHelloSpec) ImportTLSClientHello(data map[string][]byte, keepPSK
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
case extensionSupportedCurves:
|
case extensionSupportedCurves:
|
||||||
|
if data["curves"] == nil {
|
||||||
|
return errors.New("curves is required")
|
||||||
|
}
|
||||||
|
|
||||||
_, err = extension.Write(data["curves"])
|
_, err = extension.Write(data["curves"])
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
case extensionALPN:
|
case extensionALPN:
|
||||||
|
if data["alpn"] == nil {
|
||||||
|
return errors.New("alpn is required")
|
||||||
|
}
|
||||||
|
|
||||||
_, err = extension.Write(data["alpn"])
|
_, err = extension.Write(data["alpn"])
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
case extensionKeyShare:
|
case extensionKeyShare:
|
||||||
|
if data["key_share"] == nil {
|
||||||
|
return errors.New("key_share is required")
|
||||||
|
}
|
||||||
|
|
||||||
// need to add (zero) data per each key share, [10, 10, 0, 1] => [10, 10, 0, 1, 0]
|
// need to add (zero) data per each key share, [10, 10, 0, 1] => [10, 10, 0, 1, 0]
|
||||||
fixedData := make([]byte, 0)
|
fixedData := make([]byte, 0)
|
||||||
for i := 0; i < len(data["key_share"]); i += 4 {
|
for i := 0; i < len(data["key_share"]); i += 4 {
|
||||||
|
@ -335,6 +364,10 @@ func (chs *ClientHelloSpec) ImportTLSClientHello(data map[string][]byte, keepPSK
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
case extensionPSKModes:
|
case extensionPSKModes:
|
||||||
|
if data["psk_key_exchange_modes"] == nil {
|
||||||
|
return errors.New("psk_key_exchange_modes is required")
|
||||||
|
}
|
||||||
|
|
||||||
// need to add uint8 length prefix
|
// need to add uint8 length prefix
|
||||||
fixedData := make([]byte, len(data["psk_key_exchange_modes"])+1)
|
fixedData := make([]byte, len(data["psk_key_exchange_modes"])+1)
|
||||||
fixedData[0] = uint8(len(data["psk_key_exchange_modes"]) & 0xff)
|
fixedData[0] = uint8(len(data["psk_key_exchange_modes"]) & 0xff)
|
||||||
|
@ -344,6 +377,10 @@ func (chs *ClientHelloSpec) ImportTLSClientHello(data map[string][]byte, keepPSK
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
case utlsExtensionCompressCertificate:
|
case utlsExtensionCompressCertificate:
|
||||||
|
if data["cert_compression_algs"] == nil {
|
||||||
|
return errors.New("cert_compression_algs is required")
|
||||||
|
}
|
||||||
|
|
||||||
// need to add uint8 length prefix
|
// need to add uint8 length prefix
|
||||||
fixedData := make([]byte, len(data["cert_compression_algs"])+1)
|
fixedData := make([]byte, len(data["cert_compression_algs"])+1)
|
||||||
fixedData[0] = uint8(len(data["cert_compression_algs"]) & 0xff)
|
fixedData[0] = uint8(len(data["cert_compression_algs"]) & 0xff)
|
||||||
|
@ -353,13 +390,19 @@ func (chs *ClientHelloSpec) ImportTLSClientHello(data map[string][]byte, keepPSK
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
case fakeRecordSizeLimit:
|
case fakeRecordSizeLimit:
|
||||||
|
if data["record_size_limit"] == nil {
|
||||||
|
return errors.New("record_size_limit is required")
|
||||||
|
}
|
||||||
|
|
||||||
_, err = extension.Write(data["record_size_limit"]) // uint16 as []byte
|
_, err = extension.Write(data["record_size_limit"]) // uint16 as []byte
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
case utlsExtensionApplicationSettings:
|
case utlsExtensionApplicationSettings:
|
||||||
// TODO: tlsfingerprint.io should also provide application settings data
|
