Skip to content

Latest commit

 

History

History
138 lines (100 loc) · 6.05 KB

README.md

File metadata and controls

138 lines (100 loc) · 6.05 KB

Building

Background Info

The original obfs4 from Yawning was not meant to be standalone/unmanaged, as it was supposed to be a pluggable transport for Tor. This TunnelBear fork makes obfs4 standalone and buildable for Android/Windows/Mac.

Prerequisites

  • Have Golang 1.13+ installed on your computer.
  • Be using Bash, the script will not work using Fish or another Shell.
  • Wireshark for testing (optional).

Building for Android

Building Steps

  1. Make sure ./obfs4proxy/android_build.sh is executable
  2. Download Android NDK r16b (here), place it in $HOME/Library/Android/sdk/ndk-bundle.
  3. Prepare the Android project that will make use of obfs4, with minSdkVersion 16. Note the directory of this project.
    • If your minSdkVersion is different than that, you will need to change the ndk_platform in ./obfs4proxy/android_build.sh to match it.
    • android_build.sh builds for the following targets: (386 amd64 armv5 armv7 arm64). You will need to manually add/remove targets depending on your needs.
  4. Navigate to ./obfs-android/obfs4proxy in Terminal and run ./android_build.sh [-s <PATH_TO_PROJECT_SRC>] [-n <PATH_TO_NDK_R16>] [-h].
    • The -s flag is the path to Android project described in the prerequisites above. It is optional, without it the binaries will not be copied over to the Android project and remain in the ./out/ directory.
    • The -n flag is the path to the NDK r16b described in step 1 above. It is optional, without it the default $HOME/Library/Android/sdk/ndk-bundle path will be used.
    • The -h flag has no parameters. It is optional and simply displays the help text.
  5. When completed successfully, if an Android project source was provided, the binaries can be found in $PROJECT_SRC/libs/${suffix}/libexecpieproxy.so otherwise they can be found in ./out/.

Testing Steps

  1. Using the following command, start an emulator and have it write traffic to a .cap file:
    • ~/Library/Android/sdk/emulator/emulator @emulator_name -verbose -tcpdump filename.cap
    • E.g. emulator @DEVICE_NAME -verbose -tcpdump ghostbear-on.cap
  2. Open the Android app, turn on obfs4 obfuscation, connect to VPN, and get some internet traffic going.
  3. Open the .cap file in Wireshark
    • Obfs4 obfuscation OFF: Protocol type will show as OpenVpn.
    • Obfs4 obfuscation ON: Protocol type will show as UDP or TCP.

TODO

  • Have the android_build.sh script accept two additional flags, -m for minSdkVersion and -t for architectures you want to target. This will minimize the need to make changes to android_build.sh itself.

Building for macOS

Building Steps

  1. Ensure XCode is up to date.
  2. In the root directory run go build -o path/to/output/location/ghostbear ./obfs4proxy

obfs4 - The obfourscator

Yawning Angel (yawning at schwanenlied dot me)

What?

This is a look-like nothing obfuscation protocol that incorporates ideas and concepts from Philipp Winter's ScrambleSuit protocol. The obfs naming was chosen primarily because it was shorter, in terms of protocol ancestery obfs4 is much closer to ScrambleSuit than obfs2/obfs3.

The notable differences between ScrambleSuit and obfs4:

  • The handshake always does a full key exchange (no such thing as a Session Ticket Handshake).
  • The handshake uses the Tor Project's ntor handshake with public keys obfuscated via the Elligator 2 mapping.
  • The link layer encryption uses NaCl secret boxes (Poly1305/XSalsa20).

As an added bonus, obfs4proxy also supports acting as an obfs2/3 client and bridge to ease the transition to the new protocol.

Why not extend ScrambleSuit?

It's my protocol and I'll obfuscate if I want to.

Since a lot of the changes are to the handshaking process, it didn't make sense to extend ScrambleSuit as writing a server implementation that supported both handshake variants without being obscenely slow is non-trivial.

Dependencies

Build time library dependencies are handled by the Go module automatically.

If you are on Go versions earlier than 1.11, you might need to run go get -d ./... to download all the dependencies. Note however, that modules always use the same dependency versions, while go get -d always downloads master.

  • Go 1.11.0 or later. Patches to support up to 2 prior major releases will be accepted if they are not overly intrusive and well written.
  • See go.mod, go.sum and go list -m -u all for build time dependencies.

Installation

To build:

`go build -o obfs4proxy/obfs4proxy ./obfs4proxy`

To install, copy ./obfs4proxy/obfsproxy to a permanent location (Eg: /usr/local/bin)

Client side torrc configuration:

ClientTransportPlugin obfs4 exec /usr/local/bin/obfs4proxy

Bridge side torrc configuration:

# Act as a bridge relay.
BridgeRelay 1

# Enable the Extended ORPort
ExtORPort auto

# Use obfs4proxy to provide the obfs4 protocol.
ServerTransportPlugin obfs4 exec /usr/local/bin/obfs4proxy

# (Optional) Listen on the specified address/port for obfs4 connections as
# opposed to picking a port automatically.
#ServerTransportListenAddr obfs4 0.0.0.0:443

Tips and tricks

  • On modern Linux systems it is possible to have obfs4proxy bind to reserved ports (<=1024) even when not running as root by granting the CAP_NET_BIND_SERVICE capability with setcap:

    # setcap 'cap_net_bind_service=+ep' /usr/local/bin/obfs4proxy

  • obfs4proxy can also act as an obfs2 and obfs3 client or server. Adjust the ClientTransportPlugin and ServerTransportPlugin lines in the torrc as appropriate.

  • obfs4proxy can also act as a ScrambleSuit client. Adjust the ClientTransportPlugin line in the torrc as appropriate.

  • The autogenerated obfs4 bridge parameters are placed in DataDir/pt_state/obfs4_state.json. To ease deployment, the client side bridge line is written to DataDir/pt_state/obfs4_bridgeline.txt.

Thanks

  • David Fifield for goptlib.
  • Adam Langley for his Elligator implementation.
  • Philipp Winter for the ScrambleSuit protocol which provided much of the design.