- May 28, 2014
-
-
Yawning Angel authored
-
Yawning Angel authored
The old way was biasted towards the earlier values. Thanks to asn for pointing this out and suggesting an alternative. As an additional tweak, do not reuse the drbg seed when calculating the IAT distribution, but instead run the seed through SHA256 first, for extra tinfoil goodness.
-
- May 26, 2014
-
-
Yawning Angel authored
-
Yawning Angel authored
-
- May 25, 2014
-
-
Yawning Angel authored
-
Yawning Angel authored
Joining a SOCKS dialer on the list of things the Golang runtime really should have is a HTTP CONNECT dialer. There's a full fledged HTTP client and server there, but not this. Why? Who knows. This fixes issue #7.
-
Yawning Angel authored
Part of issue #7.
-
Yawning Angel authored
Despite the unfortunate scheme name, this really is SOCKS4, and not 4a, as the torrc Socks4Proxy option only supports addresses and not FQDNs. Part of issue #7.
-
Yawning Angel authored
-
Yawning Angel authored
With tor patched to support 8402, obfs4 bootstraps via a SOCKSv5 proxy now. Other schemes will bail with a PROXY-ERROR, as the go.net/proxy package does not support them, and I have not gotten around to writing dialers for them yet (next on my TODO list). Part of issue #7.
-
Yawning Angel authored
Part of issue #7.
-
Yawning Angel authored
Currently obfs4proxy is hardcoded to always PROXY-ERROR, despite a valid proxy uri being passed in the env var. Once the dialer portion of the code is done, this will be changed. Part of issue #7.
-
Yawning Angel authored
-
- May 24, 2014
-
-
Yawning Angel authored
-
Yawning Angel authored
This makes the length error and MAC error indistinguishable to an external attacker.
-
Yawning Angel authored
All of the obfs4 code except unit tests now uses the csrand wrapper routines.
-
- May 23, 2014
-
-
Yawning Angel authored
When enabled, inter-packet delay will be randomized between 0 and 10 ms in 100 usec intervals. As experiences from ScrambleSuit (and back of the envelope math based on how networks work) show, this is extremely expensive and artificially limits the throughput of the link. When enabled, bulk transfer throughput will be limited to an average of 278 KiB/s.
-
Yawning Angel authored
* handhake_ntor_test now is considerably more comprehensive. * The padding related constants in the spec were clarified. This breaks wireprotocol compatibility.
-
- May 22, 2014
-
-
Yawning Angel authored
This is done by maintaining a map keyed off the SipHash-2-4 digest of the MAC_C component of the handshake. Collisions, while possible are unlikely in the extreme and are thus treated as replays. In concept this is fairly similar to the ScrambleSuit `replay.py` code, with a few modifications: * There is a upper bound on how large the replay filter can grow. Currently this is set to 102400 entries, though it is unlikely that this limit will be hit. * A doubly linked list is also maintained parallel to the map, so the filter compaction process does not need to iterate over the entire filter.
-
- May 21, 2014
-
-
Yawning Angel authored
This reverts commit 8d61c6bc. On second thought, don't do this. API not final, and some of the stuff might not be a good idea after all.
-
Yawning Angel authored
-
Yawning Angel authored
As of `15b960d55905877a840fe605a41a8139bffb5329` goptlib supports IsClient, IsServer, and handling the StateLocation. Yes this means you need to use goptlib out of git.
-
Yawning Angel authored
This breaks wireprotocol compatibility.
-
Yawning Angel authored
This fixes #6.
-
Yawning Angel authored
-
- May 20, 2014
-
-
Yawning Angel authored
Part of #6, still need to make logs nicer.
-
Yawning Angel authored
* Fixed where the code wasn't ensuring that the MAC_[C,S] was present. * Optimized the server side to only look at the tail of the (possibly incomplete handshakeRequest).
-
- May 18, 2014
-
-
Yawning Angel authored
This makes it consistent across all incoming connections, for real this time (oops).
-
Yawning Angel authored
It will vary per bridge as it is based off the DRBG, but ever attempt at poking at any given bridge will exhibit consistent behavior.
-
- May 17, 2014
-
-
Yawning Angel authored
This is more common than 15 seconds (It's what Firefox uses for the request timeout).
-
Yawning Angel authored
-
- May 16, 2014
-
-
Yawning Angel authored
-
Yawning Angel authored
This fixes #4.
-
Yawning Angel authored
Clients will now always add 87 bytes of padding to the clientRequest, and Servers will always send the PRNG seed frame unpadded, and bundled with the serverResponse. Why 87 bytes? The amount of data that the server sends is 87. This fixes #5.
-
Yawning Angel authored
-
Yawning Angel authored
Instead of including the previous secretbox in the input when calculating the SipHash-2-4 digest used to generate the obfuscation mask, use only the nonce. This is significantly faster, and if someone breaks obfs4 by exploiting the low amount of input entropy between each invocation (a counter incrementing by 1), I hope they publish the attack on the PRF. This breaks wire protocol compatibility.
-
Yawning Angel authored
* HMAC-SHA256 -> HMAC-SHA256-128. * Mark/MAC are now both caluclated using Public Key | NodeID. This breaks wire protocol compatibility.
-
- May 15, 2014
-
-
Yawning Angel authored
This fixes #3, and brings the code to be on par with the delopyed versions of ScrambleSuit in terms of features.
-
Yawning Angel authored
This also adds the drgb-seed option to the `-gen` obfs4proxy output.
-
Yawning Angel authored
This paves the way for having servers use the same seed for all incoming connections, across multiple startup/shutdown cycles. As opposed to the current situation where each Obfs4Listener will randomly generate it's seed at creation time. Additionally, use 256 bit seeds (128 bit SipHash-2-4 key + 16 bytes of initial material).
-