@push.rocks/smartproxy 20.0.1 → 21.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/changelog.md +26 -0
- package/dist_ts/core/utils/proxy-protocol.d.ts +5 -17
- package/dist_ts/core/utils/proxy-protocol.js +13 -97
- package/dist_ts/core/utils/websocket-utils.d.ts +6 -7
- package/dist_ts/core/utils/websocket-utils.js +10 -66
- package/dist_ts/detection/detectors/http-detector-v2.d.ts +33 -0
- package/dist_ts/detection/detectors/http-detector-v2.js +87 -0
- package/dist_ts/detection/detectors/http-detector.d.ts +33 -0
- package/dist_ts/detection/detectors/http-detector.js +89 -0
- package/dist_ts/detection/detectors/quick-detector.d.ts +28 -0
- package/dist_ts/detection/detectors/quick-detector.js +131 -0
- package/dist_ts/detection/detectors/routing-extractor.d.ts +28 -0
- package/dist_ts/detection/detectors/routing-extractor.js +122 -0
- package/dist_ts/detection/detectors/tls-detector-v2.d.ts +33 -0
- package/dist_ts/detection/detectors/tls-detector-v2.js +80 -0
- package/dist_ts/detection/detectors/tls-detector.d.ts +33 -0
- package/dist_ts/detection/detectors/tls-detector.js +106 -0
- package/dist_ts/detection/index.d.ts +17 -0
- package/dist_ts/detection/index.js +22 -0
- package/dist_ts/detection/models/detection-types.d.ts +87 -0
- package/dist_ts/detection/models/detection-types.js +5 -0
- package/dist_ts/detection/models/interfaces.d.ts +97 -0
- package/dist_ts/detection/models/interfaces.js +5 -0
- package/dist_ts/detection/protocol-detector-v2.d.ts +46 -0
- package/dist_ts/detection/protocol-detector-v2.js +116 -0
- package/dist_ts/detection/protocol-detector.d.ts +74 -0
- package/dist_ts/detection/protocol-detector.js +173 -0
- package/dist_ts/detection/utils/buffer-utils.d.ts +61 -0
- package/dist_ts/detection/utils/buffer-utils.js +127 -0
- package/dist_ts/detection/utils/fragment-manager.d.ts +31 -0
- package/dist_ts/detection/utils/fragment-manager.js +53 -0
- package/dist_ts/detection/utils/parser-utils.d.ts +42 -0
- package/dist_ts/detection/utils/parser-utils.js +63 -0
- package/dist_ts/index.d.ts +2 -1
- package/dist_ts/index.js +3 -2
- package/dist_ts/protocols/common/fragment-handler.d.ts +73 -0
- package/dist_ts/protocols/common/fragment-handler.js +117 -0
- package/dist_ts/protocols/common/index.d.ts +7 -0
- package/dist_ts/protocols/common/index.js +8 -0
- package/dist_ts/protocols/common/types.d.ts +68 -0
- package/dist_ts/protocols/common/types.js +7 -0
- package/dist_ts/protocols/http/constants.d.ts +119 -0
- package/dist_ts/protocols/http/constants.js +200 -0
- package/dist_ts/protocols/http/index.d.ts +7 -0
- package/dist_ts/protocols/http/index.js +8 -0
- package/dist_ts/protocols/http/parser.d.ts +58 -0
- package/dist_ts/protocols/http/parser.js +184 -0
- package/dist_ts/protocols/http/types.d.ts +62 -0
- package/dist_ts/protocols/http/types.js +5 -0
- package/dist_ts/protocols/index.d.ts +11 -0
- package/dist_ts/protocols/index.js +12 -0
- package/dist_ts/protocols/proxy/index.d.ts +6 -0
- package/dist_ts/protocols/proxy/index.js +7 -0
- package/dist_ts/protocols/proxy/parser.d.ts +44 -0
- package/dist_ts/protocols/proxy/parser.js +153 -0
- package/dist_ts/protocols/proxy/types.d.ts +47 -0
- package/dist_ts/protocols/proxy/types.js +6 -0
- package/dist_ts/protocols/tls/alerts/index.d.ts +4 -0
- package/dist_ts/protocols/tls/alerts/index.js +5 -0
- package/dist_ts/protocols/tls/alerts/tls-alert.d.ts +150 -0
- package/dist_ts/protocols/tls/alerts/tls-alert.js +226 -0
- package/dist_ts/protocols/tls/constants.d.ts +122 -0
- package/dist_ts/protocols/tls/constants.js +135 -0
- package/dist_ts/protocols/tls/index.d.ts +12 -0
- package/dist_ts/protocols/tls/index.js +27 -0
- package/dist_ts/protocols/tls/parser.d.ts +53 -0
- package/dist_ts/protocols/tls/parser.js +294 -0
- package/dist_ts/protocols/tls/sni/client-hello-parser.d.ts +100 -0
- package/dist_ts/protocols/tls/sni/client-hello-parser.js +463 -0
- package/dist_ts/protocols/tls/sni/index.d.ts +5 -0
- package/dist_ts/protocols/tls/sni/index.js +6 -0
- package/dist_ts/protocols/tls/sni/sni-extraction.d.ts +58 -0
- package/dist_ts/protocols/tls/sni/sni-extraction.js +275 -0
- package/dist_ts/protocols/tls/types.d.ts +65 -0
- package/dist_ts/protocols/tls/types.js +5 -0
- package/dist_ts/protocols/tls/utils/index.d.ts +4 -0
- package/dist_ts/protocols/tls/utils/index.js +5 -0
- package/dist_ts/protocols/tls/utils/tls-utils.d.ts +158 -0
- package/dist_ts/protocols/tls/utils/tls-utils.js +187 -0
- package/dist_ts/protocols/websocket/constants.d.ts +55 -0
- package/dist_ts/protocols/websocket/constants.js +58 -0
- package/dist_ts/protocols/websocket/index.d.ts +7 -0
- package/dist_ts/protocols/websocket/index.js +8 -0
- package/dist_ts/protocols/websocket/types.d.ts +47 -0
- package/dist_ts/protocols/websocket/types.js +5 -0
- package/dist_ts/protocols/websocket/utils.d.ts +25 -0
- package/dist_ts/protocols/websocket/utils.js +103 -0
- package/dist_ts/proxies/http-proxy/models/http-types.d.ts +25 -27
- package/dist_ts/proxies/http-proxy/models/http-types.js +24 -44
