geneva

package module
v0.0.0-...-c1fdb11 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Mar 14, 2024 License: GPL-3.0 Imports: 2 Imported by: 1

README

geneva, an implementation of Geneva rules for Go

Go Actions Status Coverage Status

This is a reimplementation of the client- and server-side rule processing mechanisms of the Geneva project.

Geneva is both a method to describe ways of manipulating packets to attempt to circumvent censorship, and a genetic algoritm (GENetic EVAsion) that one can deploy to discover new circumventions. (This package does not implement the genetic algorithm.) More broadly, though, one can encode arbitrary instructions for packet manipulation using Geneva rules as a sort of "standard syntax", although the use case outside of censorship circumvention may be somewhat tenuous.

This package aims to implement the same triggers and actions that the Geneva project's canonical Python package does. Please note: this package is a work-in-progress, and there are still things left to implement.

Quick Background

Geneva rules are called strategies. A strategy consists of zero or more action trees that can be applied to inbound or outbound packets. The actions trees define both a trigger and a tree of actions to take on a packet if the trigger matches. The result of an action tree will be zero or more packets that should replace the original packet, which then can be reinjected into the host OS' network stack.

Strategies, Forests, and Action Trees

Let's work from the top down. A strategy, conceptually, looks like this:

outbound-forest \/ inbound-forest

outbound-forest and inbound-forest are ordered lists of (trigger, action tree) pairs. The Geneva paper calls these ordered lists forests. The outbound and inbound forests are separated by the \/ characters (that is a backslash followed by a forward-slash); if the strategy omits one or the other, then that side of the \/ is left empty. For example, a strategy that only includes an outbound forest would take the form outbound \/, whereas an inbound-only strategy would be \/ inbound.

The original Geneva paper does not have a name for these (trigger, action tree) pairs. In practice, however, the Python code actually defines an action tree as a (trigger, action) pair, where the "action" is the root of a tree of actions. This package follows this nomenclature as well.

A real example, taken from the original paper (pg 2202), would look like this:

[TCP:flags:S]-
   duplicate(
      tamper{TCP:flags:replace:SA}(
         send),
       send)-| \/
[TCP:flags:R]-drop-|

In this example, the outbound forest would trigger on TCP packets that have just the SYN flag set, and would perform a few different actions on those packets. The inbound forest would only apply to TCP packets with the RST flag set, and would simply drop them. Each of the forests in the example are made up of a single (trigger, action tree) pair.

The outbound forest for the above action in graph form looks like this:

Inbound Forest Graph

In a forest, each action tree must adhere to the syntax [trigger]-action-|. Currently, the parser for this package is stricter than the original; this is a bug.

Triggers

A trigger defines a way to match packets so that an action tree can be applied to them. In the example above, the first trigger is [TCP:flags:S]. This is a trigger that matches on the TCP segment's flags field, and requires that only the SYN flag be set. (Note that this trigger will not fire for packets that have, i.e., both SYN and ACK set.) If the packet is not a TCP packet, or the flags do not match exactly, then this trigger will not fire.

Actions

An action simply encodes steps to manipulate a packet. There are a number of actions described in the Geneva paper:

send

The "send" action simply yields the given packet. (A quirk—what the paper calls canonical syntax—is to elide any "send" actions in the action tree. For instance, the action "duplicate(,)" is equivalent to "duplicate(send,send)". Bear this in mind when reading Geneva strategies!)

drop

The "drop" action discards the given packet.

duplicate(a1, a2)

The "duplicate" action copies the original packet, then applies action a1 to the original and a2 to the copy. For example, if a1 and a2 are both "send" actions, then the action will yield two packets identical to the first.

fragment{protocol:offset:inOrder}(a1, a2)

The "fragment" action takes the original packet and fragments it, applying a1 to one of the fragments and a2 to the other. Since both the IP and TCP layers support fragmentation, the rule must specify which layer's payload to fragment. The first fragment will include up to offset bytes of the layer's payload; the second fragment will contain the rest. As an example, given an IPv4 packet with a 60-byte payload and an 8-byte offset, the first fragment will have the same IP header as the original packet (aside from the fields that must be fixed) and then the first eight bytes of the payload. The second fragment will contain the other 52 bytes. (You can also indicate that the fragments be returned out-of-order; i.e., reversed, by specifying "False" for the inOrder argument.)

tamper{protocol:field:mode[:newValue]}(a1)

The "tamper" action takes the original packet and modifies it in some fashion, depending on the protocol, field, and mode given. There are two modes: replace and corrupt. The "replace" mode will replace the value of the given field with newValue, while the "corrupt" mode will replace the value with random data. (Note that there are other modes that the Python code supports that are not defined in the original Geneva paper.)

