overtls 0.3.8

A simple proxy tunnel, minimalist tool for bypassing the GFW.
Documentation
use crate::{Error, error::Result};
use rustls::pki_types::{CertificateDer, PrivateKeyDer, ServerName};
use std::{fs::File, io::BufReader, net::SocketAddr, path::Path, sync::Arc};
use tokio::net::TcpStream;
use tokio_rustls::{
    TlsConnector,
    client::TlsStream,
    rustls::{ClientConfig, RootCertStore},
};

//
// https://github.com/rustls/tokio-rustls/blob/main/examples/client.rs
//

pub(crate) fn retrieve_root_cert_store_for_client(ca_content: &Option<String>) -> Result<RootCertStore> {
    let mut root_cert_store = RootCertStore::empty();
    if let Some(ca_content) = ca_content {
        let mut pem = std::io::Cursor::new(ca_content.as_bytes());
        for cert in rustls_pemfile::certs(&mut pem) {
            match cert {
                Ok(cert) => root_cert_store.add(cert)?,
                Err(e) => log::error!("Error parsing certificate: {e:?}"),
            }
        }
    }
    root_cert_store.extend(webpki_roots::TLS_SERVER_ROOTS.iter().cloned());
    Ok(root_cert_store)
}

static CHROME_CIPHERS: &[rustls::SupportedCipherSuite] = &[
    // TLS 1.3 cipher suits
    rustls::crypto::ring::cipher_suite::TLS13_AES_256_GCM_SHA384,
    rustls::crypto::ring::cipher_suite::TLS13_AES_128_GCM_SHA256,
    rustls::crypto::ring::cipher_suite::TLS13_CHACHA20_POLY1305_SHA256,
    // TLS 1.2 cipher suits
    rustls::crypto::ring::cipher_suite::TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
    rustls::crypto::ring::cipher_suite::TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
];

pub(crate) async fn create_tls_client_stream(
    root_cert_store: RootCertStore,
    addr: SocketAddr,
    domain: &str,
) -> Result<TlsStream<TcpStream>> {
    // Clone default CryptoProvider
    let default_provider = rustls::crypto::ring::default_provider();

    // Create a custom CryptoProvider with Chrome-compatible cipher suites
    let crypto_provider = rustls::crypto::CryptoProvider {
        cipher_suites: CHROME_CIPHERS.to_vec(),
        ..default_provider
    };

    // Build ClientConfig with custom CryptoProvider
    let config = ClientConfig::builder_with_provider(crypto_provider.into())
        .with_safe_default_protocol_versions() // Use default protocol versions (TLS 1.2 and TLS 1.3)
        .map_err(|e| Error::from(format!("Failed to set protocol versions: {e}")))?
        .with_root_certificates(root_cert_store)
        .with_no_client_auth();

    create_tls_client_stream_with_config(Arc::new(config), addr, domain).await
}

async fn create_tls_client_stream_with_config(config: Arc<ClientConfig>, addr: SocketAddr, domain: &str) -> Result<TlsStream<TcpStream>> {
    let connector = TlsConnector::from(config);

    let stream = crate::tcp_stream::tokio_create(addr).await?;

    let domain = ServerName::try_from(domain)?.to_owned();

    let stream = connector.connect(domain, stream).await?;

    Ok(stream)
}

pub(crate) fn server_load_certs(path: &Path) -> Result<Vec<CertificateDer<'static>>> {
    let mut res = vec![];
    for cert in rustls_pemfile::certs(&mut BufReader::new(File::open(path)?)) {
        res.push(cert?);
    }
    if res.is_empty() {
        return Err("No certificates found".into());
    }
    Ok(res)
}

pub(crate) fn server_load_keys(path: &Path) -> Result<Vec<PrivateKeyDer<'static>>> {
    let mut res = vec![];
    for key in rustls_pemfile::rsa_private_keys(&mut BufReader::new(File::open(path)?)) {
        res.push(PrivateKeyDer::from(key?));
    }
    for key in rustls_pemfile::pkcs8_private_keys(&mut BufReader::new(File::open(path)?)) {
        res.push(PrivateKeyDer::from(key?));
    }
    for key in rustls_pemfile::ec_private_keys(&mut BufReader::new(File::open(path)?)) {
        res.push(PrivateKeyDer::from(key?));
    }
    if res.is_empty() {
        return Err("No keys found".into());
    }
    Ok(res)
}

/// Creates a TLS client stream that disables certificate verification.
/// **Warning**: This is insecure and should only be used for testing or development.
pub(crate) async fn create_dangerous_tls_client_stream(addr: SocketAddr, domain: &str) -> Result<TlsStream<TcpStream>> {
    let root_cert_store = RootCertStore::empty();

    // Clone default CryptoProvider
    let default_provider = rustls::crypto::ring::default_provider();

    // Create a custom CryptoProvider with Chrome-compatible cipher suites
    let crypto_provider = rustls::crypto::CryptoProvider {
        cipher_suites: CHROME_CIPHERS.to_vec(),
        ..default_provider
    };

    // Build ClientConfig with custom CryptoProvider
    let mut config = ClientConfig::builder_with_provider(crypto_provider.into())
        .with_safe_default_protocol_versions() // Use default protocol versions (TLS 1.2 and TLS 1.3)
        .map_err(|e| Error::from(format!("Failed to set protocol versions: {e}")))?
        .with_root_certificates(root_cert_store)
        .with_no_client_auth();

    // this completely disables cert-verification
    let verifier = Arc::new(NoCertificateVerification::default());
    config.dangerous().set_certificate_verifier(verifier);

    create_tls_client_stream_with_config(Arc::new(config), addr, domain).await
}

#[derive(Debug, Default)]
pub struct NoCertificateVerification {}

impl rustls::client::danger::ServerCertVerifier for NoCertificateVerification {
    fn verify_server_cert(
        &self,
        _end_entity: &CertificateDer<'_>,
        _intermediates: &[CertificateDer<'_>],
        _server_name: &ServerName<'_>,
        _ocsp_response: &[u8],
        _now: rustls::pki_types::UnixTime,
    ) -> std::result::Result<rustls::client::danger::ServerCertVerified, rustls::Error> {
        Ok(rustls::client::danger::ServerCertVerified::assertion())
    }

    fn verify_tls12_signature(
        &self,
        _message: &[u8],
        _cert: &CertificateDer<'_>,
        _dss: &rustls::DigitallySignedStruct,
    ) -> std::result::Result<rustls::client::danger::HandshakeSignatureValid, rustls::Error> {
        Ok(rustls::client::danger::HandshakeSignatureValid::assertion())
    }

    fn verify_tls13_signature(
        &self,
        _message: &[u8],
        _cert: &CertificateDer<'_>,
        _dss: &rustls::DigitallySignedStruct,
    ) -> std::result::Result<rustls::client::danger::HandshakeSignatureValid, rustls::Error> {
        Ok(rustls::client::danger::HandshakeSignatureValid::assertion())
    }

    fn supported_verify_schemes(&self) -> Vec<rustls::SignatureScheme> {
        vec![
            rustls::SignatureScheme::RSA_PKCS1_SHA256,
            rustls::SignatureScheme::RSA_PKCS1_SHA384,
            rustls::SignatureScheme::RSA_PKCS1_SHA512,
            rustls::SignatureScheme::ECDSA_NISTP256_SHA256,
            rustls::SignatureScheme::ECDSA_NISTP384_SHA384,
            rustls::SignatureScheme::RSA_PSS_SHA256,
            rustls::SignatureScheme::RSA_PSS_SHA384,
            rustls::SignatureScheme::RSA_PSS_SHA512,
            rustls::SignatureScheme::ED25519,
            rustls::SignatureScheme::ED448,
        ]
    }

    fn requires_raw_public_keys(&self) -> bool {
        false
    }

    fn root_hint_subjects(&self) -> Option<&[rustls::DistinguishedName]> {
        None
    }
}