- package/dist_ts/proxies/smart-proxy/models/interfaces.d.ts +5 -0
- package/dist_ts/proxies/smart-proxy/models/route-types.js +1 -1
- package/dist_ts/proxies/smart-proxy/route-connection-handler.js +81 -61
- package/dist_ts/proxies/smart-proxy/tls-manager.js +2 -1
- package/dist_ts/proxies/smart-proxy/utils/index.d.ts +1 -2
- package/dist_ts/proxies/smart-proxy/utils/index.js +3 -4
- package/dist_ts/proxies/smart-proxy/utils/route-helpers.d.ts +112 -8
- package/dist_ts/proxies/smart-proxy/utils/route-helpers.js +231 -76
- package/dist_ts/tls/index.d.ts +5 -7
- package/dist_ts/tls/index.js +8 -11
- package/dist_ts/tls/sni/client-hello-parser.js +3 -2
- package/dist_ts/tls/sni/sni-handler.js +4 -4
- package/dist_ts/tls/utils/tls-utils.d.ts +1 -110
- package/dist_ts/tls/utils/tls-utils.js +4 -116
- package/package.json +17 -8
- package/readme.md +471 -2345
- package/readme.plan.md +0 -0
- package/ts/core/utils/proxy-protocol.ts +14 -131
- package/ts/core/utils/websocket-utils.ts +12 -60
- package/ts/detection/detectors/http-detector.ts +114 -0
- package/ts/detection/detectors/quick-detector.ts +148 -0
- package/ts/detection/detectors/routing-extractor.ts +147 -0
- package/ts/detection/detectors/tls-detector.ts +120 -0
- package/ts/detection/index.ts +25 -0
- package/ts/detection/models/detection-types.ts +102 -0
- package/ts/detection/models/interfaces.ts +115 -0
- package/ts/detection/protocol-detector.ts +230 -0
- package/ts/detection/utils/buffer-utils.ts +141 -0
- package/ts/detection/utils/fragment-manager.ts +64 -0
- package/ts/detection/utils/parser-utils.ts +77 -0
- package/ts/index.ts +3 -2
- package/ts/protocols/common/fragment-handler.ts +163 -0
- package/ts/protocols/common/index.ts +8 -0
- package/ts/protocols/common/types.ts +76 -0
- package/ts/protocols/http/constants.ts +219 -0
- package/ts/protocols/http/index.ts +8 -0
- package/ts/protocols/http/parser.ts +219 -0
- package/ts/protocols/http/types.ts +70 -0
- package/ts/protocols/index.ts +12 -0
- package/ts/protocols/proxy/index.ts +7 -0
- package/ts/protocols/proxy/parser.ts +183 -0
- package/ts/protocols/proxy/types.ts +53 -0
- package/ts/{tls → protocols/tls}/alerts/tls-alert.ts +1 -1
- package/ts/protocols/tls/index.ts +37 -0
- package/ts/protocols/tls/sni/index.ts +6 -0
- package/ts/{tls → protocols/tls}/utils/tls-utils.ts +1 -1
- package/ts/protocols/websocket/constants.ts +60 -0
- package/ts/protocols/websocket/index.ts +8 -0
- package/ts/protocols/websocket/types.ts +53 -0
- package/ts/protocols/websocket/utils.ts +98 -0
- package/ts/proxies/http-proxy/models/http-types.ts +29 -46
- package/ts/proxies/smart-proxy/models/interfaces.ts +7 -1
- package/ts/proxies/smart-proxy/models/route-types.ts +0 -1
- package/ts/proxies/smart-proxy/route-connection-handler.ts +91 -68
- package/ts/proxies/smart-proxy/tls-manager.ts +1 -0
- package/ts/proxies/smart-proxy/utils/index.ts +2 -13
- package/ts/proxies/smart-proxy/utils/route-helpers.ts +323 -86
- package/ts/tls/index.ts +8 -12
- package/ts/tls/sni/sni-handler.ts +3 -3
- package/ts/forwarding/config/forwarding-types.ts +0 -76
- package/ts/forwarding/config/index.ts +0 -26
- package/ts/forwarding/factory/forwarding-factory.ts +0 -189
- package/ts/forwarding/factory/index.ts +0 -5
- package/ts/forwarding/handlers/base-handler.ts +0 -155
- package/ts/forwarding/handlers/http-handler.ts +0 -163
- package/ts/forwarding/handlers/https-passthrough-handler.ts +0 -185
- package/ts/forwarding/handlers/https-terminate-to-http-handler.ts +0 -312
- package/ts/forwarding/handlers/https-terminate-to-https-handler.ts +0 -297
- package/ts/forwarding/handlers/index.ts +0 -9
- package/ts/forwarding/index.ts +0 -35
- package/ts/proxies/smart-proxy/utils/route-patterns.ts +0 -403
- /package/ts/{tls → protocols/tls}/alerts/index.ts +0 -0
- /package/ts/{tls → protocols/tls}/sni/client-hello-parser.ts +0 -0
- /package/ts/{tls → protocols/tls}/sni/sni-extraction.ts +0 -0
- /package/ts/{tls → protocols/tls}/utils/index.ts +0 -0
|
@@ -0,0 +1,463 @@
|
|
|
1
|
+
import { Buffer } from 'buffer';
|
|
2
|
+
import { TlsRecordType, TlsHandshakeType, TlsExtensionType, TlsUtils } from '../utils/tls-utils.js';
|
|
3
|
+
/**
|
|
4
|
+
* Class for parsing TLS ClientHello messages
|
|
5
|
+
*/
|
|
6
|
+
export class ClientHelloParser {
|
|
7
|
+
// Buffer for handling fragmented ClientHello messages
|
|
8
|
+
static { this.fragmentedBuffers = new Map(); }
|
|
9
|
+
static { this.fragmentTimeout = 1000; } // ms to wait for fragments before cleanup
|
|
10
|
+
/**
|
|
11
|
+
* Clean up expired fragments
|
|
12
|
+
*/
|
|
13
|
+
static cleanupExpiredFragments() {
|
|
14
|
+
const now = Date.now();
|
|
15
|
+
for (const [connectionId, info] of this.fragmentedBuffers.entries()) {
|
|
16
|
+
if (now - info.timestamp > this.fragmentTimeout) {
|
|
17
|
+
this.fragmentedBuffers.delete(connectionId);
|
|
18
|
+
}
|
|
19
|
+
}
|
|
20
|
+
}
|
|
21
|
+
/**
|
|
22
|
+
* Handles potential fragmented ClientHello messages by buffering and reassembling
|
|
23
|
+
* TLS record fragments that might span multiple TCP packets.
