Implement different mtproto proxy protocols; refactor obfuscated2

This commit is contained in:
Сергей Прохоров
2019-03-10 01:00:11 +01:00
parent baa8970bb6
commit b873aa67cc
8 changed files with 209 additions and 68 deletions

View File

@@ -1,11 +1,12 @@
import os
from .tcpabridged import AbridgedPacket
from .connection import Connection
from .tcpabridged import ConnectionTcpAbridged
from ...crypto import AESModeCTR
class ConnectionTcpObfuscated(ConnectionTcpAbridged):
class ConnectionTcpObfuscated(Connection):
"""
Mode that Telegram defines as "obfuscated2". Encodes the packet
just like `ConnectionTcpAbridged`, but encrypts every message with
@@ -15,16 +16,26 @@ class ConnectionTcpObfuscated(ConnectionTcpAbridged):
def __init__(self, ip, port, dc_id, *, loop, loggers, proxy=None):
super().__init__(
ip, port, dc_id, loop=loop, loggers=loggers, proxy=proxy)
self._aes_encrypt = None
self._aes_decrypt = None
def _write(self, data):
self._writer.write(self._aes_encrypt.encrypt(data))
async def _read(self, n):
return self._aes_decrypt.encrypt(await self._reader.readexactly(n))
self._codec = AbridgedPacket()
def _init_conn(self):
self._obfuscation = ObfuscatedIO(
self._reader, self._writer, self._codec.mtproto_proxy_tag)
self._writer.write(self._obfuscation.header)
def _send(self, data):
self._obfuscation.write(self._codec.encode_packet(data))
async def _recv(self):
return await self._codec.read_packet(self._obfuscation)
class ObfuscatedIO:
header = None
def __init__(self, reader, writer, protocol_tag):
self._reader = reader
self._writer = writer
# Obfuscated messages secrets cannot start with any of these
keywords = (b'PVrG', b'GET ', b'POST', b'\xee\xee\xee\xee')
while True:
@@ -38,23 +49,21 @@ class ConnectionTcpObfuscated(ConnectionTcpAbridged):
random_reversed = random[55:7:-1] # Reversed (8, len=48)
# Encryption has "continuous buffer" enabled
encrypt_key = self._compose_key(bytes(random[8:40]))
encrypt_key = bytes(random[8:40])
encrypt_iv = bytes(random[40:56])
decrypt_key = self._compose_key(bytes(random_reversed[:32]))
decrypt_key = bytes(random_reversed[:32])
decrypt_iv = bytes(random_reversed[32:48])
self._aes_encrypt = AESModeCTR(encrypt_key, encrypt_iv)
self._aes_decrypt = AESModeCTR(decrypt_key, decrypt_iv)
random[56:60] = b'\xef\xef\xef\xef'
random[56:64] = self._compose_tail(bytes(random))
random[56:60] = protocol_tag
random[56:64] = self._aes_encrypt.encrypt(bytes(random))[56:64]
self._writer.write(random)
self.header = random
# Next functions provide the variable parts of the connection handshake.
# This is necessary to modify obfuscated2 the way that MTProxy requires.
def _compose_key(self, data):
return data
async def readexactly(self, n):
return self._aes_decrypt.encrypt(await self._reader.readexactly(n))
def _compose_tail(self, data):
return self._aes_encrypt.encrypt(data)[56:64]
def write(self, data):
self._writer.write(self._aes_encrypt.encrypt(data))