Commit Graph

9 Commits

Author SHA1 Message Date
Yawning Angel
9bfdd77f72 Add preliminary support for packet length obfuscation.
The same algorithm as ScrambleSuit is used, except:
 * SipHash-2-4 in OFB mode is used to create the distribution.
 * The system CSPRNG is used when sampling the distribution.

This fixes most of #3, all that remains is generating and sending a
persistent distribution on the server side to the client.
2014-05-13 02:31:37 +00:00
Yawning Angel
51a8dd5a86 Fix logging again.
On second thought instead of using log.Panicf(), panic() and do the
logging with recover().  This somewhat centralizes logging in
obfs4proxy, which will be easier to change when I invariably decide to
do logging differently in the future.
2014-05-12 23:04:39 +00:00
Yawning Angel
9712aec73b Preliminary support padding, log on panic.
This adds preliminary support for data padding by adding another layer
of encapsulation inside each AEAD frame containing a type and length.
For now, data is still sent unpadded, but the infrastructure for
supporting it is mostly there.

Additionally, use log.Panic[f]() instead of panic through out the code
so that some panics are logged.
2014-05-12 04:51:06 +00:00
Yawning Angel
8a1f58cd5a Remove support for Write deadlines since it wasn't working.
Write timeouts are obnoxious to handle as the frame encoder state
already is updated to cover the entire payload for the Write() call
that timed out.  In theory it is possible to buffer the pending data,
but that causes Write() to voilate the semantics of the interface.
2014-05-12 02:37:40 +00:00
Yawning Angel
cca49e01a3 Set a timeout on outgoing handshakes as well. 2014-05-12 01:30:21 +00:00
Yawning Angel
9b6b3f825b Reject clients that do not authenticate quickly enough.
The current timeout value before the server fails the handshake is
15 s.  This may need to be increased for clients over slow links.
2014-05-12 01:13:49 +00:00
Yawning Angel
06a95ff1e0 Close connections that fail to authenticate after a while.
Like ScrambleSuit, a random interval between 1x and 5x of additional
data from the peer is read and immediately discarded before closing.

Additionally, obfs4 will close off invalid connections anywhere between
0 and 60 seconds after it determines that the incoming connection will
never complete the handshake successfully.
2014-05-12 00:58:27 +00:00
Yawning Angel
8e14ed44ad Move to a unified client/server binary, and fix bugs.
* The old and the busted: obfs4-[client,server].
 * The new hotness: obfs4client.
 * Add obfs4.ServerHandshake() that servers need to call after a
   successful return from Accept().  This allows implementations to
   move the handshake into a goroutine or whatever.
2014-05-12 00:02:24 +00:00
Yawning Angel
ef38b844f9 Initial import. 2014-05-09 10:23:58 +00:00