|
|
24
|
+
*
|
|
25
|
+
* @param buffer The current buffer fragment
|
|
26
|
+
* @param connectionId Unique identifier for the connection
|
|
27
|
+
* @param logger Optional logging function
|
|
28
|
+
* @returns A complete buffer if reassembly is successful, or undefined if more fragments are needed
|
|
29
|
+
*/
|
|
30
|
+
static handleFragmentedClientHello(buffer, connectionId, logger) {
|
|
31
|
+
const log = logger || (() => { });
|
|
32
|
+
// Periodically clean up expired fragments
|
|
33
|
+
this.cleanupExpiredFragments();
|
|
34
|
+
// Check if we've seen this connection before
|
|
35
|
+
if (!this.fragmentedBuffers.has(connectionId)) {
|
|
36
|
+
// New connection, start with this buffer
|
|
37
|
+
this.fragmentedBuffers.set(connectionId, {
|
|
38
|
+
buffer,
|
|
39
|
+
timestamp: Date.now(),
|
|
40
|
+
connectionId
|
|
41
|
+
});
|
|
42
|
+
// Evaluate if this buffer already contains a complete ClientHello
|
|
43
|
+
try {
|
|
44
|
+
if (buffer.length >= 5) {
|
|
45
|
+
// Get the record length from TLS header
|
|
46
|
+
const recordLength = (buffer[3] << 8) + buffer[4] + 5; // +5 for the TLS record header itself
|
|
47
|
+
log(`Initial buffer size: ${buffer.length}, expected record length: ${recordLength}`);
|
|
48
|
+
// Check if this buffer already contains a complete TLS record
|
|
49
|
+
if (buffer.length >= recordLength) {
|
|
50
|
+
log(`Initial buffer contains complete ClientHello, length: ${buffer.length}`);
|
|
51
|
+
return buffer;
|
|
52
|
+
}
|
|
53
|
+
}
|
|
54
|
+
else {
|
|
55
|
+
log(`Initial buffer too small (${buffer.length} bytes), needs at least 5 bytes for TLS header`);
|
|
56
|
+
}
|
|
57
|
+
}
|
|
58
|
+
catch (e) {
|
|
59
|
+
log(`Error checking initial buffer completeness: ${e}`);
|
|
60
|
+
}
|
|
61
|
+
log(`Started buffering connection ${connectionId}, initial size: ${buffer.length}`);
|
|
62
|
+
return undefined; // Need more fragments
|
|
63
|
+
}
|
|
64
|
+
else {
|
|
65
|
+
// Existing connection, append this buffer
|
|
66
|
+
const existingInfo = this.fragmentedBuffers.get(connectionId);
|
|
67
|
+
const newBuffer = Buffer.concat([existingInfo.buffer, buffer]);
|
|
68
|
+
// Update the buffer and timestamp
|
|
69
|
+
this.fragmentedBuffers.set(connectionId, {
|
|
70
|
+
...existingInfo,
|
|
71
|
+
buffer: newBuffer,
|
|
72
|
+
timestamp: Date.now()
|
|
73
|
+
});
|
|
74
|
+
log(`Appended to buffer for ${connectionId}, new size: ${newBuffer.length}`);
|
|
75
|
+
// Check if we now have a complete ClientHello
|
|
76
|
+
try {
|
|
77
|
+
if (newBuffer.length >= 5) {
|
|
78
|
+
// Get the record length from TLS header
|
|
79
|
+
const recordLength = (newBuffer[3] << 8) + newBuffer[4] + 5; // +5 for the TLS record header itself
|
|
80
|
+
log(`Reassembled buffer size: ${newBuffer.length}, expected record length: ${recordLength}`);
|
|
81
|
+
// Check if we have a complete TLS record now
|
|
82
|
+
if (newBuffer.length >= recordLength) {
|
|
83
|
+
log(`Assembled complete ClientHello, length: ${newBuffer.length}, needed: ${recordLength}`);
|
|
84
|
+
// Extract the complete TLS record (might be followed by more data)
|
|
85
|
+
const completeRecord = newBuffer.slice(0, recordLength);
|
|
86
|
+
// Check if this record is indeed a ClientHello (type 1) at position 5
|
|
87
|
+
if (completeRecord.length > 5 &&
|
|
88
|
+
completeRecord[5] === TlsHandshakeType.CLIENT_HELLO) {
|
|
89
|
+
log(`Verified record is a ClientHello handshake message`);
|
|
90
|
+
// Complete message received, remove from tracking
|
|
91
|
+
this.fragmentedBuffers.delete(connectionId);
|
|
92
|
+
return completeRecord;
|
|
93
|
+
}
|
|
94
|
+
else {
|
|
95
|
+
log(`Record is complete but not a ClientHello handshake, continuing to buffer`);
|
|
96
|
+
// This might be another TLS record type preceding the ClientHello
|
|
97
|
+
// Try checking for a ClientHello starting at the end of this record
|
|
98
|
+
if (newBuffer.length > recordLength + 5) {
|
|
99
|
+
const nextRecordType = newBuffer[recordLength];
|
|
100
|
+
log(`Next record type: ${nextRecordType} (looking for ${TlsRecordType.HANDSHAKE})`);
|
|
101
|
+
if (nextRecordType === TlsRecordType.HANDSHAKE) {
|
|
102
|
+
const handshakeType = newBuffer[recordLength + 5];
|
|
103
|
+
log(`Next handshake type: ${handshakeType} (looking for ${TlsHandshakeType.CLIENT_HELLO})`);
|
|
104
|
+
if (handshakeType === TlsHandshakeType.CLIENT_HELLO) {
|
|
105
|
+
// Found a ClientHello in the next record, return the entire buffer
|
|
106
|
+
log(`Found ClientHello in subsequent record, returning full buffer`);
|
|
107
|
+
this.fragmentedBuffers.delete(connectionId);
|
|
108
|
+
return newBuffer;
|
|
109
|
+
}
|
|
110
|
+
}
|
|
111
|
+
}
|
|
112
|
+
}
|
|
113
|
+
}
|
|
114
|
+
}
|
|
115
|
+
}
|
|
116
|
+
catch (e) {
|
|
117
|
+
log(`Error checking reassembled buffer completeness: ${e}`);
|
|
118
|
+
}
|
|
119
|
+
return undefined; // Still need more fragments
|
|
120
|
+
}
|
|
121
|
+
}
|
|
122
|
+
/**
|
|
123
|
+
* Parses a TLS ClientHello message and extracts all components
|
|
124
|
+
*
|
|
125
|
+
* @param buffer The buffer containing the ClientHello message
|
|
126
|
+
* @param logger Optional logging function
|
|
127
|
+
* @returns Parsed ClientHello or undefined if parsing failed
|
|
128
|
+
*/
|
|
129
|
+
static parseClientHello(buffer, logger) {
|
|
130
|
+
const log = logger || (() => { });
|
|
131
|
+
const result = {
|
|
132
|
+
isValid: false,
|
|
133
|
+
hasSessionId: false,
|
|
134
|
+
extensions: [],
|
|
135
|
+
hasSessionTicket: false,
|
|
136
|
+
hasPsk: false,
|
|
137
|
+
hasEarlyData: false
|
|
138
|
+
};
|
|
139
|
+
try {
|
|
140
|
+
// Check basic validity
|
|
141
|
+
if (buffer.length < 5) {
|
|
142
|
+
result.error = 'Buffer too small for TLS record header';
|
|
143
|
+
return result;
|
|
144
|
+
}
|
|
145
|
+
// Check record type (must be HANDSHAKE)
|
|
146
|
+
if (buffer[0] !== TlsRecordType.HANDSHAKE) {
|
|
147
|
+
result.error = `Not a TLS handshake record: ${buffer[0]}`;
|
|
148
|
+
return result;
|
|
149
|
+
}
|
|
150
|
+
// Get TLS version from record header
|
|
151
|
+
const majorVersion = buffer[1];
|
|
152
|
+
const minorVersion = buffer[2];
|
|
153
|
+
result.version = [majorVersion, minorVersion];
|
|
154
|
+
log(`TLS record version: ${majorVersion}.${minorVersion}`);
|
|
155
|
+
// Parse record length (bytes 3-4, big-endian)
|
|
156
|
+
const recordLength = (buffer[3] << 8) + buffer[4];
|
|
157
|
+
log(`Record length: ${recordLength}`);
|
|
158
|
+
// Validate record length against buffer size
|
|
159
|
+
if (buffer.length < recordLength + 5) {
|
|
160
|
+
result.error = 'Buffer smaller than expected record length';
|
|
161
|
+
return result;
|
|
162
|
+
}
|
|
163
|
+
// Start of handshake message in the buffer
|
|
164
|
+
let pos = 5;
|
|
165
|
+
// Check handshake type (must be CLIENT_HELLO)
|
|
166
|
+
if (buffer[pos] !== TlsHandshakeType.CLIENT_HELLO) {
|
|
167
|
+
result.error = `Not a ClientHello message: ${buffer[pos]}`;
|
|
168
|
+
return result;
|
|
169
|
+
}
|
|
170
|
+
// Skip handshake type (1 byte)
|
|
171
|
+
pos += 1;
|
|
172
|
+
// Parse handshake length (3 bytes, big-endian)
|
|
173
|
+
const handshakeLength = (buffer[pos] << 16) + (buffer[pos + 1] << 8) + buffer[pos + 2];
|
|
174
|
+
log(`Handshake length: ${handshakeLength}`);
|
|
175
|
+
// Skip handshake length (3 bytes)
|
|
176
|
+
pos += 3;
|
|
177
|
+
// Check client version (2 bytes)
|
|
178
|
+
const clientMajorVersion = buffer[pos];
|
|
179
|
+
const clientMinorVersion = buffer[pos + 1];
|
|
180
|
+
log(`Client version: ${clientMajorVersion}.${clientMinorVersion}`);
|
|
181
|
+
// Skip client version (2 bytes)
|
|
182
|
+
pos += 2;
|
|
183
|
+
// Extract client random (32 bytes)
|
|
184
|
+
if (pos + 32 > buffer.length) {
|
|
185
|
+
result.error = 'Buffer too small for client random';
|
|
186
|
+
return result;
|
|
187
|
+
}
|
|
188
|
+
result.random = buffer.slice(pos, pos + 32);
|
|
189
|
+
log(`Client random: ${result.random.toString('hex')}`);
|
|
190
|
+
// Skip client random (32 bytes)
|
|
191
|
+
pos += 32;
|
|
192
|
+
// Parse session ID
|
|
193
|
+
if (pos + 1 > buffer.length) {
|
|
194
|
+
result.error = 'Buffer too small for session ID length';
|
|
195
|
+
return result;
|
|
196
|
+
}
|
|
197
|
+
const sessionIdLength = buffer[pos];
|
|
198
|
+
log(`Session ID length: ${sessionIdLength}`);
|
|
199
|
+
pos += 1;
|
|
200
|
+
result.hasSessionId = sessionIdLength > 0;
|
|
201
|
+
if (sessionIdLength > 0) {
|
|
202
|
+
if (pos + sessionIdLength > buffer.length) {
|
|
203
|
+
result.error = 'Buffer too small for session ID';
|
|
204
|
+
return result;
|
|
205
|
+
}
|
|
206
|
+
result.sessionId = buffer.slice(pos, pos + sessionIdLength);
|
|
207
|
+
log(`Session ID: ${result.sessionId.toString('hex')}`);
|
|
208
|
+
}
|
|
209
|
+
// Skip session ID
|
|
210
|
+
pos += sessionIdLength;
|
|
211
|
+
// Check if we have enough bytes left for cipher suites
|
|
212
|
+
if (pos + 2 > buffer.length) {
|
|
213
|
+
result.error = 'Buffer too small for cipher suites length';
|
|
214
|
+
return result;
|
|
215
|
+
}
|
|
216
|
+
// Parse cipher suites length (2 bytes, big-endian)
|
|
217
|
+
const cipherSuitesLength = (buffer[pos] << 8) + buffer[pos + 1];
|
|
218
|
+
log(`Cipher suites length: ${cipherSuitesLength}`);
|
|
219
|
+
pos += 2;
|
|
220
|
+
// Extract cipher suites
|
|
221
|
+
if (pos + cipherSuitesLength > buffer.length) {
|
|
222
|
+
result.error = 'Buffer too small for cipher suites';
|
|
223
|
+
return result;
|
|
224
|
+
}
|
|
225
|
+
result.cipherSuites = buffer.slice(pos, pos + cipherSuitesLength);
|
|
226
|
+
// Skip cipher suites
|
|
227
|
+
pos += cipherSuitesLength;
|
|
228
|
+
// Check if we have enough bytes left for compression methods
|
|
229
|
+
if (pos + 1 > buffer.length) {
|
|
230
|
+
result.error = 'Buffer too small for compression methods length';
|
|
231
|
+
return result;
|
|
232
|
+
}
|
|
233
|
+
// Parse compression methods length (1 byte)
|
|
234
|
+
const compressionMethodsLength = buffer[pos];
|
|
235
|
+
log(`Compression methods length: ${compressionMethodsLength}`);
|
|
236
|
+
pos += 1;
|
|
237
|
+
// Extract compression methods
|
|
238
|
+
if (pos + compressionMethodsLength > buffer.length) {
|
|
239
|
+
result.error = 'Buffer too small for compression methods';
|
|
240
|
+
return result;
|
|
241
|
+
}
|
|
242
|
+
result.compressionMethods = buffer.slice(pos, pos + compressionMethodsLength);
|
|
243
|
+
// Skip compression methods
|
|
244
|
+
pos += compressionMethodsLength;
|
|
245
|
+
// Check if we have enough bytes for extensions length
|
|
246
|
+
if (pos + 2 > buffer.length) {
|
|
247
|
+
// No extensions present - this is valid for older TLS versions
|
|
248
|
+
result.isValid = true;
|
|
249
|
+
return result;
|
|
250
|
+
}
|
|
251
|
+
// Parse extensions length (2 bytes, big-endian)
|
|
252
|
+
const extensionsLength = (buffer[pos] << 8) + buffer[pos + 1];
|
|
253
|
+
log(`Extensions length: ${extensionsLength}`);
|
|
254
|
+
pos += 2;
|
|
255
|
+
// Extensions end position
|
|
256
|
+
const extensionsEnd = pos + extensionsLength;
|
|
257
|
+
// Check if extensions length is valid
|
|
258
|
+
if (extensionsEnd > buffer.length) {
|
|
259
|
+
result.error = 'Extensions length exceeds buffer size';
|
|
260
|
+
return result;
|
|
261
|
+
}
|
|
262
|
+
// Iterate through extensions
|
|
263
|
+
const serverNames = [];
|
|
264
|
+
while (pos + 4 <= extensionsEnd) {
|
|
265
|
+
// Parse extension type (2 bytes, big-endian)
|
|
266
|
+
const extensionType = (buffer[pos] << 8) + buffer[pos + 1];
|
|
267
|
+
log(`Extension type: 0x${extensionType.toString(16).padStart(4, '0')}`);
|
|
268
|
+
pos += 2;
|
|
269
|
+
// Parse extension length (2 bytes, big-endian)
|
|
270
|
+
const extensionLength = (buffer[pos] << 8) + buffer[pos + 1];
|
|
271
|
+
log(`Extension length: ${extensionLength}`);
|
|
272
|
+
pos += 2;
|
|
273
|
+
// Extract extension data
|
|
274
|
+
if (pos + extensionLength > extensionsEnd) {
|
|
275
|
+
result.error = `Extension ${extensionType} data exceeds bounds`;
|
|
276
|
+
return result;
|
|
277
|
+
}
|
|
278
|
+
const extensionData = buffer.slice(pos, pos + extensionLength);
|
|
279
|
+
// Record all extensions
|
|
280
|
+
result.extensions.push({
|
|
281
|
+
type: extensionType,
|
|
282
|
+
length: extensionLength,
|
|
283
|
+
data: extensionData
|
|
284
|
+
});
|
|
285
|
+
// Track specific extension types
|
|
286
|
+
if (extensionType === TlsExtensionType.SERVER_NAME) {
|
|
287
|
+
// Server Name Indication (SNI)
|
|
288
|
+
this.parseServerNameExtension(extensionData, serverNames, logger);
|
|
289
|
+
}
|
|
290
|
+
else if (extensionType === TlsExtensionType.SESSION_TICKET) {
|
|
291
|
+
// Session ticket
|
|
292
|
+
result.hasSessionTicket = true;
|
|
293
|
+
}
|
|
294
|
+
else if (extensionType === TlsExtensionType.PRE_SHARED_KEY) {
|
|
295
|
+
// TLS 1.3 PSK
|
|
296
|
+
result.hasPsk = true;
|
|
297
|
+
}
|
|
298
|
+
else if (extensionType === TlsExtensionType.EARLY_DATA) {
|
|
299
|
+
// TLS 1.3 Early Data (0-RTT)
|
|
300
|
+
result.hasEarlyData = true;
|
|
301
|
+
}
|
|
302
|
+
// Move to next extension
|
|
303
|
+
pos += extensionLength;
|
|
304
|
+
}
|
|
305
|
+
// Store any server names found
|
|
306
|
+
if (serverNames.length > 0) {
|
|
307
|
+
result.serverNameList = serverNames;
|
|
308
|
+
}
|
|
309
|
+
// Mark as valid if we get here
|
|
310
|
+
result.isValid = true;
|
|
311
|
+
return result;
|
|
312
|
+
}
|
|
313
|
+
catch (error) {
|
|
314
|
+
const errorMessage = error instanceof Error ? error.message : String(error);
|
|
315
|
+
log(`Error parsing ClientHello: ${errorMessage}`);
|
|
316
|
+
result.error = errorMessage;
|
|
317
|
+
return result;
|
|
318
|
+
}
|
|
319
|
+
}
|
|
320
|
+
/**
|
|
321
|
+
* Parses the server name extension data and extracts hostnames
|
|
322
|
+
*
|
|
323
|
+
* @param data Extension data buffer
|
|
324
|
+
* @param serverNames Array to populate with found server names
|
|
325
|
+
* @param logger Optional logging function
|
|
326
|
+
* @returns true if parsing succeeded
|
|
327
|
+
*/
|
|
328
|
+
static parseServerNameExtension(data, serverNames, logger) {
|
|
329
|
+
const log = logger || (() => { });
|
|
330
|
+
try {
|
|
331
|
+
// Need at least 2 bytes for server name list length
|
|
332
|
+
if (data.length < 2) {
|
|
333
|
+
log('SNI extension too small for server name list length');
|
|
334
|
+
return false;
|
|
335
|
+
}
|
|
336
|
+
// Parse server name list length (2 bytes)
|
|
337
|
+
const listLength = (data[0] << 8) + data[1];
|
|
338
|
+
// Skip to first name entry
|
|
339
|
+
let pos = 2;
|
|
340
|
+
// End of list
|
|
341
|
+
const listEnd = pos + listLength;
|
|
342
|
+
// Validate length
|
|
343
|
+
if (listEnd > data.length) {
|
|
344
|
+
log('SNI server name list exceeds extension data');
|
|
345
|
+
return false;
|
|
346
|
+
}
|
|
347
|
+
// Process all name entries
|
|
348
|
+
while (pos + 3 <= listEnd) {
|
|
349
|
+
// Name type (1 byte)
|
|
350
|
+
const nameType = data[pos];
|
|
351
|
+
pos += 1;
|
|
352
|
+
// For hostname, type must be 0
|
|
353
|
+
if (nameType !== 0) {
|
|
354
|
+
// Skip this entry
|
|
355
|
+
if (pos + 2 <= listEnd) {
|
|
356
|
+
const nameLength = (data[pos] << 8) + data[pos + 1];
|
|
357
|
+
pos += 2 + nameLength;
|
|
358
|
+
continue;
|
|
359
|
+
}
|
|
360
|
+
else {
|
|
361
|
+
log('Malformed SNI entry');
|
|
362
|
+
return false;
|
|
363
|
+
}
|
|
364
|
+
}
|
|
365
|
+
// Parse hostname length (2 bytes)
|
|
366
|
+
if (pos + 2 > listEnd) {
|
|
367
|
+
log('SNI extension truncated');
|
|
368
|
+
return false;
|
|
369
|
+
}
|
|
370
|
+
const nameLength = (data[pos] << 8) + data[pos + 1];
|
|
371
|
+
pos += 2;
|
|
372
|
+
// Extract hostname
|
|
373
|
+
if (pos + nameLength > listEnd) {
