mirror of
https://github.com/LonamiWebs/Telethon.git
synced 2025-06-05 22:23:15 +03:00
Implement and use TCP obfuscated as a PoC (#112)
Credits to MadelineProto/Connection.php by @danog
This commit is contained in:
parent
adfebfc82c
commit
5404670469
|
@ -1,4 +1,5 @@
|
||||||
from .aes import AES
|
from .aes import AES
|
||||||
|
from .aes_ctr import AESModeCTR
|
||||||
from .auth_key import AuthKey
|
from .auth_key import AuthKey
|
||||||
from .factorization import Factorization
|
from .factorization import Factorization
|
||||||
from .cdn_decrypter import CdnDecrypter
|
from .cdn_decrypter import CdnDecrypter
|
||||||
|
|
29
telethon/crypto/aes_ctr.py
Normal file
29
telethon/crypto/aes_ctr.py
Normal file
|
@ -0,0 +1,29 @@
|
||||||
|
import pyaes
|
||||||
|
|
||||||
|
|
||||||
|
class AESModeCTR:
|
||||||
|
"""Wrapper around pyaes.AESModeOfOperationCTR mode with custom IV"""
|
||||||
|
# TODO Maybe make a pull request to pyaes to support iv on CTR
|
||||||
|
|
||||||
|
def __init__(self, key, iv):
|
||||||
|
# TODO Use libssl if available
|
||||||
|
assert isinstance(key, bytes)
|
||||||
|
self._aes = pyaes.AESModeOfOperationCTR(key)
|
||||||
|
|
||||||
|
assert isinstance(iv, bytes)
|
||||||
|
assert len(iv) == 16
|
||||||
|
self.iv = iv
|
||||||
|
self._aes._counter._counter = list(self.iv)
|
||||||
|
|
||||||
|
def reset(self):
|
||||||
|
pass
|
||||||
|
|
||||||
|
def encrypt(self, data):
|
||||||
|
result = self._aes.encrypt(data)
|
||||||
|
self.reset()
|
||||||
|
return result
|
||||||
|
|
||||||
|
def decrypt(self, data):
|
||||||
|
result = self._aes.decrypt(data)
|
||||||
|
self.reset()
|
||||||
|
return result
|
|
@ -7,3 +7,4 @@ strings, bytes, etc.)
|
||||||
from .binary_writer import BinaryWriter
|
from .binary_writer import BinaryWriter
|
||||||
from .binary_reader import BinaryReader
|
from .binary_reader import BinaryReader
|
||||||
from .tcp_client import TcpClient
|
from .tcp_client import TcpClient
|
||||||
|
from .tcp_client_obfuscated import TcpClientObfuscated
|
||||||
|
|
171
telethon/extensions/tcp_client_obfuscated.py
Normal file
171
telethon/extensions/tcp_client_obfuscated.py
Normal file
|
@ -0,0 +1,171 @@
|
||||||
|
# Python rough implementation of a C# TCP client
|
||||||
|
import socket
|
||||||
|
import time
|
||||||
|
import os
|
||||||
|
from datetime import datetime, timedelta
|
||||||
|
from io import BytesIO, BufferedWriter
|
||||||
|
from threading import Event, Lock
|
||||||
|
import errno
|
||||||
|
|
||||||
|
from ..crypto import AESModeCTR
|
||||||
|
from ..errors import ReadCancelledError
|
||||||
|
|
||||||
|
|
||||||
|
# Obfuscated messages secrets cannot start with any of these
|
||||||
|
OBFUSCATED_ANTI_KEYWORDS = (b'PVrG', b'GET ', b'POST', b'\xee' * 4)
|
||||||
|
|
||||||
|
|
||||||
|
class TcpClientObfuscated:
|
||||||
|
# TODO Avoid duplicating so much code - transport for TCPO
|
||||||
|
|
||||||
|
def __init__(self, proxy=None):
|
||||||
|
self.connected = False
|
||||||
|
self._proxy = proxy
|
||||||
|
self._recreate_socket()
|
||||||
|
|
||||||
|
# Support for multi-threading advantages and safety
|
||||||
|
self.cancelled = Event() # Has the read operation been cancelled?
|
||||||
|
self.delay = 0.1 # Read delay when there was no data available
|
||||||
|
self._lock = Lock()
|
||||||
|
|
||||||
|
self.aes_encrypt = None
|
||||||
|
self.aes_decrypt = None
|
||||||
|
|
||||||
|
def _recreate_socket(self):
|
||||||
|
if self._proxy is None:
|
||||||
|
self._socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||||
|
else:
|
||||||
|
import socks
|
||||||
|
self._socket = socks.socksocket(socket.AF_INET, socket.SOCK_STREAM)
|
||||||
|
if type(self._proxy) is dict:
|
||||||
|
self._socket.set_proxy(**self._proxy)
|
||||||
|
else: # tuple, list, etc.
|
||||||
|
self._socket.set_proxy(*self._proxy)
|
||||||
|
|
||||||
|
def connect(self, ip, port, timeout):
|
||||||
|
"""Connects to the specified IP and port number.
|
||||||
|
'timeout' must be given in seconds
|
||||||
|
"""
|
||||||
|
if not self.connected:
|
||||||
|
self._socket.settimeout(timeout)
|
||||||
|
self._socket.connect((ip, port))
|
||||||
|
self._socket.setblocking(False)
|
||||||
|
self.connected = True
|
||||||
|
|
||||||
|
# TCP Obfuscated bits
|
||||||
|
while True:
|
||||||
|
random = os.urandom(64)
|
||||||
|
if (random[0] != b'\xef' and
|
||||||
|
random[:4] not in OBFUSCATED_ANTI_KEYWORDS and
|
||||||
|
random[4:4] != b'\0\0\0\0'):
|
||||||
|
# Invalid random generated
|
||||||
|
break
|
||||||
|
|
||||||
|
random = list(random)
|
||||||
|
random[56] = random[57] = random[58] = random[59] = 0xef
|
||||||
|
random_reversed = random[55:7:-1] # Reversed (8, len=48)
|
||||||
|
|
||||||
|
# encryption has "continuous buffer" enabled
|
||||||
|
encrypt_key = bytes(random[8:40])
|
||||||
|
encrypt_iv = bytes(random[40:56])
|
||||||
|
decrypt_key = bytes(random_reversed[:32])
|
||||||
|
decrypt_iv = bytes(random_reversed[32:48])
|
||||||
|
|
||||||
|
self.aes_encrypt = AESModeCTR(encrypt_key, encrypt_iv)
|
||||||
|
self.aes_decrypt = AESModeCTR(decrypt_key, decrypt_iv)
|
||||||
|
|
||||||
|
random[56:64] = self.aes_encrypt.encrypt(bytes(random))[56:64]
|
||||||
|
self._socket.sendall(bytes(random))
|
||||||
|
|
||||||
|
def close(self):
|
||||||
|
"""Closes the connection"""
|
||||||
|
if self.connected:
|
||||||
|
try:
|
||||||
|
self._socket.shutdown(socket.SHUT_RDWR)
|
||||||
|
self._socket.close()
|
||||||
|
except OSError as e:
|
||||||
|
if e.errno != errno.ENOTCONN:
|
||||||
|
raise
|
||||||
|
|
||||||
|
self.connected = False
|
||||||
|
self._recreate_socket()
|
||||||
|
|
||||||
|
def write(self, data):
|
||||||
|
"""Writes (sends) the specified bytes to the connected peer"""
|
||||||
|
data = self.aes_encrypt.encrypt(data)
|
||||||
|
|
||||||
|
# Ensure that only one thread can send data at once
|
||||||
|
with self._lock:
|
||||||
|
try:
|
||||||
|
view = memoryview(data)
|
||||||
|
total_sent, total = 0, len(data)
|
||||||
|
while total_sent < total:
|
||||||
|
try:
|
||||||
|
sent = self._socket.send(view[total_sent:])
|
||||||
|
if sent == 0:
|
||||||
|
raise ConnectionResetError(
|
||||||
|
'The server has closed the connection.')
|
||||||
|
total_sent += sent
|
||||||
|
|
||||||
|
except BlockingIOError:
|
||||||
|
time.sleep(self.delay)
|
||||||
|
except BrokenPipeError:
|
||||||
|
self.close()
|
||||||
|
raise
|
||||||
|
|
||||||
|
def read(self, size, timeout=timedelta(seconds=5)):
|
||||||
|
"""Reads (receives) a whole block of 'size bytes
|
||||||
|
from the connected peer.
|
||||||
|
|
||||||
|
A timeout can be specified, which will cancel the operation if
|
||||||
|
no data has been read in the specified time. If data was read
|
||||||
|
and it's waiting for more, the timeout will NOT cancel the
|
||||||
|
operation. Set to None for no timeout
|
||||||
|
"""
|
||||||
|
|
||||||
|
# Ensure that only one thread can receive data at once
|
||||||
|
with self._lock:
|
||||||
|
# Ensure it is not cancelled at first, so we can enter the loop
|
||||||
|
self.cancelled.clear()
|
||||||
|
|
||||||
|
# Set the starting time so we can
|
||||||
|
# calculate whether the timeout should fire
|
||||||
|
start_time = datetime.now() if timeout is not None else None
|
||||||
|
|
||||||
|
with BufferedWriter(BytesIO(), buffer_size=size) as buffer:
|
||||||
|
bytes_left = size
|
||||||
|
while bytes_left != 0:
|
||||||
|
# Only do cancel if no data was read yet
|
||||||
|
# Otherwise, carry on reading and finish
|
||||||
|
if self.cancelled.is_set() and bytes_left == size:
|
||||||
|
raise ReadCancelledError()
|
||||||
|
|
||||||
|
try:
|
||||||
|
partial = self._socket.recv(bytes_left)
|
||||||
|
if len(partial) == 0:
|
||||||
|
self.close()
|
||||||
|
raise ConnectionResetError(
|
||||||
|
'The server has closed the connection.')
|
||||||
|
|
||||||
|
buffer.write(partial)
|
||||||
|
bytes_left -= len(partial)
|
||||||
|
|
||||||
|
except BlockingIOError as error:
|
||||||
|
# No data available yet, sleep a bit
|
||||||
|
time.sleep(self.delay)
|
||||||
|
|
||||||
|
# Check if the timeout finished
|
||||||
|
if timeout is not None:
|
||||||
|
time_passed = datetime.now() - start_time
|
||||||
|
if time_passed > timeout:
|
||||||
|
raise TimeoutError(
|
||||||
|
'The read operation exceeded the timeout.') from error
|
||||||
|
|
||||||
|
# If everything went fine, return the read bytes
|
||||||
|
buffer.flush()
|
||||||
|
return self.aes_decrypt.encrypt(buffer.raw.getvalue())
|
||||||
|
|
||||||
|
def cancel_read(self):
|
||||||
|
"""Cancels the read operation IF it hasn't yet
|
||||||
|
started, raising a ReadCancelledError"""
|
||||||
|
self.cancelled.set()
|
|
@ -2,7 +2,7 @@ from zlib import crc32
|
||||||
from datetime import timedelta
|
from datetime import timedelta
|
||||||
|
|
||||||
from ..errors import InvalidChecksumError
|
from ..errors import InvalidChecksumError
|
||||||
from ..extensions import TcpClient
|
from ..extensions import TcpClient, TcpClientObfuscated
|
||||||
from ..extensions import BinaryWriter
|
from ..extensions import BinaryWriter
|
||||||
|
|
||||||
|
|
||||||
|
@ -11,7 +11,7 @@ class TcpTransport:
|
||||||
proxy=None, timeout=timedelta(seconds=5)):
|
proxy=None, timeout=timedelta(seconds=5)):
|
||||||
self.ip = ip_address
|
self.ip = ip_address
|
||||||
self.port = port
|
self.port = port
|
||||||
self.tcp_client = TcpClient(proxy)
|
self.tcp_client = TcpClientObfuscated(proxy)
|
||||||
self.timeout = timeout
|
self.timeout = timeout
|
||||||
self.send_counter = 0
|
self.send_counter = 0
|
||||||
|
|
||||||
|
@ -33,7 +33,9 @@ class TcpTransport:
|
||||||
raise ConnectionError('Client not connected to server.')
|
raise ConnectionError('Client not connected to server.')
|
||||||
|
|
||||||
with BinaryWriter() as writer:
|
with BinaryWriter() as writer:
|
||||||
writer.write_int(len(packet) + 12) # 12 = size_of (integer) * 3
|
if isinstance(self.tcp_client, TcpClient):
|
||||||
|
# 12 = size_of (integer) * 3
|
||||||
|
writer.write_int(len(packet) + 12)
|
||||||
writer.write_int(self.send_counter)
|
writer.write_int(self.send_counter)
|
||||||
writer.write(packet)
|
writer.write(packet)
|
||||||
|
|
||||||
|
@ -41,6 +43,17 @@ class TcpTransport:
|
||||||
writer.write_int(crc, signed=False)
|
writer.write_int(crc, signed=False)
|
||||||
|
|
||||||
self.send_counter += 1
|
self.send_counter += 1
|
||||||
|
elif isinstance(self.tcp_client, TcpClientObfuscated):
|
||||||
|
length = len(packet) >> 2
|
||||||
|
if length < 127:
|
||||||
|
writer.write_byte(length)
|
||||||
|
else:
|
||||||
|
writer.write_byte(127)
|
||||||
|
writer.write(int.to_bytes(length, 3, 'little'))
|
||||||
|
writer.write(packet)
|
||||||
|
else:
|
||||||
|
raise ValueError('Unknown client')
|
||||||
|
|
||||||
self.tcp_client.write(writer.get_bytes())
|
self.tcp_client.write(writer.get_bytes())
|
||||||
|
|
||||||
def receive(self, **kwargs):
|
def receive(self, **kwargs):
|
||||||
|
@ -50,6 +63,7 @@ class TcpTransport:
|
||||||
If a named 'timeout' parameter is present, it will override
|
If a named 'timeout' parameter is present, it will override
|
||||||
'self.timeout', and this can be a 'timedelta' or 'None'.
|
'self.timeout', and this can be a 'timedelta' or 'None'.
|
||||||
"""
|
"""
|
||||||
|
if isinstance(self.tcp_client, TcpClient):
|
||||||
timeout = kwargs.get('timeout', self.timeout)
|
timeout = kwargs.get('timeout', self.timeout)
|
||||||
|
|
||||||
# First read everything we need
|
# First read everything we need
|
||||||
|
@ -73,6 +87,16 @@ class TcpTransport:
|
||||||
|
|
||||||
# If we passed the tests, we can then return a valid TCP message
|
# If we passed the tests, we can then return a valid TCP message
|
||||||
return seq, body
|
return seq, body
|
||||||
|
elif isinstance(self.tcp_client, TcpClientObfuscated):
|
||||||
|
packet_length = int.from_bytes(self.tcp_client.read(1), 'little')
|
||||||
|
if packet_length < 127:
|
||||||
|
return 0, self.tcp_client.read(packet_length << 2)
|
||||||
|
else:
|
||||||
|
plb = self.tcp_client.read(3)
|
||||||
|
pl = int.from_bytes(plb + b'\0', 'little') << 2
|
||||||
|
return 0, self.tcp_client.read(pl)
|
||||||
|
else:
|
||||||
|
raise ValueError('Unknown client')
|
||||||
|
|
||||||
def close(self):
|
def close(self):
|
||||||
self.tcp_client.close()
|
self.tcp_client.close()
|
||||||
|
|
Loading…
Reference in New Issue
Block a user