Skip to content

A covert, encrypted and compressed, socket stream that is encoded on top of plaintext HTTP. The plaintext traffic contains an ECDH negotiated key, along with an RC4 cipher stream.

License

Notifications You must be signed in to change notification settings

AlexRuzin/websock

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

websock

A socket-based covert data transfer protocol that uses encrypted data over HTTP, without TLS/SSL, and therefore without the need of any self-signed certificates. The client/server negotiate a key using ECDH, which is paired with a custom RC4 cipher implementation for data transfer.

Due to the nature of the ephemeral key negotiation, it is inferred that a static signature is not possible. This makes websock ideal for discrete and secure communication.

Synopsis

The websock protocol provides an API that is similar to reading or writing to POSIX or WinSock sockets, except a compliant Reader/Writer interface is used.

HTTP is the overlaying protocol from which all data is sent. The client will send a request to the server to construct a circuit. The initial stage requires key negotiation -- in specific Elliptic Curve Diffie-Hellman [https://en.wikipedia.org/wiki/Elliptic-curve_Diffie%E2%80%93Hellman] is uesd. The public keys shared over the wire are serialized, XOR'd with a random key, and base64 encoded. The public key exchanges are done using HTTP POST parameters, which are also randomized.

Once the secret key has been generated using the ECDH key exchange, all data will be transmitted using a custom RC4 implementation [https://github.com/AlexRuzin/cryptog], which makes use of an Initialization Vector (IV), and a hardcoded value that will maintain data integrity.

Development note: Please note that this software is currently under heavy development. Only use for experimental purposes.

Features

  1. By default, the NIST P-384 curve is used to safely and covertly negotiate a key between the controller and atom (client). Any NIST-compliant curve may be used to strengthen the key exchange challenge. The following NIST keys are supported by the built-in crypto/elliptic library: NIST P-224, P-256, P-384, and P-521.
  2. An ephemeral Initialization Vector (IV) was implemented in the cryptog.RC4_* code, so even if the same data is sent, implementing a kind of perfect forward secrecy.
  3. The HTTP implementation uses standard headers, including normal a common User-Agent, and Content-Type, which may be configured.
  4. Key negotiation uses a covert set of key/value pairs in the HTTP POST parameter. The response, as well, is xor-encoded using an ephemeral key.
  5. Simple use of the Reader/Writer interfaces to read/write to the stream.

Example and Testing library

The testing library, located at websock_test.go, reads a JSON configuration file that configures a server or client subsystem. For example, to use the JSON file, if not the default config/config.json we may use:

{
  "Server": false,
  "Verbosity": true,
  "Encryption": true,
  "Compression": true,
  "TestServer": true,
  "TestCircuit": true,

  "Port": 2222,
  "Path": "/websock.php",
  "Domain": "127.0.0.1",

  "ClientTX": true,
  "ClientTXTimeMin": 5000,
  "ClientTXTimeMax": 5000,
  "ClientTXDataMin": 16,
  "ClientTXDataMax": 64,
  "ClientTXDataStatic": true,
  "ClientTxOnce":true,

  "ServerTX": false,
  "ServerTXTimeMin": 500,
  "ServerTXTimeMax": 2000,
  "ServerTXDataMin": 16,
  "ServerTXDataMax": 64,
  "ServerTXDataStatic": true,
  "ServerTxOnce":true,

  "ModuleName": "websock"
}

Each object in the JSON configuration file is self explanatory, use the default configurations located in the /config directory for working samples.

Server API [NetChannelService]

The API consists of the initialization functions along with the methods used to read/write to the streams. NOTE: The FLAG_COMPRESS logic is as of right now implemented, but not fully tested. Please be advised that using FLAG_COMPRESS may be dangerous in already stable code, although its removal should not affect any other subsystem.

Reference of the Server Side Objects

Representation of the Server Object

This object represents the websock server. This object is returned once the service has been initialized using CreateServer(). Please note that the value of NetChannelService.IncomingHandler may be modified at any time, but may cause undesired behaviour.

type NetChannelService struct {
    /* Handler for new clients */
    IncomingHandler func(client *NetInstance, server *NetChannelService) error /* Handler for new clients */

    /* Flags may be modified at any time */
    Flags FlagVal /* Flags may be modified at any time */

    /* Non-exported members */
    [...]
}

Representation of the Client on the Server

Each client is represented by this structure by the server's NetChannelService object.

type NetInstance struct {
    ClientIdString string /* Unique identifier that represents the client connection */

    /* Non-exported members */
    [...]
}

Generic global flags - Use of elliptic curve diffie-hellman and gzip compression

To make use of the key negotiation, the FLAG_ENCRYPT flag must be used when initializing the server. If this flag is not set, the call to create the server will fail, since the basis of this library is a cryptographic stream. However, a plaintext solution will eventually be added in. Once a client logs into the predetermined URI ECDH will automatically be used to negotiate an RC4-key. The FLAG_COMPRESS flag is used to compress the data buffer prior to encryption. The websock API checks for unintended inflation in high-entropy buffers when FLAG_COMPRESS is used. In these cases, FLAG_COMPRESS is ignored for that data stream only, and is determined on a stream by stream basis. The FLAG_DEBUG switch forces the API debug verbosity.

Initialization on the server side

Creating the websock server is simple. It requires a TCP listener port, usually port 80. A gate path is required as well. Any kind of gate path may be used (i.e. /gate.php, /newclient.php, /)

The initialization method will return a service object, NetChannelService, which will transparently contain a vector of all connected clients. A handler method is required that will handle all new client requests, NetChannelService.IncomingHandler. Each new client is represented by the below NetInstance object.

package websock

var ServerInstance *NetChannelService = nil
var err error = nil
ServerInstance, err = websock.CreateServer("/gate.php", /* NOTE: The URI is required to access the gate resources */
                                           80, 
                                           FLAG_ENCRYPT  /* Mandatory */ | 
                                           FLAG_COMPRESS /* Optional -- experimental */ | 
                                           FLAG_DEBUG    /* Optional -- verbosity in debug output */ |
                                           FLAG_PING_SERVER /* Optional -- Check that the server is alive */ |
                                           FLAG_TEST_CIRCUIT /* Recommended -- Check that the client/server stream is alive */,
                                           clientHandlerFunction)
if err != nil {
    panic(err.Error())
}

Handling a Client Request using the Inbound Callback Method

The clientHandlerFunction will handle all new requests. The NetInstance structure will be passed in this structure, which will allow the calling application to read or write to the instance. The below code writes a string to the socket stream of an inbound client.

package websock

func incomingClientHandler(client *NetInstance, server *NetChannelService) error {
    /* 
     * The server has already verified the URI path. If this is a new connection then a 
     *  the NetInstance object is instantiated. Otherwise, an already existing object will 
     *  be referenced.
     */
     
     
    
    return nil
}

Closing the service

Closing the service requires a simple call.

ServerInstance.CloseService()

Closing a client connection

To close a client connection requires an invocation of a method in the NetChannelService object.

ServerInstance.CloseClient(client *NetInstance)

Client I/O from the Server-side

Writing to the stream requires a simple call to the NetInstance.Write() method. This complies with the io.Writer interface.

func (f *NetInstance) Write(p []byte) (wrote int, err error) {
    /* Once all data is written, the success error code will be io.EOF */
    return len(p), io.EOF
}

Reading from the client stream requires a check for data in the stream first, using NetInstance.Len(), followed by a call to NetInstance.Read().

func (f *NetInstance) Len() int {
    /* Return the length, if any */
}  

func (f *NetInstance) Read(p []byte) (read int, err error) {
    /* Once all data is read, the io.EOF code is returned */
    return len(data), io.EOF
}

Client API [NetChannelClient]

Having the client connect requires a call to initialize the client library by calling websock.BuildChannel(), where the target URI is passed, in the form of http://domain.com:7676/handler.php. Several flags may be passed as well, which will be elaborated on further below. Note that the client will not connect to the server at this point. The websock.BuildChannel() method returns a NetChannelClient structure, which will implement the Read/Write functions. Please note that the FLAG_ENCRYPT flag must be set. Additionally, if data compression is required for large, low-entropy streams, then the FLAG_COMPRESS switch may be used for the BuildChannel() flags parameter.

package websock

client, err := BuildChannel(gate_uri, 
                            FLAG_ENCRYPT    /* Required */ | 
                            FLAG_COMMPRESS  /* Optional */ | 
                            FLAG_DEBUG      /* Optional log output verbosity */)
if err != nil || client == nil {
    D(err.Error())
    T("Cannot build net channel")
}

Next, the client must connect to the server by invoking the NetChannelClient.InitializeCircuit() method.

package websock  

if err := client.InitializeCircuit(); err != nil {
    D(err.Error())
    T("Service is not responding")
}

Client I/O

Reading and writing to the client socket requires the use of the Read/Write functions, which implement the standard Reader/Writer interface. The prototypes of these functions, which are members of NetChannelClient, are described below:

Determining the length of the Response Buffer

This method returns the length of the data stored in the socket's receive buffer, if any exists. 0 is returned if no data exists in the buffer. This method does not block the Read/Write interfaces.

/* Returns the length of the read buffer, indicating data was sent from the server to the client */
func (f *NetChannelClient) Len() int

Buffer reads from the Client

Since the websock API does not block to wait for incoming data, the NetChannelClient.Wait() method may be used to wait a duration of time before a response code is returned.

/* The Wait() prototype */
func (f *NetChannelClient) Wait(timeoutMilliseconds time.Duration) (responseLen int, err error)

The below are the possible error statuses returned by Wait().

/* There are three possible error codes returned by Wait(). responseLen being 0 does not equal an error or success */
var (
    /* The input time duration was reached, however the socket is still open */
    WAIT_TIMEOUT_REACHED = util.RetErrStr("timeout reached")
    
    /* Data was stored into the buffer, and Read() may be invoked next */
    WAIT_DATA_RECEIVED = util.RetErrStr("data received")
    
    /* The server has terminated the client connection, and responseLen will be -1 */
    WAIT_CLOSED = util.RetErrStr("socket closed")
)

Reading Data Sent From Server-side

Reading from the socket buffer is done by first calling Len(), i.e. checking that there is indeed a size of >1. A buffer can be allocated and Read() is invoked to deplete the socket buffer. Please note that websock abides by the standard GO Reader/Writer interfaces.

/* Read into p until the buffer is depleted. An io.EOF error will be returned once the buffer is depleted */
func (f *NetChannelClient) Read(p []byte) (read int, err error)

Writing to the Channel

The Write() method is used to write to the socket stream, which also follows a basic Writer interface. The method returns an io.EOF p is depleted and the data has been queued for transmission over the socket stream.

func (f *NetChannelClient) Write(p []byte) (written int, err error)

Protocol Configuration

All configuration to the protocol is done by editing the protocol_config.go file, which will contain instructions on each configurable variable.

Testing websock Using the Testing Package

The websock_test.go, which uses golang's default Testing package, makes use of the config.json file to send test data between the client and server. Thorough description of config.json is included in this README and the websock_test.go file.

// config.json
{
  // true -> server/listener mode, false -> client/connect mode
  "Server": true,  
  

  // Debug is piped to stdout
  "Verbosity": true,  
  

  // Encryption/compression settings
  "Encryption": true,
  "Compression": true,  
  

  // Connectivity settings for both client and server
  "Port": 80,
  "Path": "/websock.php",
  "Domain": "127.0.0.1",  
  

  // If set to true the client will transmit data
  "ClientTX": true,  
  

  // Data is transmitted between these intervals (seconds)
  //  i.e every 2 seconds transmit. 
  "ClientTXTimeMin": 2,
  "ClientTXTimeMax": 2,  
  

  // Transmit data in length between the below intervals (bytes)
  //  All data is sent are ASCII capitals between 0x41 - 0x5a
  "ClientTXDataMin": 16,
  "ClientTXDataMax": 64,  
  

  // If this is true, each character will be 'A' 0x41, otherwise
  //  they will be ASCII capitals
  "ClientTXDataStatic": true,  
  
  // Transmit data on the wire only once and then stop
  "ClientTxOnce":true,
  
 
  // If set to true, the server will transmit data to the client.
  //  All other settings below follow the above client convention
  "ServerTX": true,  
  
  "ServerTXTimeMin": 2,
  "ServerTXTimeMax": 2,  
  
  "ServerTXDataMin": 16,
  "ServerTXDataMax": 64,  
  
  "ServerTXDataStatic": true,  
  "ServerTxOnce":true,

  // Do not change this setting
  "ModuleName": "websock"
}

Compilation and Testing

Once the configuration file has been fine tuned, all that is necessary is to compile and execute the test file. If Verbosity is set to true, all debug output will be piped to stdout.

go build
go test

Credits

All design and programming done by AlexRuzin for educational and research purposes. Please distribute with the attached MIT license. Contact, if you have any questions, or fixes, at stan [dot] ruzin [at] gmail [dot] com.

About

A covert, encrypted and compressed, socket stream that is encoded on top of plaintext HTTP. The plaintext traffic contains an ECDH negotiated key, along with an RC4 cipher stream.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published