mirror of
https://github.com/SagerNet/sing-box.git
synced 2025-07-25 07:24:07 +08:00
Remove dependency on circl
This commit is contained in:
parent
cba364204a
commit
0f2035149c
@ -1,14 +1,11 @@
|
|||||||
package tls
|
package tls
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
"crypto/ecdh"
|
||||||
"encoding/binary"
|
"crypto/rand"
|
||||||
"encoding/pem"
|
"encoding/pem"
|
||||||
|
|
||||||
E "github.com/sagernet/sing/common/exceptions"
|
"golang.org/x/crypto/cryptobyte"
|
||||||
|
|
||||||
"github.com/cloudflare/circl/hpke"
|
|
||||||
"github.com/cloudflare/circl/kem"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type ECHCapableConfig interface {
|
type ECHCapableConfig interface {
|
||||||
@ -17,145 +14,68 @@ type ECHCapableConfig interface {
|
|||||||
SetECHConfigList([]byte)
|
SetECHConfigList([]byte)
|
||||||
}
|
}
|
||||||
|
|
||||||
func ECHKeygenDefault(serverName string) (configPem string, keyPem string, err error) {
|
func ECHKeygenDefault(publicName string) (configPem string, keyPem string, err error) {
|
||||||
cipherSuites := []echCipherSuite{
|
echKey, err := ecdh.X25519().GenerateKey(rand.Reader)
|
||||||
{
|
|
||||||
kdf: hpke.KDF_HKDF_SHA256,
|
|
||||||
aead: hpke.AEAD_AES128GCM,
|
|
||||||
}, {
|
|
||||||
kdf: hpke.KDF_HKDF_SHA256,
|
|
||||||
aead: hpke.AEAD_ChaCha20Poly1305,
|
|
||||||
},
|
|
||||||
}
|
|
||||||
keyConfig := []myECHKeyConfig{
|
|
||||||
{id: 0, kem: hpke.KEM_X25519_HKDF_SHA256},
|
|
||||||
}
|
|
||||||
|
|
||||||
keyPairs, err := echKeygen(0xfe0d, serverName, keyConfig, cipherSuites)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
echConfig, err := marshalECHConfig(0, echKey.PublicKey().Bytes(), publicName, 0)
|
||||||
var configBuffer bytes.Buffer
|
if err != nil {
|
||||||
var totalLen uint16
|
return
|
||||||
for _, keyPair := range keyPairs {
|
|
||||||
totalLen += uint16(len(keyPair.rawConf))
|
|
||||||
}
|
}
|
||||||
binary.Write(&configBuffer, binary.BigEndian, totalLen)
|
configBuilder := cryptobyte.NewBuilder(nil)
|
||||||
for _, keyPair := range keyPairs {
|
configBuilder.AddUint16LengthPrefixed(func(builder *cryptobyte.Builder) {
|
||||||
configBuffer.Write(keyPair.rawConf)
|
builder.AddBytes(echConfig)
|
||||||
|
})
|
||||||
|
configBytes, err := configBuilder.Bytes()
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
}
|
}
|
||||||
|
keyBuilder := cryptobyte.NewBuilder(nil)
|
||||||
var keyBuffer bytes.Buffer
|
keyBuilder.AddUint16LengthPrefixed(func(builder *cryptobyte.Builder) {
|
||||||
for _, keyPair := range keyPairs {
|
builder.AddBytes(echKey.Bytes())
|
||||||
keyBuffer.Write(keyPair.rawKey)
|
})
|
||||||
|
keyBuilder.AddUint16LengthPrefixed(func(builder *cryptobyte.Builder) {
|
||||||
|
builder.AddBytes(echConfig)
|
||||||
|
})
|
||||||
|
keyBytes, err := keyBuilder.Bytes()
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
}
|
}
|
||||||
|
configPem = string(pem.EncodeToMemory(&pem.Block{Type: "ECH CONFIGS", Bytes: configBytes}))
|
||||||
configPem = string(pem.EncodeToMemory(&pem.Block{Type: "ECH CONFIGS", Bytes: configBuffer.Bytes()}))
|
keyPem = string(pem.EncodeToMemory(&pem.Block{Type: "ECH KEYS", Bytes: keyBytes}))
|
||||||
keyPem = string(pem.EncodeToMemory(&pem.Block{Type: "ECH KEYS", Bytes: keyBuffer.Bytes()}))
|
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
type echKeyConfigPair struct {
|
func marshalECHConfig(id uint8, pubKey []byte, publicName string, maxNameLen uint8) ([]byte, error) {
|
||||||
id uint8
|
const extensionEncryptedClientHello = 0xfe0d
|
||||||
rawKey []byte
|
const DHKEM_X25519_HKDF_SHA256 = 0x0020
|
||||||
conf myECHKeyConfig
|
const KDF_HKDF_SHA256 = 0x0001
|
||||||
rawConf []byte
|
builder := cryptobyte.NewBuilder(nil)
|
||||||
}
|
builder.AddUint16(extensionEncryptedClientHello)
|
||||||
|
builder.AddUint16LengthPrefixed(func(builder *cryptobyte.Builder) {
|
||||||
|
builder.AddUint8(id)
|
||||||
|
|
||||||
type echCipherSuite struct {
|
builder.AddUint16(DHKEM_X25519_HKDF_SHA256) // The only DHKEM we support
|
||||||
kdf hpke.KDF
|
builder.AddUint16LengthPrefixed(func(builder *cryptobyte.Builder) {
|
||||||
aead hpke.AEAD
|
builder.AddBytes(pubKey)
|
||||||
}
|
})
|
||||||
|
builder.AddUint16LengthPrefixed(func(builder *cryptobyte.Builder) {
|
||||||
type myECHKeyConfig struct {
|
const (
|
||||||
id uint8
|
AEAD_AES_128_GCM = 0x0001
|
||||||
kem hpke.KEM
|
AEAD_AES_256_GCM = 0x0002
|
||||||
seed []byte
|
AEAD_ChaCha20Poly1305 = 0x0003
|
||||||
}
|
)
|
||||||
|
for _, aeadID := range []uint16{AEAD_AES_128_GCM, AEAD_AES_256_GCM, AEAD_ChaCha20Poly1305} {
|
||||||
func echKeygen(version uint16, serverName string, conf []myECHKeyConfig, suite []echCipherSuite) ([]echKeyConfigPair, error) {
|
builder.AddUint16(KDF_HKDF_SHA256) // The only KDF we support
|
||||||
be := binary.BigEndian
|
builder.AddUint16(aeadID)
|
||||||
// prepare for future update
|
|
||||||
if version != 0xfe0d {
|
|
||||||
return nil, E.New("unsupported ECH version", version)
|
|
||||||
}
|
|
||||||
|
|
||||||
suiteBuf := make([]byte, 0, len(suite)*4+2)
|
|
||||||
suiteBuf = be.AppendUint16(suiteBuf, uint16(len(suite))*4)
|
|
||||||
for _, s := range suite {
|
|
||||||
if !s.kdf.IsValid() || !s.aead.IsValid() {
|
|
||||||
return nil, E.New("invalid HPKE cipher suite")
|
|
||||||
}
|
|
||||||
suiteBuf = be.AppendUint16(suiteBuf, uint16(s.kdf))
|
|
||||||
suiteBuf = be.AppendUint16(suiteBuf, uint16(s.aead))
|
|
||||||
}
|
|
||||||
|
|
||||||
pairs := []echKeyConfigPair{}
|
|
||||||
for _, c := range conf {
|
|
||||||
pair := echKeyConfigPair{}
|
|
||||||
pair.id = c.id
|
|
||||||
pair.conf = c
|
|
||||||
|
|
||||||
if !c.kem.IsValid() {
|
|
||||||
return nil, E.New("invalid HPKE KEM")
|
|
||||||
}
|
|
||||||
|
|
||||||
kpGenerator := c.kem.Scheme().GenerateKeyPair
|
|
||||||
if len(c.seed) > 0 {
|
|
||||||
kpGenerator = func() (kem.PublicKey, kem.PrivateKey, error) {
|
|
||||||
pub, sec := c.kem.Scheme().DeriveKeyPair(c.seed)
|
|
||||||
return pub, sec, nil
|
|
||||||
}
|
}
|
||||||
if len(c.seed) < c.kem.Scheme().PrivateKeySize() {
|
})
|
||||||
return nil, E.New("HPKE KEM seed too short")
|
builder.AddUint8(maxNameLen)
|
||||||
}
|
builder.AddUint8LengthPrefixed(func(builder *cryptobyte.Builder) {
|
||||||
}
|
builder.AddBytes([]byte(publicName))
|
||||||
|
})
|
||||||
pub, sec, err := kpGenerator()
|
builder.AddUint16(0) // extensions
|
||||||
if err != nil {
|
})
|
||||||
return nil, E.Cause(err, "generate ECH config key pair")
|
return builder.Bytes()
|
||||||
}
|
|
||||||
b := []byte{}
|
|
||||||
b = be.AppendUint16(b, version)
|
|
||||||
b = be.AppendUint16(b, 0) // length field
|
|
||||||
// contents
|
|
||||||
// key config
|
|
||||||
b = append(b, c.id)
|
|
||||||
b = be.AppendUint16(b, uint16(c.kem))
|
|
||||||
pubBuf, err := pub.MarshalBinary()
|
|
||||||
if err != nil {
|
|
||||||
return nil, E.Cause(err, "serialize ECH public key")
|
|
||||||
}
|
|
||||||
b = be.AppendUint16(b, uint16(len(pubBuf)))
|
|
||||||
b = append(b, pubBuf...)
|
|
||||||
|
|
||||||
b = append(b, suiteBuf...)
|
|
||||||
// end key config
|
|
||||||
// max name len, not supported
|
|
||||||
b = append(b, 0)
|
|
||||||
// server name
|
|
||||||
b = append(b, byte(len(serverName)))
|
|
||||||
b = append(b, []byte(serverName)...)
|
|
||||||
// extensions, not supported
|
|
||||||
b = be.AppendUint16(b, 0)
|
|
||||||
|
|
||||||
be.PutUint16(b[2:], uint16(len(b)-4))
|
|
||||||
|
|
||||||
pair.rawConf = b
|
|
||||||
|
|
||||||
secBuf, err := sec.MarshalBinary()
|
|
||||||
if err != nil {
|
|
||||||
return nil, E.Cause(err, "serialize ECH private key")
|
|
||||||
}
|
|
||||||
sk := []byte{}
|
|
||||||
sk = be.AppendUint16(sk, uint16(len(secBuf)))
|
|
||||||
sk = append(sk, secBuf...)
|
|
||||||
sk = be.AppendUint16(sk, uint16(len(b)))
|
|
||||||
sk = append(sk, b...)
|
|
||||||
pair.rawKey = sk
|
|
||||||
|
|
||||||
pairs = append(pairs, pair)
|
|
||||||
}
|
|
||||||
return pairs, nil
|
|
||||||
}
|
}
|
||||||
|
1
go.mod
1
go.mod
@ -5,7 +5,6 @@ go 1.23.1
|
|||||||
require (
|
require (
|
||||||
github.com/anytls/sing-anytls v0.0.8
|
github.com/anytls/sing-anytls v0.0.8
|
||||||
github.com/caddyserver/certmagic v0.23.0
|
github.com/caddyserver/certmagic v0.23.0
|
||||||
github.com/cloudflare/circl v1.6.1
|
|
||||||
github.com/coder/websocket v1.8.13
|
github.com/coder/websocket v1.8.13
|
||||||
github.com/cretz/bine v0.2.0
|
github.com/cretz/bine v0.2.0
|
||||||
github.com/go-chi/chi/v5 v5.2.2
|
github.com/go-chi/chi/v5 v5.2.2
|
||||||
|
2
go.sum
2
go.sum
@ -20,8 +20,6 @@ github.com/cenkalti/backoff/v4 v4.3.0 h1:MyRJ/UdXutAwSAT+s3wNd7MfTIcy71VQueUuFK3
|
|||||||
github.com/cenkalti/backoff/v4 v4.3.0/go.mod h1:Y3VNntkOUPxTVeUxJ/G5vcM//AlwfmyYozVcomhLiZE=
|
github.com/cenkalti/backoff/v4 v4.3.0/go.mod h1:Y3VNntkOUPxTVeUxJ/G5vcM//AlwfmyYozVcomhLiZE=
|
||||||
github.com/cilium/ebpf v0.15.0 h1:7NxJhNiBT3NG8pZJ3c+yfrVdHY8ScgKD27sScgjLMMk=
|
github.com/cilium/ebpf v0.15.0 h1:7NxJhNiBT3NG8pZJ3c+yfrVdHY8ScgKD27sScgjLMMk=
|
||||||
github.com/cilium/ebpf v0.15.0/go.mod h1:DHp1WyrLeiBh19Cf/tfiSMhqheEiK8fXFZ4No0P1Hso=
|
github.com/cilium/ebpf v0.15.0/go.mod h1:DHp1WyrLeiBh19Cf/tfiSMhqheEiK8fXFZ4No0P1Hso=
|
||||||
github.com/cloudflare/circl v1.6.1 h1:zqIqSPIndyBh1bjLVVDHMPpVKqp8Su/V+6MeDzzQBQ0=
|
|
||||||
github.com/cloudflare/circl v1.6.1/go.mod h1:uddAzsPgqdMAYatqJ0lsjX1oECcQLIlRpzZh3pJrofs=
|
|
||||||
github.com/coder/websocket v1.8.13 h1:f3QZdXy7uGVz+4uCJy2nTZyM0yTBj8yANEHhqlXZ9FE=
|
github.com/coder/websocket v1.8.13 h1:f3QZdXy7uGVz+4uCJy2nTZyM0yTBj8yANEHhqlXZ9FE=
|
||||||
github.com/coder/websocket v1.8.13/go.mod h1:LNVeNrXQZfe5qhS9ALED3uA+l5pPqvwXg3CKoDBB2gs=
|
github.com/coder/websocket v1.8.13/go.mod h1:LNVeNrXQZfe5qhS9ALED3uA+l5pPqvwXg3CKoDBB2gs=
|
||||||
github.com/coreos/go-iptables v0.7.1-0.20240112124308-65c67c9f46e6 h1:8h5+bWd7R6AYUslN6c6iuZWTKsKxUFDlpnmilO6R2n0=
|
github.com/coreos/go-iptables v0.7.1-0.20240112124308-65c67c9f46e6 h1:8h5+bWd7R6AYUslN6c6iuZWTKsKxUFDlpnmilO6R2n0=
|
||||||
|
Loading…
x
Reference in New Issue
Block a user