Cloak/internal/server/TLS.go

83 lines
2.2 KiB
Go
Raw Normal View History

2018-10-09 15:07:54 +00:00
package server
import (
2019-08-31 20:40:50 +00:00
"crypto"
2018-10-09 15:07:54 +00:00
"errors"
2019-08-02 00:01:19 +00:00
"fmt"
2019-08-31 20:40:50 +00:00
"github.com/cbeuw/Cloak/internal/ecdh"
"github.com/cbeuw/Cloak/internal/util"
2020-01-22 18:37:01 +00:00
"net"
2018-10-09 15:07:54 +00:00
2020-01-22 18:37:01 +00:00
log "github.com/sirupsen/logrus"
)
2019-08-02 00:01:19 +00:00
2020-01-22 18:37:01 +00:00
type TLS struct{}
2018-10-09 15:07:54 +00:00
2020-01-22 18:37:01 +00:00
var ErrBadClientHello = errors.New("non (or malformed) ClientHello")
2019-08-03 12:26:57 +00:00
2020-01-22 18:37:01 +00:00
func (TLS) String() string { return "TLS" }
func (TLS) HasRecordLayer() bool { return true }
func (TLS) UnitReadFunc() func(net.Conn, []byte) (int, error) { return util.ReadTLS }
2020-04-06 14:24:18 +00:00
func (TLS) processFirstPacket(clientHello []byte, privateKey crypto.PrivateKey) (fragments authFragments, respond Responder, err error) {
ch, err := parseClientHello(clientHello)
2020-01-22 18:37:01 +00:00
if err != nil {
log.Debug(err)
err = ErrBadClientHello
return
2018-10-09 15:07:54 +00:00
}
2020-04-06 14:24:18 +00:00
fragments, err = TLS{}.unmarshalClientHello(ch, privateKey)
if err != nil {
2020-04-06 13:29:38 +00:00
err = fmt.Errorf("failed to unmarshal ClientHello into authFragments: %v", err)
2020-01-22 18:37:01 +00:00
return
}
2020-04-06 14:24:18 +00:00
respond = TLS{}.makeResponder(ch.sessionId, fragments.sharedSecret[:])
return
}
func (TLS) makeResponder(clientHelloSessionId []byte, sharedSecret []byte) Responder {
respond := func(originalConn net.Conn, sessionKey []byte) (preparedConn net.Conn, err error) {
2020-01-22 18:37:01 +00:00
preparedConn = originalConn
2020-04-06 14:24:18 +00:00
reply, err := composeReply(clientHelloSessionId, sharedSecret, sessionKey)
2020-01-22 18:37:01 +00:00
if err != nil {
err = fmt.Errorf("failed to compose TLS reply: %v", err)
return
}
_, err = preparedConn.Write(reply)
if err != nil {
err = fmt.Errorf("failed to write TLS reply: %v", err)
go preparedConn.Close()
return
}
return
2018-10-09 15:07:54 +00:00
}
2020-04-06 14:24:18 +00:00
return respond
2018-10-09 15:07:54 +00:00
}
2019-08-06 14:50:33 +00:00
2020-04-06 14:24:18 +00:00
func (TLS) unmarshalClientHello(ch *ClientHello, staticPv crypto.PrivateKey) (fragments authFragments, err error) {
2020-04-06 13:29:38 +00:00
copy(fragments.randPubKey[:], ch.random)
ephPub, ok := ecdh.Unmarshal(fragments.randPubKey[:])
2019-08-31 20:40:50 +00:00
if !ok {
err = ErrInvalidPubKey
return
}
2020-04-06 13:29:38 +00:00
copy(fragments.sharedSecret[:], ecdh.GenerateSharedSecret(staticPv, ephPub))
2019-08-31 20:40:50 +00:00
var keyShare []byte
keyShare, err = parseKeyShare(ch.extensions[[2]byte{0x00, 0x33}])
if err != nil {
return
}
2020-01-24 15:13:26 +00:00
ctxTag := append(ch.sessionId, keyShare...)
if len(ctxTag) != 64 {
err = fmt.Errorf("%v: %v", ErrCiphertextLength, len(ctxTag))
2019-08-31 20:40:50 +00:00
return
}
2020-04-06 13:29:38 +00:00
copy(fragments.ciphertextWithTag[:], ctxTag)
2019-08-31 20:40:50 +00:00
return
}