mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-05 13:07:36 +03:00
fix: don't shuf psk (#180)
- Shuffle Function will no longer shuffle PSK. - Shuffle Function optimized. - Fixed a bug in `FakePresharedKeyExtension` causing program to panic. - Added `HelloChrome_100_PSK` and `HelloChrome_112_PSK_Shuf`. Both are beta fingerprints, use at your own risk.
This commit is contained in:
parent
8dc35bef36
commit
c785bd3a1e
3 changed files with 123 additions and 45 deletions
|
@ -570,6 +570,10 @@ var (
|
||||||
HelloChrome_102 = ClientHelloID{helloChrome, "102", nil, nil}
|
HelloChrome_102 = ClientHelloID{helloChrome, "102", nil, nil}
|
||||||
HelloChrome_106_Shuffle = ClientHelloID{helloChrome, "106", nil, nil} // beta: shuffler enabled starting from 106
|
HelloChrome_106_Shuffle = ClientHelloID{helloChrome, "106", nil, nil} // beta: shuffler enabled starting from 106
|
||||||
|
|
||||||
|
// Chrome with PSK: Chrome start sending this ClientHello after doing TLS 1.3 handshake with the same server.
|
||||||
|
HelloChrome_100_PSK = ClientHelloID{helloChrome, "100_PSK", nil, nil} // beta: PSK extension added. uTLS doesn't fully support PSK. Use at your own risk.
|
||||||
|
HelloChrome_112_PSK_Shuf = ClientHelloID{helloChrome, "112_PSK", nil, nil} // beta: PSK extension added. uTLS doesn't fully support PSK. Use at your own risk.
|
||||||
|
|
||||||
HelloIOS_Auto = HelloIOS_14
|
HelloIOS_Auto = HelloIOS_14
|
||||||
HelloIOS_11_1 = ClientHelloID{helloIOS, "111", nil, nil} // legacy "111" means 11.1
|
HelloIOS_11_1 = ClientHelloID{helloIOS, "111", nil, nil} // legacy "111" means 11.1
|
||||||
HelloIOS_12_1 = ClientHelloID{helloIOS, "12.1", nil, nil}
|
HelloIOS_12_1 = ClientHelloID{helloIOS, "12.1", nil, nil}
|
||||||
|
|
161
u_parrots.go
161
u_parrots.go
|
@ -508,6 +508,77 @@ func utlsIdToSpec(id ClientHelloID) (ClientHelloSpec, error) {
|
||||||
&UtlsPaddingExtension{GetPaddingLen: BoringPaddingStyle},
|
&UtlsPaddingExtension{GetPaddingLen: BoringPaddingStyle},
|
||||||
},
|
},
|
||||||
}, nil
|
}, nil
|
||||||
|
case HelloChrome_100_PSK:
|
||||||
|
return ClientHelloSpec{
|
||||||
|
CipherSuites: []uint16{
|
||||||
|
GREASE_PLACEHOLDER,
|
||||||
|
TLS_AES_128_GCM_SHA256,
|
||||||
|
TLS_AES_256_GCM_SHA384,
|
||||||
|
TLS_CHACHA20_POLY1305_SHA256,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
|
||||||
|
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
|
||||||
|
TLS_RSA_WITH_AES_128_GCM_SHA256,
|
||||||
|
TLS_RSA_WITH_AES_256_GCM_SHA384,
|
||||||
|
TLS_RSA_WITH_AES_128_CBC_SHA,
|
||||||
|
TLS_RSA_WITH_AES_256_CBC_SHA,
|
||||||
|
},
|
||||||
|
CompressionMethods: []byte{
|
||||||
|
0x00, // compressionNone
|
||||||
|
},
|
||||||
|
Extensions: []TLSExtension{
|
||||||
|
&UtlsGREASEExtension{},
|
||||||
|
&SNIExtension{},
|
||||||
|
&UtlsExtendedMasterSecretExtension{},
|
||||||
|
&RenegotiationInfoExtension{Renegotiation: RenegotiateOnceAsClient},
|
||||||
|
&SupportedCurvesExtension{[]CurveID{
|
||||||
|
GREASE_PLACEHOLDER,
|
||||||
|
X25519,
|
||||||
|
CurveP256,
|
||||||
|
CurveP384,
|
||||||
|
}},
|
||||||
|
&SupportedPointsExtension{SupportedPoints: []byte{
|
||||||
|
0x00, // pointFormatUncompressed
|
||||||
|
}},
|
||||||
|
&SessionTicketExtension{},
|
||||||
|
&ALPNExtension{AlpnProtocols: []string{"h2", "http/1.1"}},
|
||||||
|
&StatusRequestExtension{},
|
||||||
|
&SignatureAlgorithmsExtension{SupportedSignatureAlgorithms: []SignatureScheme{
|
||||||
|
