package client import ( "crypto/rand" "encoding/base64" "errors" "fmt" "github.com/cbeuw/Cloak/internal/util" "github.com/gorilla/websocket" "net" "net/http" "net/url" "time" utls "github.com/refraction-networking/utls" ) type WSOverTLS struct { cdnDomainPort string } func (WSOverTLS) HasRecordLayer() bool { return false } func (WSOverTLS) UnitReadFunc() func(net.Conn, []byte) (int, error) { return util.ReadWebSocket } func (ws WSOverTLS) PrepareConnection(authInfo *authInfo, cdnConn net.Conn) (preparedConn net.Conn, sessionKey [32]byte, err error) { utlsConfig := &utls.Config{ ServerName: authInfo.MockDomain, InsecureSkipVerify: true, } uconn := utls.UClient(cdnConn, utlsConfig, utls.HelloChrome_Auto) err = uconn.Handshake() preparedConn = uconn if err != nil { return } u, err := url.Parse("ws://" + ws.cdnDomainPort) if err != nil { return preparedConn, sessionKey, fmt.Errorf("failed to parse ws url: %v", err) } payload, sharedSecret := makeAuthenticationPayload(authInfo, rand.Reader, time.Now()) header := http.Header{} header.Add("hidden", base64.StdEncoding.EncodeToString(append(payload.randPubKey[:], payload.ciphertextWithTag[:]...))) c, _, err := websocket.NewClient(preparedConn, u, header, 16480, 16480) if err != nil { return preparedConn, sessionKey, fmt.Errorf("failed to handshake: %v", err) } preparedConn = &util.WebSocketConn{Conn: c} buf := make([]byte, 128) n, err := preparedConn.Read(buf) if err != nil { return preparedConn, sessionKey, fmt.Errorf("failed to read reply: %v", err) } if n != 60 { return preparedConn, sessionKey, errors.New("reply must be 60 bytes") } reply := buf[:60] sessionKeySlice, err := util.AESGCMDecrypt(reply[:12], sharedSecret[:], reply[12:]) if err != nil { return } copy(sessionKey[:], sessionKeySlice) return }