Commit graph

30 commits

Author SHA1 Message Date
sergeyfrolov
b7c656eec2
Update fingerprints + add default spec version (#25)
Update fingerprints + add default spec version

 * Adds fingerprints for Chrome 75, iOS 12.1, and Firefox 65(=Firefox 63)
 * If min/max tls versions are not explicitly specified in the ClientHelloSpec,
   uTLS will try to parse versions from SupportedVersions extension,
   and fallback to [TLS 1.0, TLS 1.2] if SupportedVersions is absent.
 * Adds mimicked FakeRecordSizeLimitExtension and FakeCertCompressionAlgsExtension
   to be used instead of GenericExtension{} for clarity and extensibility
   (we are ready to use those with Firefox and Chrome fps with correct values
   whenever actual functionality is implemented)
* SetTLSVers: parse the right extensions + cosmetics
2019-03-27 10:53:10 -06:00
sergeyfrolov
05163f8a36
Fix TLS 1.2 session cache (#28)
Currently, SessionCache is not used for non-HelloGolang fingerprints,
and this PR is what the fix would potentially look like.
This is only for the TLS 1.2, support for TLS 1.3 PSK resumption cache remains a TODO.

Fixes #27
2019-03-20 11:58:53 -06:00
Rod Hynes
f8425e69f7 Fix data race (#26)
Copy slice returned by defaultCipherSuitesTLS13 before modifying to
prevent data race against underlying varDefaultCipherSuitesTLS13 global
variable.
2019-03-17 15:38:08 -06:00
sergeyfrolov
7c97cdb476
Implement consistent randomized fingerprint (#20)
- Uses a chacha20-based CSPRNG to generate randomized fingeprints
 - Refactors generation of randomized fingerprints, removing many redundant shuffle functions.
 - Adds Seed field to ClientHelloID
 - ClientHelloID.Version is now a string (was uint16)
2019-03-06 16:14:34 -07:00
sergeyfrolov
3fe91d9822
Fix intermittent issues with Randomized parrot (#19)
Fix intermittent issues with Randomized parrot
2019-02-04 13:41:38 -07:00
Sergey Frolov
fd72b83e04 Implement TLS 1.3 Randomized Spec and revise 1.2
Fixes #13
2019-01-04 19:49:08 -07:00
Sergey Frolov
b84d7d5f05 +tls13 extensions; +Chrome 70, Firefox 63 parrots
Adds support for following TLS 1.3 extensions:
 - PSKKeyExchangeModes
 - SupportedVersions
 - KeyShare
and uses them to implement newest Chrome and Firefox parrots.

Tests for default Golang uTLS were regenerated because
they previously used TLS-1.2 as max version.
2018-12-18 17:53:26 -07:00
Sergey Frolov
109af06ea2 Adapt uTLS for new TLS 1.3 code 2018-12-05 15:12:21 -07:00
Sergey Frolov
db1b65d230 Add Roller: Dialer that cycles thru ClientHellos 2018-07-31 12:20:07 -04:00
Sergey Frolov
4c28dcf6db Clarify ApplyPreset description 2018-07-30 14:29:21 -04:00
Sergey Frolov
e7ad106121 Doc update: use separate custom ClientHelloSpecs 2018-07-30 14:29:21 -04:00
Sergey Frolov
2551de140c Fix statefulness 2018-07-30 14:29:21 -04:00
Sergey Frolov
4930c22447 Add iOS 11 fingerprint 2018-07-23 18:24:04 -04:00
Sergey Frolov
e0edd7863b Rename FakeGREASEExtension -> UtlsGREASEExtension 2018-06-27 14:19:30 -04:00
Sergey Frolov
8dcadf2736 Bump min Go version to 1.9, gofmt 2018-06-21 13:55:02 -04:00
Sergey Frolov
112951f6d7 Refactor: enable flexible external configuration 2018-06-21 13:55:02 -04:00
Sergey Frolov
9656990081 Merge branch 'golang-tls-upstream', remove Android
I tested all fingerprints and confirmed that Chrome and Firefox are
working as intended.
Android fingerprints were grossly unpopular, which could a result of
incorrect merge, but either way we'll remove them for now.
2018-06-15 17:25:21 -04:00
Sergey Frolov
c98df6b261 Add Firefox 56 and Chrome 62 2017-11-14 11:36:09 -07:00
Sergey Frolov
3b53b610a6 go vet fixes 2017-09-08 15:59:05 -06:00
Sergey Frolov
5893031118 RandomizedHello: fix cipherSuite' shuffling 2017-09-06 19:26:16 -06:00
Sergey Frolov
fd96e317e6 Fixes #5
The root cause of races is that global variables supportedSignatureAlgorithms and
cipherSuites are used both to form handshake and to check whether or not
peer responded with supported algorithm.
In this patch I create separate variables for this purpose.
Updated tests for kicks.
Finally, go fmt.
2017-08-16 16:12:27 -04:00
Sergey Frolov
a07d9bc87d Added global cipherSuites are disabled by default
Makes sure that old cipher suite ids, added to global cipherSuites,
are now disabled by default, and, thus, do not affect default Golang
handshake.
2017-08-16 11:56:58 -04:00
Sergey Frolov
eb3c8be9a1 Revert "Remove appendToGlobalCipherSuites"
This reverts commit 0af497570e.
2017-08-16 11:55:39 -04:00
Sergey Frolov
ab61409e7d Add ems 2017-08-16 11:54:20 -04:00
Sergey Frolov
6890f3e435 Finish Firefox 55 fignerprint. Implements #4 2017-08-15 12:50:40 -04:00
Sergey Frolov
0af497570e Remove appendToGlobalCipherSuites
This function is not needed anymore, since check for whether ciphersuite is
supported is done against per-tls.Config, not against global variable.
One of needed changes for fixing data races, see #5
2017-08-15 12:48:48 -04:00
Sergey Frolov
120bf80363 parrotChrome_58: add SHA512 globally 2017-08-09 14:00:00 -04:00
Sergey Frolov
e96789aa6a parrotChrome_58: fix panic 2017-08-09 13:59:43 -04:00
Sergey Frolov
e66d491f21 Add BSD LICENSE headers 2017-08-07 18:33:59 -04:00
Sergey Frolov
cd3d1c4656 uTLS: initial commit 2017-07-07 11:02:48 -04:00