ECDSAWithP256AndSHA256,
|
||||||
|
PSSWithSHA256,
|
||||||
|
PKCS1WithSHA256,
|
||||||
|
ECDSAWithP384AndSHA384,
|
||||||
|
PSSWithSHA384,
|
||||||
|
PKCS1WithSHA384,
|
||||||
|
PSSWithSHA512,
|
||||||
|
PKCS1WithSHA512,
|
||||||
|
}},
|
||||||
|
&SCTExtension{},
|
||||||
|
&KeyShareExtension{[]KeyShare{
|
||||||
|
{Group: CurveID(GREASE_PLACEHOLDER), Data: []byte{0}},
|
||||||
|
{Group: X25519},
|
||||||
|
}},
|
||||||
|
&PSKKeyExchangeModesExtension{[]uint8{
|
||||||
|
PskModeDHE,
|
||||||
|
}},
|
||||||
|
&SupportedVersionsExtension{[]uint16{
|
||||||
|
GREASE_PLACEHOLDER,
|
||||||
|
VersionTLS13,
|
||||||
|
VersionTLS12,
|
||||||
|
}},
|
||||||
|
&UtlsCompressCertExtension{[]CertCompressionAlgo{
|
||||||
|
CertCompressionBrotli,
|
||||||
|
}},
|
||||||
|
&ApplicationSettingsExtension{SupportedProtocols: []string{"h2"}},
|
||||||
|
&UtlsGREASEExtension{},
|
||||||
|
&FakePreSharedKeyExtension{},
|
||||||
|
},
|
||||||
|
}, nil
|
||||||
case HelloChrome_106_Shuffle:
|
case HelloChrome_106_Shuffle:
|
||||||
chs, err := utlsIdToSpec(HelloChrome_102)
|
chs, err := utlsIdToSpec(HelloChrome_102)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -515,7 +586,17 @@ func utlsIdToSpec(id ClientHelloID) (ClientHelloSpec, error) {
|
||||||
}
|
}
|
||||||
|
|
||||||
// Chrome 107 started shuffling the order of extensions
|
// Chrome 107 started shuffling the order of extensions
|
||||||
return shuffleExtensions(chs)
|
shuffleExtensions(&chs)
|
||||||
|
return chs, err
|
||||||
|
case HelloChrome_112_PSK_Shuf:
|
||||||
|
chs, err := utlsIdToSpec(HelloChrome_100_PSK)
|
||||||
|
if err != nil {
|
||||||
|
return chs, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Chrome 112 started shuffling the order of extensions
|
||||||
|
shuffleExtensions(&chs)
|
||||||
|
return chs, err
|
||||||
case HelloFirefox_55, HelloFirefox_56:
|
case HelloFirefox_55, HelloFirefox_56:
|
||||||
return ClientHelloSpec{
|
return ClientHelloSpec{
|
||||||
TLSVersMax: VersionTLS12,
|
TLSVersMax: VersionTLS12,
|
||||||
|
@ -1853,59 +1934,49 @@ func utlsIdToSpec(id ClientHelloID) (ClientHelloSpec, error) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func shuffleExtensions(chs ClientHelloSpec) (ClientHelloSpec, error) {
|
func shuffleExtensions(chs *ClientHelloSpec) error {
|
||||||
// Shuffle extensions to avoid fingerprinting -- introduced in Chrome 106
|
// Shuffle extensions to avoid fingerprinting -- introduced in Chrome 106
|
||||||
// GREASE, padding will remain in place (if present)
|
var err error = nil
|
||||||
|
|
||||||
// Find indexes of GREASE and padding extensions
|
// unshufCheck checks:
|
||||||
var greaseIdx []int
|
// - if the exts[idx] is a GREASE extension, then it should not be shuffled
|
||||||
var paddingIdx []int
|
// - if the exts[idx] is a padding/pre_shared_key extension, then it should be the
|
||||||
var otherExtensions []TLSExtension
|
// last extension in the list and should not be shuffled
|
||||||
|
var unshufCheck = func(idx int, exts []TLSExtension) (donotshuf bool, userErr error) {
|
||||||
for i, ext := range chs.Extensions {
|
switch exts[idx].(type) {
|
||||||
switch ext.(type) {
|
|
||||||
case *UtlsGREASEExtension:
|
case *UtlsGREASEExtension:
|
||||||
greaseIdx = append(greaseIdx, i)
|
donotshuf = true
|
||||||
case *UtlsPaddingExtension:
|
case *UtlsPaddingExtension, *FakePreSharedKeyExtension:
|
||||||
paddingIdx = append(paddingIdx, i)
|
donotshuf = true
