Commit Graph

181 Commits

Author SHA1 Message Date
Yawning Angel
e52258edac Make establishing outgoing connections the transport's responsibility.
ClientFactories now have a Dial() method instead of a WrapConn()
method, so that it is possible to write something like meek-client
using the obfs4proxy framework.

This breaks the external interface if anyone is using obfs4proxy as
a library, but the new way of doing things is a trivial modification,
to a single routine that shouldn't have been very large to begin with.
2015-10-29 14:09:34 +00:00
Yawning Angel
69ffcc39c6 Delay transport initialization till after logging has been setup. 2015-06-01 16:15:35 +00:00
David Fifield
cf4dd074fa Fix doc comment for log.Debugf. 2015-05-26 06:19:55 +00:00
Yawning Angel
37a709d8b4 Bump the version to 0.0.6-dev, signifying development towards 0.0.6. 2015-04-23 00:32:25 +00:00
Yawning Angel
3540313e53 Do the release ritual for obfs4proxy-0.0.5. 2015-04-15 20:54:07 +00:00
Yawning Angel
a8d7134f10 Use a built in SOCKS 5 server instead of goptlibs.
Differences from my goptlib branch:
 * Instead of exposing a net.Listener, just expose a Handshake() routine
   that takes an existing net.Conn. (#14135 is irrelevant to this socks
   server.
 * There's an extra routine for sending back sensible errors on Dial
   failure instead of "General failure".
 * The code is slightly cleaner (IMO).

Gotchas:
 * If the goptlib pt.Args datatype or external interface changes,
   args.go will need to be updated.

Tested with obfs3 and obfs4, including IPv6.
2015-04-15 20:50:01 +00:00
Yawning Angel
8996cb2646 Add routines for querying the log module state.
Unless you have very good reason to do so, there should be no reason to
actually call these ever, since the log messages are only generated if
they will result in output being written to a log file.
2015-04-13 21:21:12 +00:00
Yawning Angel
df42657079 Move logging wrappers into common/log, and add a DEBUG log level.
Implements feature #15576.
2015-04-03 14:21:31 +00:00
Yawning Angel
402fe97d85 Add support for tor feature #15435.
If the relevant enviornment variable is set, treat read errors from
Stdin as a SIGTERM.
2015-03-28 03:09:17 +00:00
Yawning Angel
657c8e4f02 Clean up/refactor the shutdown/termination handling code.
This combines the old signal processing code with the parent monitor,
into a new termination monitor structure, which also now handles keeping
track of outstanding sessions.
2015-03-28 02:49:07 +00:00
Yawning Angel
b670a07923 Fix comments. (No functional changes) 2015-03-26 06:46:24 +00:00
Yawning Angel
4e4c9052f4 Attempt to detect if the parent crashed without killing obfs4proxy.
The ideal solution here would be to implement #15435, but till then
use one of several kludges:
 * Linux - prctl() so that the kernel SIGTERMs on parent exit.
 * Other U*ix - Poll the parent process id once a second, and SIGTERM
   ourself/exit if it changes.  Former is better since all the normal
   cleanup if any gets done.
 * Windows - Log a warning.
2015-03-26 06:30:50 +00:00
Yawning Angel
aed4b72389 Change the import path for go.net.
The Go developers decided to move the go.net repository to
golang.org/x/net, and also to transition from hg to git.  This wasn't
changed when the go.crypto imports were since the 'proxy' component
doesn't have imports that break, so the old code still works.

While the change here is simple (just update the import location), this
affects packagers as it now expects the updated package.  Sorry for the
inconveneince, I blame the Go people, and myself for not just doing
this along with the go.crypto changes.
2015-03-23 09:13:19 +00:00
Yawning Angel
594d45be02 Update the ChangeLog (No functional changes). 2015-03-22 12:57:55 +00:00
Daniel Martí
398b795c87 Simplify some err and return logic 2015-03-22 00:24:44 +01:00
Daniel Martí
ced244c09f Reduce some if err != nil logic lines 2015-03-18 13:44:59 +01:00
Yawning Angel
6d1b69d299 Update the ChangeLog (No functional changes). 2015-03-16 21:32:17 +00:00
Daniel Martí
19dcb424be Fix all go vet issues 2015-03-16 19:47:37 +01:00
Daniel Martí
08647ec580 Run go fmt 2015-03-16 19:43:02 +01:00
Yawning Angel
714581df51 Do the release ritual for obfs4proxy-0.0.4. 2015-02-17 11:45:41 +00:00
Yawning Angel
0066cfc393 Add support for acting as a ScrambleSuit client.
This allows obfs4proxy to be used as a ScrambleSuit client that is wire
compatible with the obfs4proxy implementation, including session ticket
support, and length obfuscation.

The current implementation has the following limitations:
 * IAT obfuscation is not supported (and is disabled in all other
   ScrambleSuit implementations by default).
 * The length distribution and probabilites are different from those
   generated by obfsproxy and obfsclient due to a different DRBG.
 * Server support is missing and is unlikely to be implemented.
2015-02-17 11:33:29 +00:00
Yawning Angel
0f038ca4fa Document the obfs4 NaCl secretbox nonce generation.
Forgot to include this in the spec, though it was documented as a
comment in the framing code.
2015-01-14 20:49:56 +00:00
Yawning Angel
cdeda57241 Change the import path for go.crypto.
The Go developers decided to move the go.crypto repository to
golang.org/x/crypto, and also to transition from hg to git.  The tip of
tree code.google.com copy of the code is broken due to the import paths
pointing at the new repository.

While the change here is simple (just update the import location), this
affects packagers as it now expects the updated package.  Sorry for the
inconveneince, I blame the Go people.
2015-01-14 20:43:04 +00:00
Yawning Angel
6ba5b4921f Fix minor issues pointed out by "go vet". 2014-10-24 22:02:23 +00:00
Yawning Angel
4932821bda Improve the performance of the obfs4 handshake test.
Exhaustively testing padding combinations is really slow, and was
causing timeouts during the Debian ARM package build process.  Attempt
to improve the situation by:

 * Reusing the client and server keypair for all of the tests, to cut
   runtime down by  ~50%.
 * Splitting the client side and server side tests up, as it appears
   the timeout is per-test case.

If this doesn't fix things, the next thing to try would be to reduce
the actual number of padding lengths tested, but that is a last resort
at the moment.
2014-10-03 18:27:38 +00:00
Yawning Angel
fc00015ee2 Do the release ritual for obfs4proxy-0.0.3. 2014-10-01 19:29:22 +00:00
Yawning Angel
6cd81ec42f Change the bridge line format to be more compact.
Instead of "node-id" and "public-key" that are Base16 encoded, use
"cert" which contains the "node-id" and "public-key" in Base64 encoded
form.  This is more compact and cuts the length down by 49 characters.
2014-10-01 19:00:30 +00:00
Yawning Angel
213495d3b9 Do the release ritual for obfs4proxy-0.0.2. 2014-09-26 09:51:26 +00:00
Yawning Angel
514c3c6053 Write an example obfs4 bridge line to "obfs4_bridgeline.txt".
Write an example client bridge line suitable for use with the running
obfs4 server instance to "obfs4_bridgeline.txt" for the convenience of
bridge operators.
2014-09-24 16:00:42 +00:00
Yawning Angel
c4378cc0d3 Fix spelling error in man page, no functional changes. 2014-09-06 17:30:55 +00:00
Yawning Angel
1436720b12 Minor documentation cleanups, no functional changes. 2014-09-06 16:47:57 +00:00
Yawning Angel
09633500b3 Add a man page for obfs4proxy. 2014-09-06 16:40:37 +00:00
Yawning Angel
cedd6a5fa9 Do the release ritual for obfs4proxy-0.0.1. 2014-09-03 17:12:53 +00:00
Yawning Angel
ce86fa4348 Change the default logLevel to ERROR, upgrade some client warnings.
Client side logs are less spammy than server side in general, so more
messages should be visible at the default logLevel when running as a
client.

Server side logging will be spammy basically no matter what unless
obfs4proxy gets into the (arguably dangerous) business of figuring out
which errors are people being evil vs which ones are transient network
issues, so most logging is suppressed by default, unless the admin
choses to open the floodgates.
2014-09-03 12:50:43 +00:00
Yawning Angel
fb13cf1241 Add a prolog/epilog to the logging that always gets logged.
The prolog prints the version as soon as logging is enabled, but before
the pluggable transport configuration is done.  The epilog is printed as
the code returns from main, as long as either client or server pt
configuration succeded.
2014-09-03 11:55:16 +00:00
Yawning Angel
79e94103d6 Update the README.md (No functional changes). 2014-09-03 09:44:18 +00:00
Yawning Angel
d5f59458fe Change the version command line arg from -v to -version.
For consistency with the rest of the arguments.
2014-09-03 09:09:13 +00:00
Yawning Angel
25178c6a95 Add support for "logLevel" to reduce log spam.
By default logging will be done at the "WARN" level.  Fatal
initialization errors will always be logged as long as logging
is enabled regardless of logLevel.
2014-09-03 09:05:18 +00:00
Yawning Angel
ce39988b11 Add elideError(error) that knows how to sanitize net.Errors.
Instead of omitting errors entirely when running with the log scrubber,
filter common network errors through elideError() that can scrub the
common net.Error types and remove sensitive information.
2014-08-31 14:30:14 +00:00
Yawning Angel
bfca92cf16 Various IAT related changes.
* Unbreak inbound TYPE_PRNG_SEED processing.

 * IAT obfuscation is now a per-bridge argument (iat-mode).
   * 0 (default) = Disabled.
   * 1 = Enabled, ScrambleSuit-style with bulk throughput optimizations.
   * 2 = Paranoid, Each IAT write will send a length sampled from the
     length distribution. (EXPENSIVE).

The "iat-mode" argument is mandatory on the Bridge lines, and as a
ServerTransportOption.  Old statefiles will continue to load and use
the default value, edit it if your hat is made of tin foil.
2014-08-27 12:30:11 +00:00
Yawning Angel
94d3fe9a08 Change the TYPE_PRNG_SEED length to 24.
This matches what the code actually sends.  It's shorter than the
ScrambleSuit PRNG seed, but that's because the SipHash-2-4 based
Hash_DRBG has 24 bytes of internal state (key + initial output).
2014-08-27 12:26:09 +00:00
Yawning Angel
468cd4bde8 Display a more useful error on JSON Unmarshall failure. 2014-08-27 03:52:22 +00:00
Yawning Angel
83c9e3b9a0 Add a ChangeLog and dump the version when invoked with "-v". 2014-08-27 03:46:23 +00:00
Yawning Angel
1e574942d5 Change all the arguments to use base16 from base64.
WARNING: THIS BREAKS BACKWARD COMPATIBILITY.

This is primarily to work around bug #12930.  Base16 was chosen over
unpadded Base64 because the go runtime Base64 decoder does not handle
omitting the padding.

May $deity have mercy on anyone who needs to hand-enter an obfs4 bridge
line because I will not.
2014-08-23 05:33:23 +00:00
Yawning Angel
596cc85073 Elide the error out from most logs unless unsafeLogging is set.
The Golang runtime will happily splatter the remote IP address and port
in the error's string representation for network related errors.  While
useful for debugging, this is unacceptable from a privacy standpoint.
2014-08-20 22:44:07 +00:00
Yawning Angel
dd9fdee55d Add a missing "continue" statement.
Caught by asn, thanks.
2014-08-20 13:43:43 +00:00
Yawning Angel
f32f01ba01 Change the drbg seed field in the state file.
Changing from "drbgSeed" to "drbg-seed" to be consistent with the
ServerTransportOptions to allow for easier copy/paste.
2014-08-18 11:54:39 +00:00
Yawning Angel
22c9dc3f48 Add support for enabling IAT obfuscation and biased WDist.
Golang's command line parser is slightly cumbersome to use with
subcommands, so the arguments are "obfs4-iatObufscation" and
"obfs-distBias" instead of obfsproxy style subcommands.
2014-08-18 11:53:22 +00:00
Yawning Angel
339c63f0c8 Massive cleanup/code reorg.
* Changed obfs4proxy to be more like obfsproxy in terms of design,
   including being an easy framework for developing new TCP/IP style
   pluggable transports.
 * Added support for also acting as an obfs2/obfs3 client or bridge
   as a transition measure (and because the code itself is trivial).
 * Massively cleaned up the obfs4 and related code to be easier to
   read, and more idiomatic Go-like in style.
 * To ease deployment, obfs4proxy will now autogenerate the node-id,
   curve25519 keypair, and drbg seed if none are specified, and save
   them to a JSON file in the pt_state directory (Fixes Tor bug #12605).
2014-08-17 17:11:03 +00:00
Yawning Angel
8a3eb4b309 Change the import paths to point to the tp.o repository. 2014-06-25 16:03:18 +00:00