mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-04 12:37:35 +03:00
new: GREASE ECH parrots
This commit is contained in:
parent
d154e244ac
commit
e8896dc404
2 changed files with 211 additions and 0 deletions
|
@ -595,6 +595,7 @@ var (
|
||||||
HelloFirefox_99 = ClientHelloID{helloFirefox, "99", nil, nil}
|
HelloFirefox_99 = ClientHelloID{helloFirefox, "99", nil, nil}
|
||||||
HelloFirefox_102 = ClientHelloID{helloFirefox, "102", nil, nil}
|
HelloFirefox_102 = ClientHelloID{helloFirefox, "102", nil, nil}
|
||||||
HelloFirefox_105 = ClientHelloID{helloFirefox, "105", nil, nil}
|
HelloFirefox_105 = ClientHelloID{helloFirefox, "105", nil, nil}
|
||||||
|
HelloFirefox_120 = ClientHelloID{helloFirefox, "120", nil, nil}
|
||||||
|
|
||||||
HelloChrome_Auto = HelloChrome_106_Shuffle
|
HelloChrome_Auto = HelloChrome_106_Shuffle
|
||||||
HelloChrome_58 = ClientHelloID{helloChrome, "58", nil, nil}
|
HelloChrome_58 = ClientHelloID{helloChrome, "58", nil, nil}
|
||||||
|
@ -620,6 +621,9 @@ var (
|
||||||
HelloChrome_115_PQ = ClientHelloID{helloChrome, "115_PQ", nil, nil}
|
HelloChrome_115_PQ = ClientHelloID{helloChrome, "115_PQ", nil, nil}
|
||||||
HelloChrome_115_PQ_PSK = ClientHelloID{helloChrome, "115_PQ_PSK", nil, nil}
|
HelloChrome_115_PQ_PSK = ClientHelloID{helloChrome, "115_PQ_PSK", nil, nil}
|
||||||
|
|
||||||
|
// Chrome w/ Post-Quantum Key Agreement and Encrypted ClientHello
|
||||||
|
HelloChrome_120 = ClientHelloID{helloChrome, "120", nil, nil}
|
||||||
|
|
||||||
HelloIOS_Auto = HelloIOS_14
|
HelloIOS_Auto = HelloIOS_14
|
||||||
HelloIOS_11_1 = ClientHelloID{helloIOS, "111", nil, nil} // legacy "111" means 11.1
|
HelloIOS_11_1 = ClientHelloID{helloIOS, "111", nil, nil} // legacy "111" means 11.1
|
||||||
HelloIOS_12_1 = ClientHelloID{helloIOS, "12.1", nil, nil}
|
HelloIOS_12_1 = ClientHelloID{helloIOS, "12.1", nil, nil}
|
||||||
|
|
207
u_parrots.go
207
u_parrots.go
|
@ -14,6 +14,8 @@ import (
|
||||||
"math/rand"
|
"math/rand"
|
||||||
"sort"
|
"sort"
|
||||||
"strconv"
|
"strconv"
|
||||||
|
|
||||||
|
"github.com/refraction-networking/utls/dicttls"
|
||||||
)
|
)
|
||||||
|
|
||||||
var ErrUnknownClientHelloID = errors.New("tls: unknown ClientHelloID")
|
var ErrUnknownClientHelloID = errors.New("tls: unknown ClientHelloID")
|
||||||
|
@ -656,6 +658,96 @@ func utlsIdToSpec(id ClientHelloID) (ClientHelloSpec, error) {
|
||||||
&UtlsPaddingExtension{GetPaddingLen: BoringPaddingStyle},
|
&UtlsPaddingExtension{GetPaddingLen: BoringPaddingStyle},
|
||||||
}),
|
}),
|
||||||
}, nil
|
}, nil
|
||||||
|
// Chrome w/ Post-Quantum Key Agreement and ECH
|
||||||
|
case HelloChrome_120:
|
||||||
|
return ClientHelloSpec{
|
||||||
|
CipherSuites: []uint16{
|
||||||
|
GREASE_PLACEHOLDER,
|
||||||
|
TLS_AES_128_GCM_SHA256,
|
||||||
|
TLS_AES_256_GCM_SHA384,
|
||||||
|
TLS_CHACHA20_POLY1305_SHA256,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
|
||||||
|
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
|
||||||
|
TLS_RSA_WITH_AES_128_GCM_SHA256,
|
||||||
|
TLS_RSA_WITH_AES_256_GCM_SHA384,
|
||||||
|
TLS_RSA_WITH_AES_128_CBC_SHA,
|
||||||
|
TLS_RSA_WITH_AES_256_CBC_SHA,
|
||||||
|
},
|
||||||
|
CompressionMethods: []byte{
|
||||||
|
0x00, // compressionNone
|
||||||
|
},
|
||||||
|
Extensions: ShuffleChromeTLSExtensions([]TLSExtension{
|
||||||
|
&UtlsGREASEExtension{},
|
||||||
|
&SNIExtension{},
|
||||||
|
&ExtendedMasterSecretExtension{},
|
||||||
|
&RenegotiationInfoExtension{Renegotiation: RenegotiateOnceAsClient},
|
||||||
|
&SupportedCurvesExtension{[]CurveID{
|
||||||
|
GREASE_PLACEHOLDER,
|
||||||
|
X25519Kyber768Draft00,
|
||||||
|
X25519,
|
||||||
|
CurveP256,
|
||||||
|
CurveP384,
|
||||||
|
}},
|
||||||
|
&SupportedPointsExtension{SupportedPoints: []byte{
|
||||||
|
0x00, // pointFormatUncompressed
|
||||||
|
}},
|
||||||
|
&SessionTicketExtension{},
|
||||||
|
&ALPNExtension{AlpnProtocols: []string{"h2", "http/1.1"}},
|
||||||
|
&StatusRequestExtension{},
|
||||||
|
&SignatureAlgorithmsExtension{SupportedSignatureAlgorithms: []SignatureScheme{
|
||||||
|
ECDSAWithP256AndSHA256,
|
||||||
|
PSSWithSHA256,
|
||||||
|
PKCS1WithSHA256,
|
||||||
|
ECDSAWithP384AndSHA384,
|
||||||
|
PSSWithSHA384,
|
||||||
|
PKCS1WithSHA384,
|
||||||
|
PSSWithSHA512,
|
||||||
|
PKCS1WithSHA512,
|
||||||
|
}},
|
||||||
|
&SCTExtension{},
|
||||||
|
&KeyShareExtension{[]KeyShare{
|
||||||
|
{Group: CurveID(GREASE_PLACEHOLDER), Data: []byte{0}},
|
||||||
|
{Group: X25519Kyber768Draft00},
|
||||||
|
{Group: X25519},
|
||||||
|
}},
|
||||||
|
&PSKKeyExchangeModesExtension{[]uint8{
|
||||||
|
PskModeDHE,
|
||||||
|
}},
|
||||||
|
&SupportedVersionsExtension{[]uint16{
|
||||||
|
GREASE_PLACEHOLDER,
|
||||||
|
VersionTLS13,
|
||||||
|
VersionTLS12,
|
||||||
|
}},
|
||||||
|
&UtlsCompressCertExtension{[]CertCompressionAlgo{
|
||||||
|
CertCompressionBrotli,
|
||||||
|
}},
|
||||||
|
&ApplicationSettingsExtension{SupportedProtocols: []string{"h2"}},
|
||||||
|
&GREASEEncryptedClientHelloExtension{
|
||||||
|
CandidateCipherSuites: []HPKESymmetricCipherSuite{
|
||||||
|
{
|
||||||
|
KdfId: dicttls.HKDF_SHA256,
|
||||||
|
AeadId: dicttls.AEAD_AES_128_GCM,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
KdfId: dicttls.HKDF_SHA256,
|
||||||
|
AeadId: dicttls.AEAD_AES_256_GCM,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
KdfId: dicttls.HKDF_SHA256,
|
||||||
|
AeadId: dicttls.AEAD_CHACHA20_POLY1305,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
CandidatePayloadLens: []uint16{128, 160},
|
||||||
|
},
|
||||||
|
&UtlsGREASEExtension{},
|
||||||
|
}),
|
||||||
|
}, nil
|
||||||
case HelloFirefox_55, HelloFirefox_56:
|
case HelloFirefox_55, HelloFirefox_56:
|
||||||
return ClientHelloSpec{
|
return ClientHelloSpec{
|
||||||
TLSVersMax: VersionTLS12,
|
TLSVersMax: VersionTLS12,
|
||||||
|
@ -1043,6 +1135,121 @@ func utlsIdToSpec(id ClientHelloID) (ClientHelloSpec, error) {
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
}, nil
|
}, nil
|
||||||
|
case HelloFirefox_120:
|
||||||
|
return ClientHelloSpec{
|
||||||
|
TLSVersMin: VersionTLS12,
|
||||||
|
TLSVersMax: VersionTLS13,
|
||||||
|
CipherSuites: []uint16{
|
||||||
|
TLS_AES_128_GCM_SHA256,
|
||||||
|
TLS_CHACHA20_POLY1305_SHA256,
|
||||||
|
TLS_AES_256_GCM_SHA384,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
|
||||||
|
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
|
||||||
|
TLS_RSA_WITH_AES_128_GCM_SHA256,
|
||||||
|
TLS_RSA_WITH_AES_256_GCM_SHA384,
|
||||||
|
TLS_RSA_WITH_AES_128_CBC_SHA,
|
||||||
|
TLS_RSA_WITH_AES_256_CBC_SHA,
|
||||||
|
},
|
||||||
|
CompressionMethods: []uint8{
|
||||||
|
0x0, // no compression
|
||||||
|
},
|
||||||
|
Extensions: []TLSExtension{
|
||||||
|
&SNIExtension{},
|
||||||
|
&ExtendedMasterSecretExtension{},
|
||||||
|
&RenegotiationInfoExtension{
|
||||||
|
Renegotiation: RenegotiateOnceAsClient,
|
||||||
|
},
|
||||||
|
&SupportedCurvesExtension{
|
||||||
|
Curves: []CurveID{
|
||||||
|
X25519,
|
||||||
|
CurveP256,
|
||||||
|
CurveP384,
|
||||||
|
CurveP521,
|
||||||
|
256,
|
||||||
|
257,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
&SupportedPointsExtension{
|
||||||
|
SupportedPoints: []uint8{
|
||||||
|
0x0, // uncompressed
|
||||||
|
},
|
||||||
|
},
|
||||||
|
&ALPNExtension{
|
||||||
|
AlpnProtocols: []string{
|
||||||
|
"h2",
|
||||||
|
"http/1.1",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
&StatusRequestExtension{},
|
||||||
|
&FakeDelegatedCredentialsExtension{
|
||||||
|
SupportedSignatureAlgorithms: []SignatureScheme{
|
||||||
|
ECDSAWithP256AndSHA256,
|
||||||
|
ECDSAWithP384AndSHA384,
|
||||||
|
ECDSAWithP521AndSHA512,
|
||||||
|
ECDSAWithSHA1,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
&KeyShareExtension{
|
||||||
|
KeyShares: []KeyShare{
|
||||||
|
{
|
||||||
|
Group: X25519,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Group: CurveP256,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
&SupportedVersionsExtension{
|
||||||
|
Versions: []uint16{
|
||||||
|
VersionTLS13,
|
||||||
|
VersionTLS12,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
&SignatureAlgorithmsExtension{
|
||||||
|
SupportedSignatureAlgorithms: []SignatureScheme{
|
||||||
|
ECDSAWithP256AndSHA256,
|
||||||
|
ECDSAWithP384AndSHA384,
|
||||||
|
ECDSAWithP521AndSHA512,
|
||||||
|
PSSWithSHA256,
|
||||||
|
PSSWithSHA384,
|
||||||
|
PSSWithSHA512,
|
||||||
|
PKCS1WithSHA256,
|
||||||
|
PKCS1WithSHA384,
|
||||||
|
PKCS1WithSHA512,
|
||||||
|
ECDSAWithSHA1,
|
||||||
|
PKCS1WithSHA1,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
&FakeRecordSizeLimitExtension{
|
||||||
|
Limit: 0x4001,
|
||||||
|
},
|
||||||
|
&GREASEEncryptedClientHelloExtension{
|
||||||
|
CandidateCipherSuites: []HPKESymmetricCipherSuite{
|
||||||
|
{
|
||||||
|
KdfId: dicttls.HKDF_SHA256,
|
||||||
|
AeadId: dicttls.AEAD_AES_128_GCM,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
KdfId: dicttls.HKDF_SHA256,
|
||||||
|
AeadId: dicttls.AEAD_AES_256_GCM,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
KdfId: dicttls.HKDF_SHA256,
|
||||||
|
AeadId: dicttls.AEAD_CHACHA20_POLY1305,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
CandidatePayloadLens: []uint16{223}, // 144, 239
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}, nil
|
||||||
case HelloIOS_11_1:
|
case HelloIOS_11_1:
|
||||||
return ClientHelloSpec{
|
return ClientHelloSpec{
|
||||||
TLSVersMax: VersionTLS12,
|
TLSVersMax: VersionTLS12,
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue