mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-03 20:17:36 +03:00
uTLS: initial commit
This commit is contained in:
parent
e8bc3d6d4f
commit
cd3d1c4656
31 changed files with 4004 additions and 4 deletions
121
u_common.go
Normal file
121
u_common.go
Normal file
|
@ -0,0 +1,121 @@
|
|||
package tls
|
||||
|
||||
import "fmt"
|
||||
|
||||
// Naming convention:
|
||||
// Unsupported things are prefixed with "Fake"
|
||||
// Supported things, that have changed their ID are prefixed with "Old"
|
||||
// Supported but disabled things are prefixed with "Disabled". We will _enable_ them.
|
||||
const (
|
||||
// padding isn't quite a 'fake' extension, as uTLS provides full implementation
|
||||
// just denotes that crypto/tls doesn't provide it
|
||||
fakeExtensionPadding uint16 = 21
|
||||
|
||||
// extensions below break connection, if server echoes them back
|
||||
fakeExtensionExtendedMasterSecret uint16 = 23
|
||||
fakeExtensionChannelID uint16 = 30032 // not IANA assigned
|
||||
)
|
||||
|
||||
const (
|
||||
OLD_TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 = uint16(0xcc13)
|
||||
OLD_TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 = uint16(0xcc14)
|
||||
|
||||
FAKE_OLD_TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 = uint16(0xcc15) // we can try to craft these ciphersuites
|
||||
FAKE_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 = uint16(0x009e) // from existing pieces, if needed
|
||||
|
||||
FAKE_TLS_DHE_RSA_WITH_AES_128_CBC_SHA = uint16(0x0033)
|
||||
FAKE_TLS_DHE_RSA_WITH_AES_256_CBC_SHA = uint16(0x0039)
|
||||
FAKE_TLS_RSA_WITH_RC4_128_MD5 = uint16(0x0004)
|
||||
FAKE_TLS_EMPTY_RENEGOTIATION_INFO_SCSV = uint16(0x00ff)
|
||||
)
|
||||
|
||||
// newest signatures
|
||||
var (
|
||||
fakeRsaPssSha256 = SignatureAndHash{0x08, 0x04} // also declared in common.go as type SignatureScheme,
|
||||
fakeRsaPssSha384 = SignatureAndHash{0x08, 0x05} // but not used by default and not implemented
|
||||
fakeRsaPssSha512 = SignatureAndHash{0x08, 0x06}
|
||||
// fakeEd25519 = SignatureAndHash{0x08, 0x07}
|
||||
// fakeEd448 = SignatureAndHash{0x08, 0x08}
|
||||
)
|
||||
|
||||
// IDs of hash functions in signatures
|
||||
const (
|
||||
disabledHashSHA512 uint8 = 6 // Supported, but disabled by default. Will be enabled, as needed
|
||||
fakeHashSHA224 uint8 = 3 // Supported, but we won't enable it: sounds esoteric and fishy
|
||||
|
||||
)
|
||||
|
||||
type ClientHelloID struct {
|
||||
Browser string
|
||||
Version uint16
|
||||
// TODO: consider adding OS?
|
||||
}
|
||||
|
||||
func (p *ClientHelloID) Str() string {
|
||||
return fmt.Sprintf("%s-%d", p.Browser, p.Version)
|
||||
}
|
||||
|
||||
const (
|
||||
helloGolang = "Golang"
|
||||
helloRandomized = "Randomized"
|
||||
helloCustom = "Custom"
|
||||
helloFirefox = "Firefox"
|
||||
helloChrome = "Chrome"
|
||||
helloAndroid = "Android"
|
||||
)
|
||||
|
||||
const (
|
||||
helloAutoVers = iota
|
||||
helloRandomizedALPN
|
||||
helloRandomizedNoALPN
|
||||
)
|
||||
|
||||
var (
|
||||
// HelloGolang will use default "crypto/tls" handshake marshaling codepath, which WILL
|
||||
// overwrite your changes to Hello(Config, Session are fine).
|
||||
// You might want to call BuildHandshakeState() before applying any changes.
|
||||
// UConn.Extensions will be completely ignored.
|
||||
HelloGolang ClientHelloID = ClientHelloID{helloGolang, helloAutoVers}
|
||||
|
||||
// HelloCustom will prepare ClientHello with empty uconn.Extensions so you can fill it with TLSExtension's manually
|
||||
HelloCustom ClientHelloID = ClientHelloID{helloCustom, helloAutoVers}
|
||||
|
||||
// HelloRandomized* randomly adds/reorders extensions, ciphersuites, etc.
|
||||
HelloRandomized ClientHelloID = ClientHelloID{helloRandomized, helloAutoVers}
|
||||
HelloRandomizedALPN ClientHelloID = ClientHelloID{helloRandomized, helloRandomizedALPN}
|
||||
HelloRandomizedNoALPN ClientHelloID = ClientHelloID{helloRandomized, helloRandomizedNoALPN}
|
||||
|
||||
// The rest will will parrot given browser.
|
||||
HelloFirefox_Auto ClientHelloID = ClientHelloID{helloFirefox, helloAutoVers}
|
||||
HelloFirefox_53_WIP = ClientHelloID{helloFirefox, 53}
|
||||
|
||||
HelloChrome_Auto ClientHelloID = ClientHelloID{helloChrome, helloAutoVers}
|
||||
HelloChrome_58 ClientHelloID = ClientHelloID{helloChrome, 58}
|
||||
|
||||
HelloAndroid_Auto ClientHelloID = ClientHelloID{helloAndroid, helloAutoVers}
|
||||
HelloAndroid_6_0_Browser ClientHelloID = ClientHelloID{helloAndroid, 23}
|
||||
HelloAndroid_5_1_Browser ClientHelloID = ClientHelloID{helloAndroid, 22}
|
||||
)
|
||||
|
||||
// Appends newCipher to cipherSuites, if not there already
|
||||
// Used to add old cipher ids
|
||||
func appendToGlobalCipherSuites(newCipher *cipherSuite) {
|
||||
for _, c := range cipherSuites {
|
||||
if c.id == newCipher.id {
|
||||
return
|
||||
}
|
||||
}
|
||||
cipherSuites = append(cipherSuites, newCipher)
|
||||
}
|
||||
|
||||
// Appends {hash, sig} to supportedSignatureAlgorithms, if not there already
|
||||
// Used to enable already supported but disabled signatures
|
||||
func appendToGlobalSigAlgs(hash uint8, sig uint8) {
|
||||
s := signatureAndHash{hash, sig}
|
||||
for _, c := range supportedSignatureAlgorithms {
|
||||
if c.hash == s.hash && c.signature == s.signature {
|
||||
return
|
||||
}
|
||||
}
|
||||
supportedSignatureAlgorithms = append(supportedSignatureAlgorithms, s)
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue