noisy-shuttle
noisy-shuttle establishes an AEAD-encrypted secure tunnel with forward secrecy for circumventing Internet censorship. It is designed to be indistinguishable from TLS traffic with any chosen website for camouflage by copying authentic TLS handshake messages.
A shuttle server authenticates clients based on tokens piggybacked by some fields of TLS ClientHello and falling back to dumb relay when authentication failed, preventing active probing.
It is inspired by the brilliant idea of shadow-tls and built upon snow (the Rust implementation of Noise protocol).
Features
-
Eavesdropper-verifiable authentic TLS handshakes with any chosen camouflage website, requiring no certificates
- Basically indistinguishable from legit TLS traffic
-
PSK-based covert authentication piggybacked by TLS client random and session id field
- Immune to active probes by falling back to dumb relay between a malicious client and the camouflage website
-
AEAD encrypted traffic with forward secrecy via ECDHE
- Never worry about the traffic being recorded by the big brother for long
-
Customizable TLS client fingerprints specified via Cli option
- Replicate any fingerprints listed in https://tlsfingerprint.io exactly
Handshaking procedures
- shuttle client contrives a legit TLS ClientHello and sends it to shuttle server. Unlike in a typical TLS handshake, the client random and session id field of the ClientHello totaling 64 bytes, which should have been randomly generated, are filled with an ephemeral X25519 public key and an AEAD tag as a part of the Noise NNPsk0 handshake. And then it proceeds to perform real TLS handshakes with the special ClientHello as typical.
- When shuttle server received a ClientHello, it tries to pull the public key and the AEAD tag from the ClientHello and authenticate them with Noise against a pre-shared key. shuttle server then forwards the ClientHello to a camouflage website and relays subsequent TLS handshake messages between shuttle client and the camouflage server until TLS handshaking is done.
- If the client is successfully authenticated previously, shuttle server sends back a corresponding public key and an AEAD tag as a part of the Noise NNPsk0 handshake and transmutes the connection into a Noise-encrypted tunnelโotherwise, shuttle server keeping relaying traffic dumbly between the unidentified client and the camouflage server.
- After finishing TLS handshakes, shuttle client pulls the public key and the AEAD tag replied by shuttle server from the connection. Till now, an ECDHE key exchange is done between shuttle client and shuttle server. Then shuttle client also transmutes the connection into a Noise-encrypted tunnel. From the point of view of an eavesdropper, the whole procedure is authentic and verifiable TLS handshakes between shuttle client and a camouflage website.
Cli
Server:
# server listen_addr camouflage_addr password
./noisy-shuttle server 0.0.0.0:443 www.example.com:443 Teap0taa -v
camouflage_addr
is to where TLS handshaking requests from clients are forwarded and from where responses are forwarded backed to clients.
Typically, it should be a well-known website that looks "innocent". Its port CANNOT be omitted.
Client:
# client listen_addr remote_addr sni password
./noisy-shuttle client 127.0.0.1:1080 server.addr.example:443 www.example.com Teap0taa -v
The client would serve a SOCKS5/HTTP (adaptive) proxy at listen_addr
.
remote_addr
is where the shuttle server is located.
sni
should match camouflage_addr
specified server-side.
Or optionally specifying a TLS fingerprint (chrome):
./noisy-shuttle client 127.0.0.1:1080 server.addr.example:443 www.example.com Teap0taa --tls-ja3 769,2570-4865-4866-4867-49195-49199-49196-49200-52393-52392-49171-49172-156-157-47-53,2570-0-23-65281-10-11-35-16-5-13-18-51-45-43-27-17513-2570-21,2570-29-23-24,0 --tls-alpn h2,http/1.1 --tls-sigalgos 1027,2052,1025,1283,2053,1281,2054,1537 --tls-versions 2570,772,771 --tls-keyshare 2570
TODO
- connection multiplex or connection reuse?
- Embed
e, ee
into server-side CCS in TLS 1.2 - Handle TLS1.3 response from camouflage server properly
- Elligator for public key
- Utilize Keyshare?
- Specify TLS fingerprint (JA3)
- TLS GREASE
- Configurable actions for unauthenticated client
- Random packet padding and even packets