1. 04 Sep, 2022 5 commits
  2. 04 Feb, 2022 1 commit
  3. 03 Feb, 2022 1 commit
    • Yawning Angel's avatar
      transports/meek_lite: Remove utls support · 83f01d5a
      Yawning Angel authored
      While this was a good idea back when I did it:
      
       * People don't like the fact that it requires a fork of utls to fix
         compatibility issues, and would rather spend 3 years complaining
         about it instead of spending a weekend to fix the issues in
         upstream.
      
       * Tor over meek is trivially identifiable regardless of utls or not.
      
       * Malware asshats ruined domain fronting for everybody.
      83f01d5a
  4. 27 Jan, 2022 1 commit
  5. 02 Jan, 2022 1 commit
  6. 01 Jan, 2022 1 commit
  7. 31 Dec, 2021 3 commits
    • Yawning Angel's avatar
    • Yawning Angel's avatar
      a564bc38
    • Yawning Angel's avatar
      internal/x25519ell2: Initial import · 393aca86
      Yawning Angel authored
      Replace agl's Elligator2 implementation with a different one, that fixes
      the various distinguishers stemming from bugs in the original
      implementation and "The Elligator paper is extremely hard to read".
      
      All releases prior to this commit are trivially distinguishable with
      simple math, so upgrading is strongly recommended.  The upgrade is fully
      backward-compatible with existing implementations, however the
      non-upgraded side will emit traffic that is trivially distinguishable
      from random.
      
      Special thanks to Loup Vaillant for his body of work on this primitive,
      and for motivating me to fix it.
      393aca86
  8. 11 May, 2021 1 commit
  9. 17 Dec, 2020 1 commit
  10. 07 Dec, 2020 1 commit
  11. 10 Apr, 2020 1 commit
  12. 21 Jun, 2019 4 commits
  13. 20 May, 2019 2 commits
  14. 12 Apr, 2019 1 commit
  15. 30 Mar, 2019 1 commit
  16. 18 Mar, 2019 1 commit
  17. 05 Feb, 2019 4 commits
  18. 04 Feb, 2019 4 commits
  19. 03 Feb, 2019 1 commit
    • Yawning Angel's avatar
      transports/meeklite: Use a modified version of utls · bde8b7ff
      Yawning Angel authored
      Changes:
       * Use a fork of utls with some compatibility improvements.
       * Switch the default ClientHello profile to `HelloFirefox_Auto`.
       * Add the `HelloChrome_71` profile.
      
      The existing `HelloFirefox_Auto` profile that points to
      `HelloFirefox_63` also matches the (common) behavior of Firefox 65,
      assuming that 3DES ciphersuites are not disabled.
      bde8b7ff
  20. 01 Feb, 2019 2 commits
  21. 26 Jan, 2019 1 commit
  22. 21 Jan, 2019 2 commits
    • Yawning Angel's avatar
      transports/meeklite: Add `utls` argument to configure behavior · e4020b18
      Yawning Angel authored
      Per dcf:
      > As for the TODO, my plan was was to expose a "utls" SOCKS arg
      > to make it configurable per bridge, and just reuse the utls
      > Client Hello ID names:
      >	utls=HelloChrome_Auto
      
      This adds support for all currently supported utls ClientHello IDs
      with the following caveats/differences:
      
       * `none` - Disables using utls entirely, forces `crypto/tls`.
       * `HelloGolang` - Alias of `none`, since using utls is pointless.
       * `HelloCustom` - Omitted as pointless.
      e4020b18
    • Yawning Angel's avatar
      transports/meeklite: uTLS for ClientHello camouflage · 4d453dab
      Yawning Angel authored
      There's still some interesting oddities depending on remote server and
      what fingerprint is chosen, but I can watch videos online with the
      chosen settings and the TBB Azure bridge.
      
      Note: Despite what people are claiming in the Tor Browser bug tracker
      it isn't all that hard to use the built in http client with utls.  And
      yes, the `transport.go` code does negotiate correctly in a standalone
      test case (apart from compatibility related oddities).
      4d453dab