![]() |
3 years ago | |
---|---|---|
basket2proxy | 3 years ago | |
crypto | 3 years ago | |
framing | 3 years ago | |
handshake | 3 years ago | |
internal | 3 years ago | |
vendor | 3 years ago | |
.gitignore | 3 years ago | |
CODE_OF_MERIT.md | 3 years ago | |
LICENSE | 3 years ago | |
README.md | 3 years ago | |
client.go | 3 years ago | |
common.go | 3 years ago | |
padding_impl.go | 3 years ago | |
padding_null.go | 3 years ago | |
padding_obfs4.go | 3 years ago | |
padding_tamaraw.go | 3 years ago | |
server.go | 3 years ago | |
version_check.go | 3 years ago | |
version_check_stub.go | 3 years ago |
basket2 is the next transport in the obfs series. It derives inspiration primarily from obfs4 and predecessors, and incorporates ideas initially prototyped in the experimental basket transport.
Features:
Dependencies:
The more obsucre dependencies are included using the Go 1.6 vendor
scheme,
and are managed via git-subtree
. Certain larger dependencies likely to be
already packaged are not included (as opposed to vendor
-ing everything).
basket2proxy
.basket2proxy
.Notes:
I am waiving the remote network interaction requirements specified in Section 13 ("Remote Network Interaction; Use with the GNU General Public License") of the AGPL, per the terms of Section 7 ("Additional Terms"), for users that:
Are using the software exclusively to operate a publically accessible Bridge to provide access to the public Tor network as a Tor Pluggable Transport server. This means:
The Bridge publishes a descriptor to the Bridge Authority, and is available via BridgeDB OR is a default Bridge pre-configured and distributed with Tor Browser, and uses basket2 as a server side Pluggable Transport for said Bridge.
All other users MUST comply with the AGPL in it's entirety as a general rule, though other licensing arrangements may be possible on request. I will likely be fairly liberal here, so please contact me if the current licensing is unsuitable for your use case.
All bundled external dependencies have different (more permissive) licenses that should be followed as appropriate.
The post-quantum cryptography does not apply to active attackers in posession of a quantum computer, and only will protect pre-existing data from later decryption.
If your system has busted PMTUD, this probably won't work at all. Not my problem. Complain to your OS vendor.
This could have been based on Trevor Perin's noise protocol framework, with a decent amount of work and extensions, but certain properties and behavior I need aren't formally specified yet. This is something I will strongly consider if/when I design basket3.