Pluggable Transports 2.0 Specification, Draft 3

59 views
Skip to first unread message

Brandon Wiley

unread,
Oct 11, 2017, 4:17:03 PM10/11/17
to traff...@googlegroups.com
Attached is the third draft of the Pluggable Transport 2.0 Specification. If you have feedback on this draft, please send me your comments by October 31. Thank you!

Changes in this version:
  • Expanded acknowledgements section
  • Removed TransportConn and TransportListener in favor of net.Conn and net.Listener
  • Modified SOCKS authentication method to use IANA-assigned designator
  • Added error response codes for per-connection arguments
Pluggable Transport Specification Version 2, Draft 3.pdf

Vinicius Fortuna [vee-NEE-see.oos]

unread,
Oct 15, 2017, 4:51:30 PM10/15/17
to Brandon Wiley, Network Traffic Obfuscation
You can make the standard a lot stronger by separating what's core from what's PT implementation. The spec conflates some separable concepts which makes it harder to see its core. What's not core can be moved to a separate specification. Furthermore, some of the concepts are doing too much, which results in some attrition such as abusing some SOCKS fields. You can fix that by introducing new concepts to replace the overloaded ones. More details below.

Separate Dispatcher from spec
The Dispatcher is merely a PT Client and Server implementation that calls another implementation. That's a useful tool to plug together implementations in different languages, but it should not be part of the core specification. A lot of the discussion can be moved to a dispatcher user guide.

Need for new concepts
Some "PT"s, are actually only transformations, while others are actually establishing connections. Transports with "implicit targets" (obsf4) and those that need explicit ones (meek) share the same interface. You get attrition by forcing them to be treated the same.

After playing with the concepts, I settled on the following concepts that you may want to map somehow:
  • Stream: a unidirectional flow of data. Streams may be chained, forming a new Stream (Stream + Stream = Stream).
  • Adaptors: wraps Streams to create a new Stream that speaks a different language (Stream + Adaptor = Stream). It pretty much adds a Stream before the inner Stream to convert to the inner language, and a Stream after the inner Stream to convert from the inner language. Adaptors may be chained, forming a new Adaptor (Adaptor + Adaptor = Adaptor).
  • Service Client: gives you a Stream to communicate with a host:port.
  • Service Server: listens for connections on a host:port, and gives you a Stream for each Service Client.
I've illustrated and implemented those concepts here: https://github.com/fortuna/transports (core interfaces). I have a chat server and clients where you can easily change the transport by changing a single line of code. Please take a look.

Notice how those are very low level and simple building blocks. The implementation is minimal. Maybe I'm missing important things (let me know), but I realized you can do a lot with them. 

For example, Service Clients and Servers can be running on any protocol, as long as you address targets by host:port. You can have regular TCP clients, but also a HTTP Connect client or a SOCKS client, both of which will give you a stream given a host:port. It can look something like (simplified):

// This is wherever you choose the transport. Maybe in a config-based factory
client = new HttpConnectServiceClient(proxyHost, proxyPort).withAdaptor(newEncryptedAdaptor(cipher, secret));
...
targetStream = client.connect(targetHost, targetPort)

Notice that none of this require hacks to the underlying HTTPS or SOCKS protocols. You may even nest transports, which seems to be a limitation on the existing spec:

// Uses innerClient to connect to the SOCKS proxy
innerClient = new HttpConnectServiceClient(httpProxyHost, httpProxyPort);
outerClient = new SocksServiceClient(socksProxyHost, socksProxyPort).withServiceClient(innerClient);
...
targetStream = outerClient.connect(targetHost, targetPort)

You can also have things like newAdaptorFromCommand("gzip", "gunzip"), which runs the given command for the forward or reverse streams, and talks via the standard IO of the subprocesses. The command could be any binary that is available, working similarly to the dispatcher.

There's a lot that can be dropped by adopting these simpler concepts. For example, you can drop discussions like where to persist transport state: that's an implementation detail and up to the transport implementer.

Decouple from Tor
The whole dependency on TOR_PT_ environment variables are flags indicating that the spec is too coupled to the implementation.
As I mentioned, that can be moved to the dispatcher implementation. It's probably also possible to add a façade that allows you to not have to use those prefixes.

Decouple Server transport from Client transport
It's useful to be able to implement a client transport without having to implement a server transport (because someone else already implemented it for the server, but it's in another language). Currently the Transport specifies both. It may be a good idea to split that.

Need for better deployability
Figuring out how to integrate PT into the build of an application is one of the biggest hurdles to achieve the goal “Transport users have to do the minimum amount of work to add PT support to code that uses standard networking primitives from the language or platform.”. I'm not sure it belongs in this spec, but it would be great to have standard ways to integrate transport implementations.

I'm happy to discuss more about all of this

Vinicius (Vini) Fortuna

--
You received this message because you are subscribed to the Google Groups "Network Traffic Obfuscation" group.
To unsubscribe from this group and stop receiving emails from it, send an email to traffic-obf+unsubscribe@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Will

unread,
Oct 15, 2017, 9:34:52 PM10/15/17
to Brandon Wiley, Network Traffic Obfuscation
The main thing i've got some reservations about is the proposal in this spec about how to handle UDP connections.

It seems like 3.3.5 doesn't just say that the PT client should be speaking the socks5 standard for proxying/binding UDP (https://tools.ietf.org/html/rfc1928). (Am I mis-reading that?)

In 3.3.5.4 you talk about how to send UDP packets over the TCP transport. Is this a thing we need to standardize, or is it something we're okay with different transports doing differently? In particular, plenty of transports (e.g. webRTC or udp based) have natural chunking already, and don't seem to need to encapsulate UDP traffic with headers into a stream as well.

A couple nits:
* It seems like PT spec 1.0 should be a reference as well as an acknowledgement.
* Agree with Vini that there is a sufficient diversity of apps to prefer not using the TOR_ prefix on environmental variables.

--Will



On Wed, Oct 11, 2017 at 4:16 PM, Brandon Wiley <bra...@blanu.net> wrote:

--
Reply all
Reply to author
Forward
0 new messages