Additionally, note that not all actions are valid for both inbound and outbound directions. The Python code mentions that "branching actions are not supported on inbound trees". Practically, this means that the duplicate and fragment actions can only be applied to outbound packets, while the sleep, drop, and tamper actions can apply to packets of either direction. (Note that this package does not currently enforce this; this is also a bug.)

Disclaimer

Currently only IPv4 and TCP are supported. There are plans to add support for UDP in the future (although pull requests are welcome! Look at TCPTamperAction and IPv4TamperAction in actions/tamper_action.go as examples. UDPTamperAction must implement the actions.Action interface). There are no plans at the moment to add support for IPv6.

Credits

See https://censorship.ai for more information about Geneva itself.

Documentation

Overview

Package geneva is a reimplementation of the client- and server-side rule processing mechanisms of the Geneva project.

Geneva is both a method to describe ways of manipulating packets to attempt to circumvent censorship, and a genetic algoritmm (GENetic EVAsion) that one can deploy to discover new circumventions. (This package does not implement the genetic algorithm.) More broadly, one can encode arbitrary instructions for packet manipulation using Geneva rules as a sort of "standard syntax", although the use case outside of censorship circumvention may be somewhat tenuous.

This package aims to implement the same triggers and actions that the Geneva project's canonical Python package does.

Quick Background

Geneva rules are called "strategies". A strategy consists of zero or more "action trees" that can be applied to inbound or outbound packets. The actions trees define both a "trigger" and a tree of actions to take on a packet if the trigger matches. The result of an action tree will be zero or more packets that should replace the original packet, which then can be reinjected into the host OS' network stack.

Strategies, Forests, and Action Trees

Let's work from the top down. A strategy, conceptually, looks like this:

outbound-forest \/ inbound-forest

"outbound-forest" and "inbound-forest" are ordered lists of (trigger, action tree) pairs. The Geneva paper calls these ordered lists "forests". The outbound and inbound forests are separated by the "\/" characters (that is a backslash followed by a forward-slash); if the strategy omits one or the other, then that side of the "\/" is left empty. For example, a strategy that only includes an outbound forest would take the form "outbound \/", whereas an inbound-only strategy would be "\/ inbound".

The original Geneva paper does not have a name for these (trigger, action tree) pairs. In practice, however, the Python code actually defines an action tree as a (trigger, action) pair, where the "action" is the root of a tree of actions. This package follows this nomenclature as well.

A real example, taken from https://geneva.cs.umd.edu/papers/geneva_ccs19.pdf (pg 2202), would look like this:

[TCP:flags:S]-
    duplicate(
      tamper{TCP:flags:replace:SA}(send),
      send)-| \/
[TCP:flags:R]-drop-|

In this example, the outbound forest would trigger on TCP packets that have just the SYN flag set, and would perform a few different actions on those packets. The inbound forest would only apply to TCP packets with the RST flag set, and would simply drop them. Each of the forests in the example are made up of a single (trigger, action tree) pair.

In a forest, each action tree must adhere to the syntax "[trigger]-action-|".

Triggers

A trigger defines a way to match packets so that an action tree can be applied to them. In the example above, the first trigger is "[TCP:flags:S]". This is a trigger that matches on the TCP protocol's "flags" field, and requires that only the SYN flag be set. (Note that this trigger will not fire for packets that have, i.e., both SYN and ACK set.) If the packet is not a TCP packet, or the flags do not match exactly, then this trigger will not fire.

Actions

An action simply encodes steps to manipulate a packet. There are a number of actions described in the Geneva paper:

send

The "send" action simply yields the given packet. (A quirk—or what the paper deems to be canonical syntax—is to elide any "send" actions in the action tree. For instance, the action "duplicate(,)" is equivalent to "duplicate(send,send)". Bear this in mind when reading Geneva strategies!)

drop

The "drop" action discards the given packet.

duplicate(a1, a2)

The "duplicate" action copies the original packet, then applies action a1 to the original and a2 to the copy. For example, if a1 and a2 are both "send" actions, then the action will yield two packets identical to the first.

fragment{protocol:offset:inOrder}(a1, a2)

The "fragment" action takes the original packet and fragments it, applying a1 to one of the fragments and a2 to the other. Since both the IP and TCP layers support fragmentation, the rule must specify which layer's payload to fragment. The first fragment will include up to "offset" bytes of the layer's payload; the second fragment will contain the rest. As an example, given an IPv4 packet with a 60-byte payload and an 8-byte offset, the first fragment will have the same IP header as the original packet (aside from the fields that must be fixed) and then the first eight bytes of the payload. The second fragment will contain the other 52 bytes. (You can also indicate that the fragments be returned out-of-order; i.e., reversed, by specifying "False" for the "inOrder" argument.)

tamper{protocol:field:mode[:newValue]}(a1)

The "tamper" action takes the original packet and modifies it in some fashion, depending on the protocol, field, and mode given. There are two modes: replace and corrupt. The "replace" mode will replace the value of the given field with newValue, while the "corrupt" mode will replace the value with random data. (Note that there are other modes that the Python code supports that are not defined in the original Geneva paper.)

Additionally, note that not all actions are valid for both inbound and outbound directions. The Python code mentions that "branching actions are not supported on inbound trees". Practically, this means that the duplicate and fragment actions can only be applied to outbound packets, while the sleep, drop, and tamper actions can apply to packets of either direction.

See https://censorship.ai for more information about Geneva itself.

Index

Constants

This section is empty.

Variables

View Source
var Strategies = []string{
	"[TCP:flags:PA]-duplicate(tamper{TCP:dataofs:replace:10}(tamper{TCP:chksum:corrupt},),)-| \\/",
	"[TCP:flags:PA]-duplicate(tamper{TCP:dataofs:replace:10}(tamper{IP:ttl:replace:10},),)-| \\/",
	"[TCP:flags:PA]-duplicate(tamper{TCP:dataofs:replace:10}(tamper{TCP:ack:corrupt},),)-| \\/",
	"[TCP:flags:PA]-duplicate(tamper{TCP:options-wscale:corrupt}(tamper{TCP:dataofs:replace:8},),)-| \\/",
	"[TCP:flags:PA]-duplicate(tamper{TCP:load:corrupt}(tamper{TCP:chksum:corrupt},),)-| \\/",
	"[TCP:flags:PA]-duplicate(tamper{TCP:load:corrupt}(tamper{IP:ttl:replace:8},),)-| \\/",
	"[TCP:flags:PA]-duplicate(tamper{TCP:load:corrupt}(tamper{TCP:ack:corrupt},),)-| \\/",
	"[TCP:flags:S]-duplicate(,tamper{TCP:load:corrupt})-| \\/",
	"[TCP:flags:PA]-duplicate(tamper{IP:len:replace:64},)-| \\/",
	"[TCP:flags:A]-duplicate(,tamper{TCP:flags:replace:R}(tamper{TCP:chksum:corrupt},))-| \\/",
	"[TCP:flags:A]-duplicate(,tamper{TCP:flags:replace:R}(tamper{IP:ttl:replace:10},))-| \\/",
	"[TCP:flags:A]-duplicate(,tamper{TCP:options-md5header:corrupt}(tamper{TCP:flags:replace:R},))-| \\/",
	"[TCP:flags:A]-duplicate(,tamper{TCP:flags:replace:RA}(tamper{TCP:chksum:corrupt},))-| \\/",
	"[TCP:flags:A]-duplicate(,tamper{TCP:flags:replace:RA}(tamper{IP:ttl:replace:10},))-| \\/",
	"[TCP:flags:A]-duplicate(,tamper{TCP:options-md5header:corrupt}(tamper{TCP:flags:replace:R},))-| \\/",
	"[TCP:flags:A]-duplicate(,tamper{TCP:flags:replace:FRAPUEN}(tamper{TCP:chksum:corrupt},))-| \\/",
	"[TCP:flags:A]-duplicate(,tamper{TCP:flags:replace:FREACN}(tamper{IP:ttl:replace:10},))-| \\/",
	"[TCP:flags:A]-duplicate(,tamper{TCP:flags:replace:FRAPUN}(tamper{TCP:options-md5header:corrupt},))-| \\/",
	"[TCP:flags:PA]-fragment{tcp:8:False}-| [TCP:flags:A]-tamper{TCP:seq:corrupt}-| \\/",
	"[TCP:flags:PA]-fragment{tcp:8:True}(,fragment{tcp:4:True})-| \\/",
	"[TCP:flags:PA]-fragment{tcp:-1:True}-|  \\/",
	"[TCP:flags:PA]-duplicate(tamper{TCP:flags:replace:F}(tamper{IP:len:replace:78},),)-|  \\/",
	"[TCP:flags:S]-duplicate(tamper{TCP:flags:replace:SA},)-| \\/",
	"[TCP:flags:PA]-tamper{TCP:options-uto:corrupt}-|  \\/",

	"[TCP:options-sackok:]-tamper{TCP:dataofs:replace:7}-| \\/",
	"[TCP:options-sack::4]-fragment{tcp:-1:False}-| \\/",
	"[TCP:options-nop:]-tamper{TCP:urgptr:corrupt}(tamper{TCP:options-eol:corrupt},)-| \\/",
	"[TCP:options-nop:]-fragment{ip:-1:True:9}(drop,)-| \\/",
	"[TCP:urgptr:0]-duplicate-| \\/",
	"[TCP:dataofs:10:3]-tamper{TCP:options-mss:replace:17484}(fragment{tcp:-1:False},)-| \\/",
	"[TCP:options-sack:]-tamper{TCP:window:corrupt}(tamper{TCP:options-eol:corrupt},)-| \\/",
	"[TCP:options-altchksum:]-duplicate(fragment{ip:-1:False},)-| \\/",
	"[TCP:options-altchksumopt:]-fragment{tcp:-1:True}-| \\/",
	"[TCP:dataofs:8]-duplicate(duplicate,)-| \\/",
	"[TCP:options-md5header:]-duplicate-| \\/",
	"[TCP:options-md5header:]-fragment{tcp:-1:False}-| [TCP:options-wscale:7]-drop-| \\/",
	"[TCP:options-uto:]-duplicate(,tamper{TCP:load:replace:y0qgai1woz})-| \\/",
	"[TCP:options-sackok::1]-tamper{TCP:window:replace:120}(tamper{TCP:ack:corrupt},)-| \\/",
	"[TCP:load:]-tamper{TCP:options-uto:corrupt}(fragment{tcp:-1:False},)-| [TCP:options-uto:]-tamper{TCP:options-mss:replace:}-| \\/",
	"[TCP:options-wscale:]-tamper{TCP:options-nop:corrupt}(tamper{TCP:options-altchksum:replace:},)-| \\/",
	"[TCP:options-sack::1]-tamper{TCP:chksum:replace:22170}-| \\/",
	"[TCP:load:]-fragment{tcp:-1:False}(tamper{TCP:urgptr:replace:29},)-| \\/",
	"[TCP:urgptr:0]-fragment{tcp:-1:False}(duplicate,tamper{TCP:options-sackok:replace:})-| \\/",
	"[TCP:options-eol:]-tamper{TCP:window:corrupt}-| \\/",
	"[TCP:options-uto:]-tamper{TCP:options-altchksum:replace:90}(duplicate(tamper{TCP:options-sack:replace:},),)-| \\/",
	"[TCP:options-altchksumopt:]-tamper{TCP:options-uto:replace:}(tamper{TCP:load:corrupt}(fragment{tcp:-1:True}(,drop),),)-| \\/",
	"[TCP:options-altchksumopt:]-fragment{tcp:-1:False}(drop,duplicate)-| \\/",
	"[TCP:options-eol:]-tamper{TCP:urgptr:corrupt}(duplicate,)-| \\/",
	"[TCP:options-sack:]-duplicate(tamper{TCP:urgptr:corrupt}(fragment{tcp:-1:False},),)-| \\/",
	"[TCP:options-nop::2]-fragment{tcp:46:True}(fragment{tcp:-1:True},)-| \\/",
	"[TCP:chksum:26741]-duplicate(tamper{TCP:options-timestamp:replace:},)-| \\/",
	"[TCP:options-uto:]-duplicate(,tamper{TCP:options-nop:replace:})-| \\/",
	"[TCP:options-altchksum:]-tamper{TCP:options-wscale:replace:248}(tamper{TCP:options-sackok:replace:},)-| \\/",
	"[TCP:options-sackok:]-duplicate(duplicate(,tamper{TCP:load:replace:GET%20/%3Fq%3Dultrasurf%20HTTP/1.1%0D%0AHost%3A%2023.88.46.143%3A4228%0D%0AUser-Agent%3A%20python-requests/2.23.0%0D%0AAccept-Encoding%3A%20gzip%2C%20deflate%0D%0AAccept%3A%20%2A/%2A%0D%0AConnection%3A%20keep-alive%0D%0A%0D%0A}),duplicate)-| \\/",
	"[TCP:options-sackok::1]-fragment{tcp:29:False:14}(tamper{TCP:options-timestamp:replace:4263716593},)-| \\/",
	"[TCP:options-altchksumopt:]-tamper{TCP:options-nop:corrupt}(duplicate,)-| \\/",
}

Functions

func NewStrategy

func NewStrategy(st string) (*strategy.Strategy, error)

NewStrategy parses st into a Geneva strategy.

This is a convenience wrapper for strategy.ParseStrategy().

Types

This section is empty.

Directories

Path Synopsis
Package actions describes the actions that can be applied to a given packet.
Package actions describes the actions that can be applied to a given packet.
Package common provides common functions for Geneva.
Package common provides common functions for Geneva.
Package internal provides internal Geneva types and functions.
Package internal provides internal Geneva types and functions.
scanner
Package scanner is a token scanner tailored to this library.
Package scanner is a token scanner tailored to this library.
Package strategy provides types and functions for creating Geneva strategies.
Package strategy provides types and functions for creating Geneva strategies.
Package triggers enumerates all of the various triggers that can be used to match packets.
Package triggers enumerates all of the various triggers that can be used to match packets.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL