Commit graph

374 commits

Author SHA1 Message Date
Rod Hynes
0b2885c8c0
Backport fix for CVE-2021-34558 (#80)
See: https://groups.google.com/g/golang-dev/c/5LJ2V7rd-Ag/m/YGLHVBZ6AAAJ
2021-07-13 10:56:36 -06:00
maxb
2179f28668
Implement FingerprintClientHello to generate ClientHelloSpec from ClientHello raw bytes (#67) 2020-12-09 22:37:06 -07:00
Mushroomician
f7e7360167
Add FAKE_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (#65) 2020-11-12 12:39:08 -07:00
maxb
5801f3fc5a
Expose DecryptTicketWith function (#61)
Expose DecryptTicketWith function
2020-11-12 12:38:19 -07:00
maxb
33a29038e7
Expose UnmarshalClientHello func (#62) 2020-08-19 21:01:03 -06:00
maxb
4ee6244579
Fix omitSNI test (#59) 2020-08-14 13:45:39 -06:00
Sergey Frolov
219d12d0a4
Fix riscv64 support 2020-08-05 19:45:56 -06:00
Sergey Frolov
186025ac7b
Add support for riscv64 (#55)
Fixes #49
2020-07-28 19:25:36 -06:00
maxb
dc2ae3bffe
Implement uconn.RemoveSNIExtension() (#51)
Authored by: https://github.com/max-b
Co-authored-by: Myles Horton <myles@getlantern.org>
Co-authored-by: Willie Forkner <1120829+forkner@users.noreply.github.com>
2020-07-28 19:25:16 -06:00
Sergey Frolov
02675388fe
Fix GREASE repeating values (#53)
Fixes #52
2020-07-28 09:42:20 -06:00
maxb
c9b914be28
Fix openssl command arguments for update tests (#50) 2020-07-23 14:27:49 -06:00
Sergey Frolov
ada0bb9b38
README: add Chrome 83 link 2020-06-01 14:02:09 -06:00
Sergey Frolov
641a3b15c7
Add Chrome 83 fingerprint (#46)
Add Chrome 83 fingerprint

Removed features vs Chrome 72:
 3DES cipher suite (https://tlsfingerprint.io/find/cipher/000a)
 sha1 signature algorithm (rsa_pkcs1_sha1 (0x0201))
2020-06-01 13:47:02 -06:00
sergeyfrolov
43c36d3c1f
Merge pull request #35 from refraction-networking/merge-upstream-on-reneg
Merge upstream
2019-09-09 14:06:33 -06:00
Sergey Frolov
96d6d41585 Merge branch 'master' into merge-upstream-on-reneg 2019-09-09 14:03:13 -06:00
Sergey Frolov
0bcfaf9aee Merge branch 'master' into merge-upstream-on-reneg 2019-09-09 13:59:35 -06:00
Rod Hynes
dbda71b12f Use SHAKE instead of chacha20 for PRNG stream (#37)
See: https://github.com/refraction-networking/utls/issues/36
2019-09-09 13:56:03 -06:00
sergeyfrolov
cc2996c818
Fix #33: renegotiation and export extension fields (#34)
Renegotiation:
 - Disallow specifying the body of Renegotiation extensions to
   avoid assumption that it will be verified.
 - Marshal the extension, if it is present in the uconn.Extensions list,
   even if Renegotiation is set to Never.

Exports all unexported uTLS extension fields.

Fixes #33
2019-08-23 21:23:29 -06:00
Sergey Frolov
9369e476d0 Fix tests after a merge 2019-08-22 17:56:13 -06:00
Sergey Frolov
ceee37ab69 Merge branch golang crypto/tls upstream 2019-08-22 17:42:47 -06:00
Sergey Frolov
1552a980ce Fix #33: renegotiation and export extension fields
Renegotiation:
 - Disallow specifying the body of Renegotiation extensions to
   avoid assumption that it will be verified.
 - Marshal the extension, if it is present in the uconn.Extensions list,
   even if Renegotiation is set to Never.

Exports all unexported uTLS extension fields.

Fixes #33
2019-08-22 16:44:11 -06:00
Sergey Frolov
020d12cffe Fix #33: renegotiation and export extension fields
Renegotiation:
 - Disallow specifying the body of Renegotiation extensions to
   avoid assumption that it will be verified.
 - Marshal the extension, if it is present in the uconn.Extensions list,
   even if Renegotiation is set to Never.

Exports all unexported uTLS extension fields.

Fixes #33
2019-08-22 16:33:47 -06:00
Rod Hynes
4da6795186 Fix all-zeroes SessionID (#31) 2019-08-12 15:06:06 -06:00
Daniel Martí
6c11745f0b all: remove a few unused parameters
I recently modified tabwriter to reduce the number of defers due to
flush calls. However, I forgot to notice that the new function
flushNoDefers can no longer return an error, due to the lack of the
defer.

In crypto/tls, hashForServerKeyExchange never returned a non-nil error,
so simplify the code.

Finally, in go/types and net we can find a few trivially unused
parameters, so remove them.

Change-Id: I54c8de83fbc944df432453b55c93008d7e810e61
Reviewed-on: https://go-review.googlesource.com/c/go/+/174131
Run-TryBot: Daniel Martí <mvdan@mvdan.cc>
TryBot-Result: Gobot Gobot <gobot@golang.org>
Reviewed-by: Benny Siegert <bsiegert@gmail.com>
2019-04-29 13:31:54 +00:00
David Benjamin
1f8aa21cce crypto/tls: fix a minor MAC vs padding leak
The CBC mode ciphers in TLS are a disaster. By ordering authentication
and encryption wrong, they are very subtly dependent on details and
implementation of the padding check, admitting attacks such as POODLE
and Lucky13.

crypto/tls does not promise full countermeasures for Lucky13 and still
contains some timing variations. This change fixes one of the easy ones:
by checking the MAC, then the padding, rather than all at once, there is
a very small timing variation between bad MAC and (good MAC, bad
padding).

The consequences depend on the effective padding value used in the MAC
when the padding is bad. extractPadding simply uses the last byte's
value, leaving the padding bytes effectively unchecked. This is the
scenario in SSL 3.0 that led to POODLE. Specifically, the attacker can
take an input record which uses 16 bytes of padding (a full block) and
replace the final block with some interesting block. The MAC check will
succeed with 1/256 probability due to the final byte being 16. This
again means that after 256 queries, the attacker can decrypt one byte.

To fix this, bitwise AND the two values so they may be checked with one
branch. Additionally, zero the padding if the padding check failed, to
make things more robust.

Updates #27071

Change-Id: I332b14d215078928ffafe3cfeba1a68189f08db3
Reviewed-on: https://go-review.googlesource.com/c/go/+/170701
Reviewed-by: Filippo Valsorda <filippo@golang.org>
Run-TryBot: Filippo Valsorda <filippo@golang.org>
TryBot-Result: Gobot Gobot <gobot@golang.org>
2019-04-16 23:10:02 +00:00
Brad Fitzpatrick
3ffb0577c5 crypto/tls, crypto/x509: update spelling of marshal*
Per https://golang.org/wiki/Spelling and CL 33017.

Change-Id: Ia813a81d25603883114c4e4b6997eb560d6a3690
Reviewed-on: https://go-review.googlesource.com/c/go/+/172457
Reviewed-by: Dmitri Shuralyov <dmitshur@golang.org>
2019-04-16 21:54:01 +00:00
sergeyfrolov
32987941eb
Fix panic in u_public by never dereferencing (#30)
In order to avoid panics, we make sure that no pointer is dereferenced
during transformation between public and private handshake states.
Fixes #29
2019-04-15 13:36:40 -06:00
Eric Wustrow
a4f906cb90 add small logo 2019-04-11 17:19:02 -06:00
Eric Wustrow
ea61bb037b github doesn't scale 2019-04-11 17:18:44 -06:00
Eric Wustrow
cc79d77845 ugh github 2019-04-11 17:01:28 -06:00
Eric Wustrow
dd420e8e64 rescale logo 2019-04-11 17:01:00 -06:00
Eric Wustrow
246879ed0d Merge branch 'master' of github.com:refraction-networking/utls 2019-04-11 16:59:26 -06:00
Eric Wustrow
a3a4119ac9 +logo 2019-04-11 16:59:23 -06:00
Joel Sing
cb16c91e09 crypto/tls: simplify intermediate certificate handling
The certificates argument to verifyServerCertificate must contain
at least one certificate. Simplify the intermediate certificate
handling code accordingly.

Change-Id: I8292cdfb51f418e011d6d97f47d10b4e631aa932
Reviewed-on: https://go-review.googlesource.com/c/go/+/169657
Reviewed-by: Filippo Valsorda <filippo@golang.org>
2019-04-02 20:29:58 +00:00
sergeyfrolov
b7c656eec2
Update fingerprints + add default spec version (#25)
Update fingerprints + add default spec version

 * Adds fingerprints for Chrome 75, iOS 12.1, and Firefox 65(=Firefox 63)
 * If min/max tls versions are not explicitly specified in the ClientHelloSpec,
   uTLS will try to parse versions from SupportedVersions extension,
   and fallback to [TLS 1.0, TLS 1.2] if SupportedVersions is absent.
 * Adds mimicked FakeRecordSizeLimitExtension and FakeCertCompressionAlgsExtension
   to be used instead of GenericExtension{} for clarity and extensibility
   (we are ready to use those with Firefox and Chrome fps with correct values
   whenever actual functionality is implemented)
* SetTLSVers: parse the right extensions + cosmetics
2019-03-27 10:53:10 -06:00
sergeyfrolov
05163f8a36
Fix TLS 1.2 session cache (#28)
Currently, SessionCache is not used for non-HelloGolang fingerprints,
and this PR is what the fix would potentially look like.
This is only for the TLS 1.2, support for TLS 1.3 PSK resumption cache remains a TODO.

Fixes #27
2019-03-20 11:58:53 -06:00
Rod Hynes
f8425e69f7 Fix data race (#26)
Copy slice returned by defaultCipherSuitesTLS13 before modifying to
prevent data race against underlying varDefaultCipherSuitesTLS13 global
variable.
2019-03-17 15:38:08 -06:00
Bryan C. Mills
30581d3628 all: move internal/x to vendor/golang.org/x and revendor using 'go mod vendor'
This also updates the vendored-in versions of several packages: 'go
mod vendor' selects a consistent version of each module, but we had
previously vendored an ad-hoc selection of packages.

Notably, x/crypto/hkdf was previously vendored in at a much newer
commit than the rest of x/crypto. Bringing the rest of x/crypto up to
that commit introduced an import of golang.org/x/sys/cpu, which broke
the js/wasm build, requiring an upgrade of x/sys to pick up CL 165749.

Updates #30228
Updates #30241
Updates #25822

Change-Id: I5b3dbc232b7e6a048a158cbd8d36137af1efb711
Reviewed-on: https://go-review.googlesource.com/c/go/+/164623
Reviewed-by: Filippo Valsorda <filippo@golang.org>
2019-03-11 20:28:54 +00:00
sergeyfrolov
7c97cdb476
Implement consistent randomized fingerprint (#20)
- Uses a chacha20-based CSPRNG to generate randomized fingeprints
 - Refactors generation of randomized fingerprints, removing many redundant shuffle functions.
 - Adds Seed field to ClientHelloID
 - ClientHelloID.Version is now a string (was uint16)
2019-03-06 16:14:34 -07:00
Filippo Valsorda
5d20f2d294 crypto/tls: enable TLS 1.3 by default
Updates #30055

Change-Id: I3e79dd7592673c5d76568b0bcded6c391c3be6b3
Reviewed-on: https://go-review.googlesource.com/c/163081
Run-TryBot: Filippo Valsorda <filippo@golang.org>
TryBot-Result: Gobot Gobot <gobot@golang.org>
Reviewed-by: Adam Langley <agl@golang.org>
2019-02-27 07:54:19 +00:00
Filippo Valsorda
2e9a42ccc2 Revert "crypto/tls: disable RSA-PSS in TLS 1.2"
In Go 1.13 we will enable RSA-PSS in TLS 1.2 at the same time as we make
TLS 1.3 enabled by default.

This reverts commit 7ccd3583eddcd79679fb29cfc83a6e6fb6973f1e.

Updates #30055

Change-Id: I6f2ddf7652d1172a6b29f4e335ff3a71a89974bc
Reviewed-on: https://go-review.googlesource.com/c/163080
Run-TryBot: Filippo Valsorda <filippo@golang.org>
TryBot-Result: Gobot Gobot <gobot@golang.org>
Reviewed-by: Adam Langley <agl@golang.org>
2019-02-27 07:54:00 +00:00
Yasser Abdolmaleki
2635294fad crypto/tls: fix typo
Change-Id: If9332bae87449c94fc14710133614fcd84d2815c
Reviewed-on: https://go-review.googlesource.com/c/161726
Reviewed-by: Filippo Valsorda <filippo@golang.org>
2019-02-26 22:54:37 +00:00
Filippo Valsorda
78e214de5b crypto/tls: remove superfluous for label
Change-Id: I8ea3043fcbaf7a5f73b2a796171a7f1cb3cb3693
Reviewed-on: https://go-review.googlesource.com/c/158818
Run-TryBot: Filippo Valsorda <filippo@golang.org>
TryBot-Result: Gobot Gobot <gobot@golang.org>
Reviewed-by: Brad Fitzpatrick <bradfitz@golang.org>
2019-02-26 18:38:04 +00:00
Sergey Frolov
1188641a16 Correctly handle HelloRetryRequest 2019-02-22 09:51:44 -07:00
Brad Fitzpatrick
b38bccb4d6 crypto/tls, runtime: document GODEBUG TLS 1.3 option
Change-Id: I6801676335924414ce50249df2b7bea08886b203
Reviewed-on: https://go-review.googlesource.com/c/162360
Reviewed-by: Filippo Valsorda <filippo@golang.org>
2019-02-13 19:34:40 +00:00
Filippo Valsorda
b5bf3890ae crypto/tls: disable RSA-PSS in TLS 1.2
Most of the issues that led to the decision on #30055 were related to
incompatibility with or faulty support for RSA-PSS (#29831, #29779,
v1.5 signatures). RSA-PSS is required by TLS 1.3, but is also available
to be negotiated in TLS 1.2.

Altering TLS 1.2 behavior based on GODEBUG=tls13=1 feels surprising, so
just disable RSA-PSS entirely in TLS 1.2 until TLS 1.3 is on by default,
so breakage happens all at once.

Updates #30055

Change-Id: Iee90454a20ded8895e5302e8bcbcd32e4e3031c2
Reviewed-on: https://go-review.googlesource.com/c/160998
Run-TryBot: Filippo Valsorda <filippo@golang.org>
TryBot-Result: Gobot Gobot <gobot@golang.org>
Reviewed-by: Adam Langley <agl@golang.org>
2019-02-07 18:34:43 +00:00
Filippo Valsorda
6fa53d1012 crypto/tls: make TLS 1.3 opt-in
Updates #30055

Change-Id: If68615c8e9daa4226125dcc6a6866f29f3cfeef1
Reviewed-on: https://go-review.googlesource.com/c/160997
Run-TryBot: Filippo Valsorda <filippo@golang.org>
TryBot-Result: Gobot Gobot <gobot@golang.org>
Reviewed-by: Russ Cox <rsc@golang.org>
2019-02-07 18:32:13 +00:00
sergeyfrolov
3fe91d9822
Fix intermittent issues with Randomized parrot (#19)
Fix intermittent issues with Randomized parrot
2019-02-04 13:41:38 -07:00
Eric Wustrow
323a55944c Add MakeConnWithCompleteHandshake function (#18)
Add MakeConnWithCompleteHandshake function + regression test and usage example
2019-01-30 11:25:23 -07:00
Filippo Valsorda
034cff773b crypto/tls: send a "handshake failure" alert if the RSA key is too small
Fixes #29779

Change-Id: I7eb8b4db187597e07d8ec7d3ff651f008e2ca433
Reviewed-on: https://go-review.googlesource.com/c/158639
Run-TryBot: Filippo Valsorda <filippo@golang.org>
TryBot-Result: Gobot Gobot <gobot@golang.org>
Reviewed-by: Brad Fitzpatrick <bradfitz@golang.org>
2019-01-20 20:01:48 +00:00