|
||||||
default:
|
if idx != len(chs.Extensions)-1 {
|
||||||
otherExtensions = append(otherExtensions, ext)
|
userErr = errors.New("UtlsPaddingExtension or FakePreSharedKeyExtension must be the last extension")
|
||||||
}
|
}
|
||||||
|
default:
|
||||||
|
donotshuf = false
|
||||||
|
}
|
||||||
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// Shuffle other extensions
|
// Shuffle other extensions
|
||||||
rand.Shuffle(len(otherExtensions), func(i, j int) {
|
rand.Shuffle(len(chs.Extensions), func(i, j int) {
|
||||||
otherExtensions[i], otherExtensions[j] = otherExtensions[j], otherExtensions[i]
|
if unshuf, shuferr := unshufCheck(i, chs.Extensions); unshuf {
|
||||||
|
if shuferr != nil {
|
||||||
|
err = shuferr
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if unshuf, shuferr := unshufCheck(j, chs.Extensions); unshuf {
|
||||||
|
if shuferr != nil {
|
||||||
|
err = shuferr
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
chs.Extensions[i], chs.Extensions[j] = chs.Extensions[j], chs.Extensions[i]
|
||||||
})
|
})
|
||||||
|
|
||||||
// Rebuild extensions slice
|
return err
|
||||||
otherExtIdx := 0
|
|
||||||
SHUF_EXTENSIONS:
|
|
||||||
for i := 0; i < len(chs.Extensions); i++ {
|
|
||||||
// if current index is in greaseIdx or paddingIdx, add GREASE or padding extension
|
|
||||||
for _, idx := range greaseIdx {
|
|
||||||
if i == idx {
|
|
||||||
chs.Extensions[i] = &UtlsGREASEExtension{}
|
|
||||||
continue SHUF_EXTENSIONS
|
|
||||||
}
|
|
||||||
}
|
|
||||||
for _, idx := range paddingIdx {
|
|
||||||
if i == idx {
|
|
||||||
chs.Extensions[i] = &UtlsPaddingExtension{
|
|
||||||
GetPaddingLen: BoringPaddingStyle,
|
|
||||||
}
|
|
||||||
break SHUF_EXTENSIONS
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// otherwise add other extension
|
|
||||||
chs.Extensions[i] = otherExtensions[otherExtIdx]
|
|
||||||
otherExtIdx++
|
|
||||||
}
|
|
||||||
if otherExtIdx != len(otherExtensions) {
|
|
||||||
return ClientHelloSpec{}, errors.New("shuffleExtensions: otherExtIdx != len(otherExtensions)")
|
|
||||||
}
|
|
||||||
return chs, nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (uconn *UConn) applyPresetByID(id ClientHelloID) (err error) {
|
func (uconn *UConn) applyPresetByID(id ClientHelloID) (err error) {
|
||||||
|
|
|
@ -1859,8 +1859,11 @@ type FakePreSharedKeyExtension struct {
|
||||||
}
|
}
|
||||||
|
|
||||||
func (e *FakePreSharedKeyExtension) writeToUConn(uc *UConn) error {
|
func (e *FakePreSharedKeyExtension) writeToUConn(uc *UConn) error {
|
||||||
|
if uc.config.ClientSessionCache == nil {
|
||||||
|
return nil // don't write the extension if there is no session cache
|
||||||
|
}
|
||||||
if session, ok := uc.config.ClientSessionCache.Get(clientSessionCacheKey(uc.conn.RemoteAddr(), uc.config)); !ok || session == nil {
|
if session, ok := uc.config.ClientSessionCache.Get(clientSessionCacheKey(uc.conn.RemoteAddr(), uc.config)); !ok || session == nil {
|
||||||
return nil // don't write the extension if there is no session
|
return nil // don't write the extension if there is no session cache available for this session
|
||||||
}
|
}
|
||||||
uc.HandshakeState.Hello.PskIdentities = e.PskIdentities
|
uc.HandshakeState.Hello.PskIdentities = e.PskIdentities
|
||||||
uc.HandshakeState.Hello.PskBinders = e.PskBinders
|
uc.HandshakeState.Hello.PskBinders = e.PskBinders
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue