Commit graph

329 commits

Author SHA1 Message Date
rp-psiphon
f781b699a2
new ClientHellos and Extensions (#116)
* Implement certificate compression

Certificate compression is defined in RFC 8879:
https://datatracker.ietf.org/doc/html/rfc8879

This implementation is client-side only, for server certificates.

* Fix missing LOC

* Add more fingerprints

* Implement ALPS extension

* Merge commit fcaacdbbe7

- At this commit, github.com/Noooste/utls remained at the original upstream LICENSE

* added HelloChrome102 and HelloFirefox102

* Randomly include ALPS in HelloRandomized

Co-authored-by: Harry Harpham <harry@getlantern.org>
Co-authored-by: Sleeyax <yourd3veloper@gmail.com>
Co-authored-by: Rod Hynes <rod-hynes@users.noreply.github.com>
2022-09-06 20:04:31 -06:00
fedosgad
4d3785b233
Document adding custom fake TLS extensions (#115)
* Document adding custom TLS extensions

* Fix custom extension example
2022-09-06 19:59:06 -06:00
hwh33
7344e34650
Implement certificate compression (#95)
Certificate compression is defined in RFC 8879:
https://datatracker.ietf.org/doc/html/rfc8879

This implementation is client-side only, for server certificates.

- Fixes #104.
2022-07-19 19:12:30 -06:00
Gaukas Wang
9d36ce3658
Merge pull request #100 from max-b/maxb/sni-fixes
Fix invalid SNI handling which could be fingerprinted
2022-04-28 16:52:52 -06:00
Maxb
ee9f86141f Fix invalid SNI handling
SNIExtension was previously marshalling both ip addresses and empty
strings, which are not allowed. See RFC 6066, Section 3.

All of the utls specific testdata replays needed to be rebuilt to
properly accomodate this change since they had previously been including
empty server name extension values

Addresses https://github.com/refraction-networking/utls/issues/96
2022-02-01 21:01:29 -08:00
Rod Hynes
0b2885c8c0
Backport fix for CVE-2021-34558 (#80)
See: https://groups.google.com/g/golang-dev/c/5LJ2V7rd-Ag/m/YGLHVBZ6AAAJ
2021-07-13 10:56:36 -06:00
maxb
2179f28668
Implement FingerprintClientHello to generate ClientHelloSpec from ClientHello raw bytes (#67) 2020-12-09 22:37:06 -07:00
Mushroomician
f7e7360167
Add FAKE_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (#65) 2020-11-12 12:39:08 -07:00
maxb
5801f3fc5a
Expose DecryptTicketWith function (#61)
Expose DecryptTicketWith function
2020-11-12 12:38:19 -07:00
maxb
33a29038e7
Expose UnmarshalClientHello func (#62) 2020-08-19 21:01:03 -06:00
maxb
4ee6244579
Fix omitSNI test (#59) 2020-08-14 13:45:39 -06:00
Sergey Frolov
219d12d0a4
Fix riscv64 support 2020-08-05 19:45:56 -06:00
Sergey Frolov
186025ac7b
Add support for riscv64 (#55)
Fixes #49
2020-07-28 19:25:36 -06:00
maxb
dc2ae3bffe
Implement uconn.RemoveSNIExtension() (#51)
Authored by: https://github.com/max-b
Co-authored-by: Myles Horton <myles@getlantern.org>
Co-authored-by: Willie Forkner <1120829+forkner@users.noreply.github.com>
2020-07-28 19:25:16 -06:00
Sergey Frolov
02675388fe
Fix GREASE repeating values (#53)
Fixes #52
2020-07-28 09:42:20 -06:00
maxb
c9b914be28
Fix openssl command arguments for update tests (#50) 2020-07-23 14:27:49 -06:00
Sergey Frolov
ada0bb9b38
README: add Chrome 83 link 2020-06-01 14:02:09 -06:00
Sergey Frolov
641a3b15c7
Add Chrome 83 fingerprint (#46)
Add Chrome 83 fingerprint

Removed features vs Chrome 72:
 3DES cipher suite (https://tlsfingerprint.io/find/cipher/000a)
 sha1 signature algorithm (rsa_pkcs1_sha1 (0x0201))
2020-06-01 13:47:02 -06:00
sergeyfrolov
43c36d3c1f
Merge pull request #35 from refraction-networking/merge-upstream-on-reneg
Merge upstream
2019-09-09 14:06:33 -06:00
Sergey Frolov
96d6d41585 Merge branch 'master' into merge-upstream-on-reneg 2019-09-09 14:03:13 -06:00
Sergey Frolov
0bcfaf9aee Merge branch 'master' into merge-upstream-on-reneg 2019-09-09 13:59:35 -06:00
Rod Hynes
dbda71b12f Use SHAKE instead of chacha20 for PRNG stream (#37)
See: https://github.com/refraction-networking/utls/issues/36
2019-09-09 13:56:03 -06:00
sergeyfrolov
cc2996c818
Fix #33: renegotiation and export extension fields (#34)
Renegotiation:
 - Disallow specifying the body of Renegotiation extensions to
   avoid assumption that it will be verified.
 - Marshal the extension, if it is present in the uconn.Extensions list,
   even if Renegotiation is set to Never.

Exports all unexported uTLS extension fields.

Fixes #33
2019-08-23 21:23:29 -06:00
Sergey Frolov
9369e476d0 Fix tests after a merge 2019-08-22 17:56:13 -06:00
Sergey Frolov
ceee37ab69 Merge branch golang crypto/tls upstream 2019-08-22 17:42:47 -06:00
Sergey Frolov
1552a980ce Fix #33: renegotiation and export extension fields
Renegotiation:
 - Disallow specifying the body of Renegotiation extensions to
   avoid assumption that it will be verified.
 - Marshal the extension, if it is present in the uconn.Extensions list,
   even if Renegotiation is set to Never.

Exports all unexported uTLS extension fields.

Fixes #33
2019-08-22 16:44:11 -06:00
Sergey Frolov
020d12cffe Fix #33: renegotiation and export extension fields
Renegotiation:
 - Disallow specifying the body of Renegotiation extensions to
   avoid assumption that it will be verified.
 - Marshal the extension, if it is present in the uconn.Extensions list,
   even if Renegotiation is set to Never.

Exports all unexported uTLS extension fields.

Fixes #33
2019-08-22 16:33:47 -06:00
Rod Hynes
4da6795186 Fix all-zeroes SessionID (#31) 2019-08-12 15:06:06 -06:00
Daniel Martí
6c11745f0b all: remove a few unused parameters
I recently modified tabwriter to reduce the number of defers due to
flush calls. However, I forgot to notice that the new function
flushNoDefers can no longer return an error, due to the lack of the
defer.

In crypto/tls, hashForServerKeyExchange never returned a non-nil error,
so simplify the code.

Finally, in go/types and net we can find a few trivially unused
parameters, so remove them.

Change-Id: I54c8de83fbc944df432453b55c93008d7e810e61
Reviewed-on: https://go-review.googlesource.com/c/go/+/174131
Run-TryBot: Daniel Martí <mvdan@mvdan.cc>
TryBot-Result: Gobot Gobot <gobot@golang.org>
Reviewed-by: Benny Siegert <bsiegert@gmail.com>
2019-04-29 13:31:54 +00:00
David Benjamin
1f8aa21cce crypto/tls: fix a minor MAC vs padding leak
The CBC mode ciphers in TLS are a disaster. By ordering authentication
and encryption wrong, they are very subtly dependent on details and
implementation of the padding check, admitting attacks such as POODLE
and Lucky13.

crypto/tls does not promise full countermeasures for Lucky13 and still
contains some timing variations. This change fixes one of the easy ones:
by checking the MAC, then the padding, rather than all at once, there is
a very small timing variation between bad MAC and (good MAC, bad
padding).

The consequences depend on the effective padding value used in the MAC
when the padding is bad. extractPadding simply uses the last byte's
value, leaving the padding bytes effectively unchecked. This is the
scenario in SSL 3.0 that led to POODLE. Specifically, the attacker can
take an input record which uses 16 bytes of padding (a full block) and
replace the final block with some interesting block. The MAC check will
succeed with 1/256 probability due to the final byte being 16. This
again means that after 256 queries, the attacker can decrypt one byte.

To fix this, bitwise AND the two values so they may be checked with one
branch. Additionally, zero the padding if the padding check failed, to
make things more robust.

Updates #27071

Change-Id: I332b14d215078928ffafe3cfeba1a68189f08db3
Reviewed-on: https://go-review.googlesource.com/c/go/+/170701
Reviewed-by: Filippo Valsorda <filippo@golang.org>
Run-TryBot: Filippo Valsorda <filippo@golang.org>
TryBot-Result: Gobot Gobot <gobot@golang.org>
2019-04-16 23:10:02 +00:00
Brad Fitzpatrick
3ffb0577c5 crypto/tls, crypto/x509: update spelling of marshal*
Per https://golang.org/wiki/Spelling and CL 33017.

Change-Id: Ia813a81d25603883114c4e4b6997eb560d6a3690
Reviewed-on: https://go-review.googlesource.com/c/go/+/172457
Reviewed-by: Dmitri Shuralyov <dmitshur@golang.org>
2019-04-16 21:54:01 +00:00
sergeyfrolov
32987941eb
Fix panic in u_public by never dereferencing (#30)
In order to avoid panics, we make sure that no pointer is dereferenced
during transformation between public and private handshake states.
Fixes #29
2019-04-15 13:36:40 -06:00
Eric Wustrow
a4f906cb90 add small logo 2019-04-11 17:19:02 -06:00
Eric Wustrow
ea61bb037b github doesn't scale 2019-04-11 17:18:44 -06:00
Eric Wustrow
cc79d77845 ugh github 2019-04-11 17:01:28 -06:00
Eric Wustrow
dd420e8e64 rescale logo 2019-04-11 17:01:00 -06:00
Eric Wustrow
246879ed0d Merge branch 'master' of github.com:refraction-networking/utls 2019-04-11 16:59:26 -06:00
Eric Wustrow
a3a4119ac9 +logo 2019-04-11 16:59:23 -06:00
Joel Sing
cb16c91e09 crypto/tls: simplify intermediate certificate handling
The certificates argument to verifyServerCertificate must contain
at least one certificate. Simplify the intermediate certificate
handling code accordingly.

Change-Id: I8292cdfb51f418e011d6d97f47d10b4e631aa932
Reviewed-on: https://go-review.googlesource.com/c/go/+/169657
Reviewed-by: Filippo Valsorda <filippo@golang.org>
2019-04-02 20:29:58 +00:00
sergeyfrolov
b7c656eec2
Update fingerprints + add default spec version (#25)
Update fingerprints + add default spec version

 * Adds fingerprints for Chrome 75, iOS 12.1, and Firefox 65(=Firefox 63)
 * If min/max tls versions are not explicitly specified in the ClientHelloSpec,
   uTLS will try to parse versions from SupportedVersions extension,
   and fallback to [TLS 1.0, TLS 1.2] if SupportedVersions is absent.
 * Adds mimicked FakeRecordSizeLimitExtension and FakeCertCompressionAlgsExtension
   to be used instead of GenericExtension{} for clarity and extensibility
   (we are ready to use those with Firefox and Chrome fps with correct values
   whenever actual functionality is implemented)
* SetTLSVers: parse the right extensions + cosmetics
2019-03-27 10:53:10 -06:00
sergeyfrolov
05163f8a36
Fix TLS 1.2 session cache (#28)
Currently, SessionCache is not used for non-HelloGolang fingerprints,
and this PR is what the fix would potentially look like.
This is only for the TLS 1.2, support for TLS 1.3 PSK resumption cache remains a TODO.

Fixes #27
2019-03-20 11:58:53 -06:00
Rod Hynes
f8425e69f7 Fix data race (#26)
Copy slice returned by defaultCipherSuitesTLS13 before modifying to
prevent data race against underlying varDefaultCipherSuitesTLS13 global
variable.
2019-03-17 15:38:08 -06:00
Bryan C. Mills
30581d3628 all: move internal/x to vendor/golang.org/x and revendor using 'go mod vendor'
This also updates the vendored-in versions of several packages: 'go
mod vendor' selects a consistent version of each module, but we had
previously vendored an ad-hoc selection of packages.

Notably, x/crypto/hkdf was previously vendored in at a much newer
commit than the rest of x/crypto. Bringing the rest of x/crypto up to
that commit introduced an import of golang.org/x/sys/cpu, which broke
the js/wasm build, requiring an upgrade of x/sys to pick up CL 165749.

Updates #30228
Updates #30241
Updates #25822

Change-Id: I5b3dbc232b7e6a048a158cbd8d36137af1efb711
Reviewed-on: https://go-review.googlesource.com/c/go/+/164623
Reviewed-by: Filippo Valsorda <filippo@golang.org>
2019-03-11 20:28:54 +00:00
sergeyfrolov
7c97cdb476
Implement consistent randomized fingerprint (#20)
- Uses a chacha20-based CSPRNG to generate randomized fingeprints
 - Refactors generation of randomized fingerprints, removing many redundant shuffle functions.
 - Adds Seed field to ClientHelloID
 - ClientHelloID.Version is now a string (was uint16)
2019-03-06 16:14:34 -07:00
Filippo Valsorda
5d20f2d294 crypto/tls: enable TLS 1.3 by default
Updates #30055

Change-Id: I3e79dd7592673c5d76568b0bcded6c391c3be6b3
Reviewed-on: https://go-review.googlesource.com/c/163081
Run-TryBot: Filippo Valsorda <filippo@golang.org>
TryBot-Result: Gobot Gobot <gobot@golang.org>
Reviewed-by: Adam Langley <agl@golang.org>
2019-02-27 07:54:19 +00:00
Filippo Valsorda
2e9a42ccc2 Revert "crypto/tls: disable RSA-PSS in TLS 1.2"
In Go 1.13 we will enable RSA-PSS in TLS 1.2 at the same time as we make
TLS 1.3 enabled by default.

This reverts commit 7ccd3583eddcd79679fb29cfc83a6e6fb6973f1e.

Updates #30055

Change-Id: I6f2ddf7652d1172a6b29f4e335ff3a71a89974bc
Reviewed-on: https://go-review.googlesource.com/c/163080
Run-TryBot: Filippo Valsorda <filippo@golang.org>
TryBot-Result: Gobot Gobot <gobot@golang.org>
Reviewed-by: Adam Langley <agl@golang.org>
2019-02-27 07:54:00 +00:00
Yasser Abdolmaleki
2635294fad crypto/tls: fix typo
Change-Id: If9332bae87449c94fc14710133614fcd84d2815c
Reviewed-on: https://go-review.googlesource.com/c/161726
Reviewed-by: Filippo Valsorda <filippo@golang.org>
2019-02-26 22:54:37 +00:00
Filippo Valsorda
78e214de5b crypto/tls: remove superfluous for label
Change-Id: I8ea3043fcbaf7a5f73b2a796171a7f1cb3cb3693
Reviewed-on: https://go-review.googlesource.com/c/158818
Run-TryBot: Filippo Valsorda <filippo@golang.org>
TryBot-Result: Gobot Gobot <gobot@golang.org>
Reviewed-by: Brad Fitzpatrick <bradfitz@golang.org>
2019-02-26 18:38:04 +00:00
Sergey Frolov
1188641a16 Correctly handle HelloRetryRequest 2019-02-22 09:51:44 -07:00
Brad Fitzpatrick
b38bccb4d6 crypto/tls, runtime: document GODEBUG TLS 1.3 option
Change-Id: I6801676335924414ce50249df2b7bea08886b203
Reviewed-on: https://go-review.googlesource.com/c/162360
Reviewed-by: Filippo Valsorda <filippo@golang.org>
2019-02-13 19:34:40 +00:00