// TODO: tlsfingerprint.io should record/provide application settings data
|
||||||
extension.(*ApplicationSettingsExtension).SupportedProtocols = []string{"h2"}
|
extension.(*ApplicationSettingsExtension).SupportedProtocols = []string{"h2"}
|
||||||
|
case fakeExtensionPreSharedKey:
|
||||||
|
log.Printf("[Warning] PSK extension added without data")
|
||||||
default:
|
default:
|
||||||
if !isGREASEUint16(extType) {
|
if !isGREASEUint16(extType) {
|
||||||
log.Printf("[Warning] extension %d added without data", extType)
|
log.Printf("[Warning] extension %d added without data", extType)
|
||||||
|
@ -373,6 +416,15 @@ func (chs *ClientHelloSpec) ImportTLSClientHello(data map[string][]byte, keepPSK
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (chs *ClientHelloSpec) ImportTLSClientHelloFromJSON(jsonB []byte) error {
|
||||||
|
var data map[string][]byte
|
||||||
|
err := json.Unmarshal(jsonB, &data)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return chs.ImportTLSClientHello(data)
|
||||||
|
}
|
||||||
|
|
||||||
var (
|
var (
|
||||||
// HelloGolang will use default "crypto/tls" handshake marshaling codepath, which WILL
|
// HelloGolang will use default "crypto/tls" handshake marshaling codepath, which WILL
|
||||||
// overwrite your changes to Hello(Config, Session are fine).
|
// overwrite your changes to Hello(Config, Session are fine).
|
||||||
|
|
|
@ -12,8 +12,6 @@ import (
|
||||||
|
|
||||||
// Fingerprinter is a struct largely for holding options for the FingerprintClientHello func
|
// Fingerprinter is a struct largely for holding options for the FingerprintClientHello func
|
||||||
type Fingerprinter struct {
|
type Fingerprinter struct {
|
||||||
// KeepPSK will ensure that the PreSharedKey extension is passed along into the resulting ClientHelloSpec as-is
|
|
||||||
KeepPSK bool
|
|
||||||
// AllowBluntMimicry will ensure that unknown extensions are
|
// AllowBluntMimicry will ensure that unknown extensions are
|
||||||
// passed along into the resulting ClientHelloSpec as-is
|
// passed along into the resulting ClientHelloSpec as-is
|
||||||
// It will not ensure that the PSK is passed along, if you require that, use KeepPSK
|
// It will not ensure that the PSK is passed along, if you require that, use KeepPSK
|
||||||
|
@ -103,7 +101,7 @@ func (f *Fingerprinter) FingerprintClientHello(data []byte) (clientHelloSpec *Cl
|
||||||
return nil, errors.New("unable to read extensions data")
|
return nil, errors.New("unable to read extensions data")
|
||||||
}
|
}
|
||||||
|
|
||||||
err = clientHelloSpec.ReadTLSExtensions(extensions, f.KeepPSK, f.AllowBluntMimicry)
|
err = clientHelloSpec.ReadTLSExtensions(extensions, f.AllowBluntMimicry)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
|
@ -501,12 +501,6 @@ func TestUTLSFingerprintClientHelloKeepPSK(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
f := &Fingerprinter{}
|
f := &Fingerprinter{}
|
||||||
_, err = f.FingerprintClientHello(helloBytes)
|
|
||||||
if err == nil {
|
|
||||||
t.Errorf("expected error generating spec from client hello with PSK")
|
|
||||||
}
|
|
||||||
|
|
||||||
f = &Fingerprinter{KeepPSK: true}
|
|
||||||
generatedSpec, err := f.FingerprintClientHello(helloBytes)
|
generatedSpec, err := f.FingerprintClientHello(helloBytes)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Errorf("got error: %v; expected to succeed", err)
|
t.Errorf("got error: %v; expected to succeed", err)
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue