obfuscator.go 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157
  1. /*
  2. * Copyright (c) 2014, Psiphon Inc.
  3. * All rights reserved.
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. */
  19. package psiphon
  20. import (
  21. "bytes"
  22. "crypto/rc4"
  23. "crypto/sha1"
  24. "encoding/binary"
  25. "errors"
  26. )
  27. const (
  28. OBFUSCATE_SEED_LENGTH = 16
  29. OBFUSCATE_KEY_LENGTH = 16
  30. OBFUSCATE_HASH_ITERATIONS = 6000
  31. OBFUSCATE_MAX_PADDING = 8192
  32. OBFUSCATE_MAGIC_VALUE = 0x0BF5CA7E
  33. OBFUSCATE_CLIENT_TO_SERVER_IV = "client_to_server"
  34. OBFUSCATE_SERVER_TO_CLIENT_IV = "server_to_client"
  35. )
  36. // Obfuscator implements the seed message, key derivation, and
  37. // stream ciphers for:
  38. // https://github.com/brl/obfuscated-openssh/blob/master/README.obfuscation
  39. type Obfuscator struct {
  40. seedMessage []byte
  41. clientToServerCipher *rc4.Cipher
  42. serverToClientCipher *rc4.Cipher
  43. }
  44. type ObfuscatorConfig struct {
  45. Keyword string
  46. MaxPadding int
  47. }
  48. // NewObfuscator creates a new Obfuscator, initializes it with
  49. // a seed message, derives client and server keys, and creates
  50. // RC4 stream ciphers to obfuscate data.
  51. func NewObfuscator(config *ObfuscatorConfig) (obfuscator *Obfuscator, err error) {
  52. seed, err := MakeSecureRandomBytes(OBFUSCATE_SEED_LENGTH)
  53. if err != nil {
  54. return nil, ContextError(err)
  55. }
  56. clientToServerKey, err := deriveKey(seed, []byte(config.Keyword), []byte(OBFUSCATE_CLIENT_TO_SERVER_IV))
  57. if err != nil {
  58. return nil, ContextError(err)
  59. }
  60. serverToClientKey, err := deriveKey(seed, []byte(config.Keyword), []byte(OBFUSCATE_SERVER_TO_CLIENT_IV))
  61. if err != nil {
  62. return nil, ContextError(err)
  63. }
  64. clientToServerCipher, err := rc4.NewCipher(clientToServerKey)
  65. if err != nil {
  66. return nil, ContextError(err)
  67. }
  68. serverToClientCipher, err := rc4.NewCipher(serverToClientKey)
  69. if err != nil {
  70. return nil, ContextError(err)
  71. }
  72. maxPadding := OBFUSCATE_MAX_PADDING
  73. if config.MaxPadding > 0 {
  74. maxPadding = config.MaxPadding
  75. }
  76. seedMessage, err := makeSeedMessage(maxPadding, seed, clientToServerCipher)
  77. if err != nil {
  78. return nil, ContextError(err)
  79. }
  80. return &Obfuscator{
  81. seedMessage: seedMessage,
  82. clientToServerCipher: clientToServerCipher,
  83. serverToClientCipher: serverToClientCipher}, nil
  84. }
  85. // ConsumeSeedMessage returns the seed message created in NewObfuscator,
  86. // removing the reference so that it may be garbage collected.
  87. func (obfuscator *Obfuscator) ConsumeSeedMessage() []byte {
  88. seedMessage := obfuscator.seedMessage
  89. obfuscator.seedMessage = nil
  90. return seedMessage
  91. }
  92. // ObfuscateClientToServer applies the client RC4 stream to the bytes in buffer.
  93. func (obfuscator *Obfuscator) ObfuscateClientToServer(buffer []byte) {
  94. obfuscator.clientToServerCipher.XORKeyStream(buffer, buffer)
  95. }
  96. // ObfuscateServerToClient applies the server RC4 stream to the bytes in buffer.
  97. func (obfuscator *Obfuscator) ObfuscateServerToClient(buffer []byte) {
  98. obfuscator.serverToClientCipher.XORKeyStream(buffer, buffer)
  99. }
  100. func deriveKey(seed, keyword, iv []byte) ([]byte, error) {
  101. h := sha1.New()
  102. h.Write(seed)
  103. h.Write(keyword)
  104. h.Write(iv)
  105. digest := h.Sum(nil)
  106. for i := 0; i < OBFUSCATE_HASH_ITERATIONS; i++ {
  107. h.Reset()
  108. h.Write(digest)
  109. digest = h.Sum(nil)
  110. }
  111. if len(digest) < OBFUSCATE_KEY_LENGTH {
  112. return nil, ContextError(errors.New("insufficient bytes for obfuscation key"))
  113. }
  114. return digest[0:OBFUSCATE_KEY_LENGTH], nil
  115. }
  116. func makeSeedMessage(maxPadding int, seed []byte, clientToServerCipher *rc4.Cipher) ([]byte, error) {
  117. // paddingLength is integer in range [0, maxPadding]
  118. paddingLength, err := MakeSecureRandomInt(maxPadding + 1)
  119. if err != nil {
  120. return nil, ContextError(err)
  121. }
  122. padding, err := MakeSecureRandomBytes(paddingLength)
  123. if err != nil {
  124. return nil, ContextError(err)
  125. }
  126. buffer := new(bytes.Buffer)
  127. err = binary.Write(buffer, binary.BigEndian, seed)
  128. if err != nil {
  129. return nil, ContextError(err)
  130. }
  131. err = binary.Write(buffer, binary.BigEndian, uint32(OBFUSCATE_MAGIC_VALUE))
  132. if err != nil {
  133. return nil, ContextError(err)
  134. }
  135. err = binary.Write(buffer, binary.BigEndian, uint32(paddingLength))
  136. if err != nil {
  137. return nil, ContextError(err)
  138. }
  139. err = binary.Write(buffer, binary.BigEndian, padding)
  140. if err != nil {
  141. return nil, ContextError(err)
  142. }
  143. seedMessage := buffer.Bytes()
  144. clientToServerCipher.XORKeyStream(seedMessage[len(seed):], seedMessage[len(seed):])
  145. return seedMessage, nil
  146. }