|
|
374
|
+
log('SNI hostname truncated');
|
|
375
|
+
return false;
|
|
376
|
+
}
|
|
377
|
+
// Extract the hostname as UTF-8
|
|
378
|
+
try {
|
|
379
|
+
const hostname = data.slice(pos, pos + nameLength).toString('utf8');
|
|
380
|
+
log(`Found SNI hostname: ${hostname}`);
|
|
381
|
+
serverNames.push(hostname);
|
|
382
|
+
}
|
|
383
|
+
catch (err) {
|
|
384
|
+
log(`Error extracting hostname: ${err}`);
|
|
385
|
+
}
|
|
386
|
+
// Move to next entry
|
|
387
|
+
pos += nameLength;
|
|
388
|
+
}
|
|
389
|
+
return serverNames.length > 0;
|
|
390
|
+
}
|
|
391
|
+
catch (error) {
|
|
392
|
+
log(`Error parsing SNI extension: ${error}`);
|
|
393
|
+
return false;
|
|
394
|
+
}
|
|
395
|
+
}
|
|
396
|
+
/**
|
|
397
|
+
* Determines if a ClientHello contains session resumption indicators
|
|
398
|
+
*
|
|
399
|
+
* @param buffer The ClientHello buffer
|
|
400
|
+
* @param logger Optional logging function
|
|
401
|
+
* @returns Session resumption result
|
|
402
|
+
*/
|
|
403
|
+
static hasSessionResumption(buffer, logger) {
|
|
404
|
+
const log = logger || (() => { });
|
|
405
|
+
if (!TlsUtils.isClientHello(buffer)) {
|
|
406
|
+
return { isResumption: false, hasSNI: false };
|
|
407
|
+
}
|
|
408
|
+
const parseResult = this.parseClientHello(buffer, logger);
|
|
409
|
+
if (!parseResult.isValid) {
|
|
410
|
+
log(`ClientHello parse failed: ${parseResult.error}`);
|
|
411
|
+
return { isResumption: false, hasSNI: false };
|
|
412
|
+
}
|
|
413
|
+
// Check resumption indicators
|
|
414
|
+
const hasSessionId = parseResult.hasSessionId;
|
|
415
|
+
const hasSessionTicket = parseResult.hasSessionTicket;
|
|
416
|
+
const hasPsk = parseResult.hasPsk;
|
|
417
|
+
const hasEarlyData = parseResult.hasEarlyData;
|
|
418
|
+
// Check for SNI
|
|
419
|
+
const hasSNI = !!parseResult.serverNameList && parseResult.serverNameList.length > 0;
|
|
420
|
+
// Consider it a resumption if any resumption mechanism is present
|
|
421
|
+
const isResumption = hasSessionTicket || hasPsk || hasEarlyData ||
|
|
422
|
+
(hasSessionId && !hasPsk); // Legacy resumption
|
|
423
|
+
// Log details
|
|
424
|
+
if (isResumption) {
|
|
425
|
+
log('Session resumption detected: ' +
|
|
426
|
+
(hasSessionTicket ? 'session ticket, ' : '') +
|
|
427
|
+
(hasPsk ? 'PSK, ' : '') +
|
|
428
|
+
(hasEarlyData ? 'early data, ' : '') +
|
|
429
|
+
(hasSessionId ? 'session ID' : '') +
|
|
430
|
+
(hasSNI ? ', with SNI' : ', without SNI'));
|
|
431
|
+
}
|
|
432
|
+
return { isResumption, hasSNI };
|
|
433
|
+
}
|
|
434
|
+
/**
|
|
435
|
+
* Checks if a ClientHello appears to be from a tab reactivation
|
|
436
|
+
*
|
|
437
|
+
* @param buffer The ClientHello buffer
|
|
438
|
+
* @param logger Optional logging function
|
|
439
|
+
* @returns true if it appears to be a tab reactivation
|
|
440
|
+
*/
|
|
441
|
+
static isTabReactivationHandshake(buffer, logger) {
|
|
442
|
+
const log = logger || (() => { });
|
|
443
|
+
if (!TlsUtils.isClientHello(buffer)) {
|
|
444
|
+
return false;
|
|
445
|
+
}
|
|
446
|
+
// Parse the ClientHello
|
|
447
|
+
const parseResult = this.parseClientHello(buffer, logger);
|
|
448
|
+
if (!parseResult.isValid) {
|
|
449
|
+
return false;
|
|
450
|
+
}
|
|
451
|
+
// Tab reactivation pattern: session identifier + (ticket or PSK) but no SNI
|
|
452
|
+
const hasSessionId = parseResult.hasSessionId;
|
|
453
|
+
const hasSessionTicket = parseResult.hasSessionTicket;
|
|
454
|
+
const hasPsk = parseResult.hasPsk;
|
|
455
|
+
const hasSNI = !!parseResult.serverNameList && parseResult.serverNameList.length > 0;
|
|
456
|
+
if ((hasSessionId && (hasSessionTicket || hasPsk)) && !hasSNI) {
|
|
457
|
+
log('Detected tab reactivation pattern: session resumption without SNI');
|
|
458
|
+
return true;
|
|
459
|
+
}
|
|
460
|
+
return false;
|
|
461
|
+
}
|
|
462
|
+
}
|
|
463
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"client-hello-parser.js","sourceRoot":"","sources":["../../../../ts/protocols/tls/sni/client-hello-parser.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,QAAQ,CAAC;AAChC,OAAO,EACL,aAAa,EACb,gBAAgB,EAChB,gBAAgB,EAChB,QAAQ,EACT,MAAM,uBAAuB,CAAC;AAoD/B;;GAEG;AACH,MAAM,OAAO,iBAAiB;IAC5B,sDAAsD;aACvC,sBAAiB,GAAsC,IAAI,GAAG,EAAE,CAAC;aACjE,oBAAe,GAAW,IAAI,CAAC,GAAC,0CAA0C;IAEzF;;OAEG;IACK,MAAM,CAAC,uBAAuB;QACpC,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACvB,KAAK,MAAM,CAAC,YAAY,EAAE,IAAI,CAAC,IAAI,IAAI,CAAC,iBAAiB,CAAC,OAAO,EAAE,EAAE,CAAC;YACpE,IAAI,GAAG,GAAG,IAAI,CAAC,SAAS,GAAG,IAAI,CAAC,eAAe,EAAE,CAAC;gBAChD,IAAI,CAAC,iBAAiB,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;YAC9C,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;;;;;OAQG;IACI,MAAM,CAAC,2BAA2B,CACvC,MAAc,EACd,YAAoB,EACpB,MAAuB;QAEvB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,GAAG,EAAE,GAAE,CAAC,CAAC,CAAC;QAEjC,0CAA0C;QAC1C,IAAI,CAAC,uBAAuB,EAAE,CAAC;QAE/B,6CAA6C;QAC7C,IAAI,CAAC,IAAI,CAAC,iBAAiB,CAAC,GAAG,CAAC,YAAY,CAAC,EAAE,CAAC;YAC9C,yCAAyC;YACzC,IAAI,CAAC,iBAAiB,CAAC,GAAG,CAAC,YAAY,EAAE;gBACvC,MAAM;gBACN,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;gBACrB,YAAY;aACb,CAAC,CAAC;YAEH,kEAAkE;YAClE,IAAI,CAAC;gBACH,IAAI,MAAM,CAAC,MAAM,IAAI,CAAC,EAAE,CAAC;oBACvB,wCAAwC;oBACxC,MAAM,YAAY,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,sCAAsC;oBAC7F,GAAG,CAAC,wBAAwB,MAAM,CAAC,MAAM,6BAA6B,YAAY,EAAE,CAAC,CAAC;oBAEtF,8DAA8D;oBAC9D,IAAI,MAAM,CAAC,MAAM,IAAI,YAAY,EAAE,CAAC;wBAClC,GAAG,CAAC,yDAAyD,MAAM,CAAC,MAAM,EAAE,CAAC,CAAC;wBAC9E,OAAO,MAAM,CAAC;oBAChB,CAAC;gBACH,CAAC;qBAAM,CAAC;oBACN,GAAG,CACD,6BAA6B,MAAM,CAAC,MAAM,gDAAgD,CAC3F,CAAC;gBACJ,CAAC;YACH,CAAC;YAAC,OAAO,CAAC,EAAE,CAAC;gBACX,GAAG,CAAC,+CAA+C,CAAC,EAAE,CAAC,CAAC;YAC1D,CAAC;YAED,GAAG,CAAC,gCAAgC,YAAY,mBAAmB,MAAM,CAAC,MAAM,EAAE,CAAC,CAAC;YACpF,OAAO,SAAS,CAAC,CAAC,sBAAsB;QAC1C,CAAC;aAAM,CAAC;YACN,0CAA0C;YAC1C,MAAM,YAAY,GAAG,IAAI,CAAC,iBAAiB,CAAC,GAAG,CAAC,YAAY,CAAE,CAAC;YAC/D,MAAM,SAAS,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC,YAAY,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC,CAAC;YAE/D,kCAAkC;YAClC,IAAI,CAAC,iBAAiB,CAAC,GAAG,CAAC,YAAY,EAAE;gBACvC,GAAG,YAAY;gBACf,MAAM,EAAE,SAAS;gBACjB,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;aACtB,CAAC,CAAC;YAEH,GAAG,CAAC,0BAA0B,YAAY,eAAe,SAAS,CAAC,MAAM,EAAE,CAAC,CAAC;YAE7E,8CAA8C;YAC9C,IAAI,CAAC;gBACH,IAAI,SAAS,CAAC,MAAM,IAAI,CAAC,EAAE,CAAC;oBAC1B,wCAAwC;oBACxC,MAAM,YAAY,GAAG,CAAC,SAAS,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,SAAS,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,sCAAsC;oBACnG,GAAG,CACD,4BAA4B,SAAS,CAAC,MAAM,6BAA6B,YAAY,EAAE,CACxF,CAAC;oBAEF,6CAA6C;oBAC7C,IAAI,SAAS,CAAC,MAAM,IAAI,YAAY,EAAE,CAAC;wBACrC,GAAG,CACD,2CAA2C,SAAS,CAAC,MAAM,aAAa,YAAY,EAAE,CACvF,CAAC;wBAEF,mEAAmE;wBACnE,MAAM,cAAc,GAAG,SAAS,CAAC,KAAK,CAAC,CAAC,EAAE,YAAY,CAAC,CAAC;wBAExD,sEAAsE;wBACtE,IACE,cAAc,CAAC,MAAM,GAAG,CAAC;4BACzB,cAAc,CAAC,CAAC,CAAC,KAAK,gBAAgB,CAAC,YAAY,EACnD,CAAC;4BACD,GAAG,CAAC,oDAAoD,CAAC,CAAC;4BAE1D,kDAAkD;4BAClD,IAAI,CAAC,iBAAiB,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;4BAC5C,OAAO,cAAc,CAAC;wBACxB,CAAC;6BAAM,CAAC;4BACN,GAAG,CAAC,0EAA0E,CAAC,CAAC;4BAChF,kEAAkE;4BAElE,oEAAoE;4BACpE,IAAI,SAAS,CAAC,MAAM,GAAG,YAAY,GAAG,CAAC,EAAE,CAAC;gCACxC,MAAM,cAAc,GAAG,SAAS,CAAC,YAAY,CAAC,CAAC;gCAC/C,GAAG,CACD,qBAAqB,cAAc,iBAAiB,aAAa,CAAC,SAAS,GAAG,CAC/E,CAAC;gCAEF,IAAI,cAAc,KAAK,aAAa,CAAC,SAAS,EAAE,CAAC;oCAC/C,MAAM,aAAa,GAAG,SAAS,CAAC,YAAY,GAAG,CAAC,CAAC,CAAC;oCAClD,GAAG,CACD,wBAAwB,aAAa,iBAAiB,gBAAgB,CAAC,YAAY,GAAG,CACvF,CAAC;oCAEF,IAAI,aAAa,KAAK,gBAAgB,CAAC,YAAY,EAAE,CAAC;wCACpD,mEAAmE;wCACnE,GAAG,CAAC,+DAA+D,CAAC,CAAC;wCACrE,IAAI,CAAC,iBAAiB,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;wCAC5C,OAAO,SAAS,CAAC;oCACnB,CAAC;gCACH,CAAC;4BACH,CAAC;wBACH,CAAC;oBACH,CAAC;gBACH,CAAC;YACH,CAAC;YAAC,OAAO,CAAC,EAAE,CAAC;gBACX,GAAG,CAAC,mDAAmD,CAAC,EAAE,CAAC,CAAC;YAC9D,CAAC;YAED,OAAO,SAAS,CAAC,CAAC,4BAA4B;QAChD,CAAC;IACH,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,gBAAgB,CAC5B,MAAc,EACd,MAAuB;QAEvB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,GAAG,EAAE,GAAE,CAAC,CAAC,CAAC;QACjC,MAAM,MAAM,GAA2B;YACrC,OAAO,EAAE,KAAK;YACd,YAAY,EAAE,KAAK;YACnB,UAAU,EAAE,EAAE;YACd,gBAAgB,EAAE,KAAK;YACvB,MAAM,EAAE,KAAK;YACb,YAAY,EAAE,KAAK;SACpB,CAAC;QAEF,IAAI,CAAC;YACH,uBAAuB;YACvB,IAAI,MAAM,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBACtB,MAAM,CAAC,KAAK,GAAG,wCAAwC,CAAC;gBACxD,OAAO,MAAM,CAAC;YAChB,CAAC;YAED,wCAAwC;YACxC,IAAI,MAAM,CAAC,CAAC,CAAC,KAAK,aAAa,CAAC,SAAS,EAAE,CAAC;gBAC1C,MAAM,CAAC,KAAK,GAAG,+BAA+B,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC;gBAC1D,OAAO,MAAM,CAAC;YAChB,CAAC;YAED,qCAAqC;YACrC,MAAM,YAAY,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;YAC/B,MAAM,YAAY,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;YAC/B,MAAM,CAAC,OAAO,GAAG,CAAC,YAAY,EAAE,YAAY,CAAC,CAAC;YAC9C,GAAG,CAAC,uBAAuB,YAAY,IAAI,YAAY,EAAE,CAAC,CAAC;YAE3D,8CAA8C;YAC9C,MAAM,YAAY,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;YAClD,GAAG,CAAC,kBAAkB,YAAY,EAAE,CAAC,CAAC;YAEtC,6CAA6C;YAC7C,IAAI,MAAM,CAAC,MAAM,GAAG,YAAY,GAAG,CAAC,EAAE,CAAC;gBACrC,MAAM,CAAC,KAAK,GAAG,4CAA4C,CAAC;gBAC5D,OAAO,MAAM,CAAC;YAChB,CAAC;YAED,2CAA2C;YAC3C,IAAI,GAAG,GAAG,CAAC,CAAC;YAEZ,8CAA8C;YAC9C,IAAI,MAAM,CAAC,GAAG,CAAC,KAAK,gBAAgB,CAAC,YAAY,EAAE,CAAC;gBAClD,MAAM,CAAC,KAAK,GAAG,8BAA8B,MAAM,CAAC,GAAG,CAAC,EAAE,CAAC;gBAC3D,OAAO,MAAM,CAAC;YAChB,CAAC;YAED,+BAA+B;YAC/B,GAAG,IAAI,CAAC,CAAC;YAET,+CAA+C;YAC/C,MAAM,eAAe,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,EAAE,CAAC,GAAG,CAAC,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;YACvF,GAAG,CAAC,qBAAqB,eAAe,EAAE,CAAC,CAAC;YAE5C,kCAAkC;YAClC,GAAG,IAAI,CAAC,CAAC;YAET,iCAAiC;YACjC,MAAM,kBAAkB,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;YACvC,MAAM,kBAAkB,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;YAC3C,GAAG,CAAC,mBAAmB,kBAAkB,IAAI,kBAAkB,EAAE,CAAC,CAAC;YAEnE,gCAAgC;YAChC,GAAG,IAAI,CAAC,CAAC;YAET,mCAAmC;YACnC,IAAI,GAAG,GAAG,EAAE,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAC7B,MAAM,CAAC,KAAK,GAAG,oCAAoC,CAAC;gBACpD,OAAO,MAAM,CAAC;YAChB,CAAC;YAED,MAAM,CAAC,MAAM,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,EAAE,GAAG,GAAG,EAAE,CAAC,CAAC;YAC5C,GAAG,CAAC,kBAAkB,MAAM,CAAC,MAAM,CAAC,QAAQ,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC;YAEvD,gCAAgC;YAChC,GAAG,IAAI,EAAE,CAAC;YAEV,mBAAmB;YACnB,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAC5B,MAAM,CAAC,KAAK,GAAG,wCAAwC,CAAC;gBACxD,OAAO,MAAM,CAAC;YAChB,CAAC;YAED,MAAM,eAAe,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;YACpC,GAAG,CAAC,sBAAsB,eAAe,EAAE,CAAC,CAAC;YAC7C,GAAG,IAAI,CAAC,CAAC;YAET,MAAM,CAAC,YAAY,GAAG,eAAe,GAAG,CAAC,CAAC;YAE1C,IAAI,eAAe,GAAG,CAAC,EAAE,CAAC;gBACxB,IAAI,GAAG,GAAG,eAAe,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;oBAC1C,MAAM,CAAC,KAAK,GAAG,iCAAiC,CAAC;oBACjD,OAAO,MAAM,CAAC;gBAChB,CAAC;gBAED,MAAM,CAAC,SAAS,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,EAAE,GAAG,GAAG,eAAe,CAAC,CAAC;gBAC5D,GAAG,CAAC,eAAe,MAAM,CAAC,SAAS,CAAC,QAAQ,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC;YACzD,CAAC;YAED,kBAAkB;YAClB,GAAG,IAAI,eAAe,CAAC;YAEvB,uDAAuD;YACvD,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAC5B,MAAM,CAAC,KAAK,GAAG,2CAA2C,CAAC;gBAC3D,OAAO,MAAM,CAAC;YAChB,CAAC;YAED,mDAAmD;YACnD,MAAM,kBAAkB,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;YAChE,GAAG,CAAC,yBAAyB,kBAAkB,EAAE,CAAC,CAAC;YACnD,GAAG,IAAI,CAAC,CAAC;YAET,wBAAwB;YACxB,IAAI,GAAG,GAAG,kBAAkB,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAC7C,MAAM,CAAC,KAAK,GAAG,oCAAoC,CAAC;gBACpD,OAAO,MAAM,CAAC;YAChB,CAAC;YAED,MAAM,CAAC,YAAY,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,EAAE,GAAG,GAAG,kBAAkB,CAAC,CAAC;YAElE,qBAAqB;YACrB,GAAG,IAAI,kBAAkB,CAAC;YAE1B,6DAA6D;YAC7D,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAC5B,MAAM,CAAC,KAAK,GAAG,iDAAiD,CAAC;gBACjE,OAAO,MAAM,CAAC;YAChB,CAAC;YAED,4CAA4C;YAC5C,MAAM,wBAAwB,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;YAC7C,GAAG,CAAC,+BAA+B,wBAAwB,EAAE,CAAC,CAAC;YAC/D,GAAG,IAAI,CAAC,CAAC;YAET,8BAA8B;YAC9B,IAAI,GAAG,GAAG,wBAAwB,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBACnD,MAAM,CAAC,KAAK,GAAG,0CAA0C,CAAC;gBAC1D,OAAO,MAAM,CAAC;YAChB,CAAC;YAED,MAAM,CAAC,kBAAkB,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,EAAE,GAAG,GAAG,wBAAwB,CAAC,CAAC;YAE9E,2BAA2B;YAC3B,GAAG,IAAI,wBAAwB,CAAC;YAEhC,sDAAsD;YACtD,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAC5B,+DAA+D;gBAC/D,MAAM,CAAC,OAAO,GAAG,IAAI,CAAC;gBACtB,OAAO,MAAM,CAAC;YAChB,CAAC;YAED,gDAAgD;YAChD,MAAM,gBAAgB,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;YAC9D,GAAG,CAAC,sBAAsB,gBAAgB,EAAE,CAAC,CAAC;YAC9C,GAAG,IAAI,CAAC,CAAC;YAET,0BAA0B;YAC1B,MAAM,aAAa,GAAG,GAAG,GAAG,gBAAgB,CAAC;YAE7C,sCAAsC;YACtC,IAAI,aAAa,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAClC,MAAM,CAAC,KAAK,GAAG,uCAAuC,CAAC;gBACvD,OAAO,MAAM,CAAC;YAChB,CAAC;YAED,6BAA6B;YAC7B,MAAM,WAAW,GAAa,EAAE,CAAC;YAEjC,OAAO,GAAG,GAAG,CAAC,IAAI,aAAa,EAAE,CAAC;gBAChC,6CAA6C;gBAC7C,MAAM,aAAa,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;gBAC3D,GAAG,CAAC,qBAAqB,aAAa,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,QAAQ,CAAC,CAAC,EAAE,GAAG,CAAC,EAAE,CAAC,CAAC;gBACxE,GAAG,IAAI,CAAC,CAAC;gBAET,+CAA+C;gBAC/C,MAAM,eAAe,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;gBAC7D,GAAG,CAAC,qBAAqB,eAAe,EAAE,CAAC,CAAC;gBAC5C,GAAG,IAAI,CAAC,CAAC;gBAET,yBAAyB;gBACzB,IAAI,GAAG,GAAG,eAAe,GAAG,aAAa,EAAE,CAAC;oBAC1C,MAAM,CAAC,KAAK,GAAG,aAAa,aAAa,sBAAsB,CAAC;oBAChE,OAAO,MAAM,CAAC;gBAChB,CAAC;gBAED,MAAM,aAAa,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,EAAE,GAAG,GAAG,eAAe,CAAC,CAAC;gBAE/D,wBAAwB;gBACxB,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC;oBACrB,IAAI,EAAE,aAAa;oBACnB,MAAM,EAAE,eAAe;oBACvB,IAAI,EAAE,aAAa;iBACpB,CAAC,CAAC;gBAEH,iCAAiC;gBACjC,IAAI,aAAa,KAAK,gBAAgB,CAAC,WAAW,EAAE,CAAC;oBACnD,+BAA+B;oBAC/B,IAAI,CAAC,wBAAwB,CAAC,aAAa,EAAE,WAAW,EAAE,MAAM,CAAC,CAAC;gBACpE,CAAC;qBAAM,IAAI,aAAa,KAAK,gBAAgB,CAAC,cAAc,EAAE,CAAC;oBAC7D,iBAAiB;oBACjB,MAAM,CAAC,gBAAgB,GAAG,IAAI,CAAC;gBACjC,CAAC;qBAAM,IAAI,aAAa,KAAK,gBAAgB,CAAC,cAAc,EAAE,CAAC;oBAC7D,cAAc;oBACd,MAAM,CAAC,MAAM,GAAG,IAAI,CAAC;gBACvB,CAAC;qBAAM,IAAI,aAAa,KAAK,gBAAgB,CAAC,UAAU,EAAE,CAAC;oBACzD,6BAA6B;oBAC7B,MAAM,CAAC,YAAY,GAAG,IAAI,CAAC;gBAC7B,CAAC;gBAED,yBAAyB;gBACzB,GAAG,IAAI,eAAe,CAAC;YACzB,CAAC;YAED,+BAA+B;YAC/B,IAAI,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAC3B,MAAM,CAAC,cAAc,GAAG,WAAW,CAAC;YACtC,CAAC;YAED,+BAA+B;YAC/B,MAAM,CAAC,OAAO,GAAG,IAAI,CAAC;YACtB,OAAO,MAAM,CAAC;QAChB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,YAAY,GAAG,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;YAC5E,GAAG,CAAC,8BAA8B,YAAY,EAAE,CAAC,CAAC;YAClD,MAAM,CAAC,KAAK,GAAG,YAAY,CAAC;YAC5B,OAAO,MAAM,CAAC;QAChB,CAAC;IACH,CAAC;IAED;;;;;;;OAOG;IACK,MAAM,CAAC,wBAAwB,CACrC,IAAY,EACZ,WAAqB,EACrB,MAAuB;QAEvB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,GAAG,EAAE,GAAE,CAAC,CAAC,CAAC;QAEjC,IAAI,CAAC;YACH,oDAAoD;YACpD,IAAI,IAAI,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBACpB,GAAG,CAAC,qDAAqD,CAAC,CAAC;gBAC3D,OAAO,KAAK,CAAC;YACf,CAAC;YAED,0CAA0C;YAC1C,MAAM,UAAU,GAAG,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,CAAC;YAE5C,2BAA2B;YAC3B,IAAI,GAAG,GAAG,CAAC,CAAC;YAEZ,cAAc;YACd,MAAM,OAAO,GAAG,GAAG,GAAG,UAAU,CAAC;YAEjC,kBAAkB;YAClB,IAAI,OAAO,GAAG,IAAI,CAAC,MAAM,EAAE,CAAC;gBAC1B,GAAG,CAAC,6CAA6C,CAAC,CAAC;gBACnD,OAAO,KAAK,CAAC;YACf,CAAC;YAED,2BAA2B;YAC3B,OAAO,GAAG,GAAG,CAAC,IAAI,OAAO,EAAE,CAAC;gBAC1B,qBAAqB;gBACrB,MAAM,QAAQ,GAAG,IAAI,CAAC,GAAG,CAAC,CAAC;gBAC3B,GAAG,IAAI,CAAC,CAAC;gBAET,+BAA+B;gBAC/B,IAAI,QAAQ,KAAK,CAAC,EAAE,CAAC;oBACnB,kBAAkB;oBAClB,IAAI,GAAG,GAAG,CAAC,IAAI,OAAO,EAAE,CAAC;wBACvB,MAAM,UAAU,GAAG,CAAC,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,IAAI,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;wBACpD,GAAG,IAAI,CAAC,GAAG,UAAU,CAAC;wBACtB,SAAS;oBACX,CAAC;yBAAM,CAAC;wBACN,GAAG,CAAC,qBAAqB,CAAC,CAAC;wBAC3B,OAAO,KAAK,CAAC;oBACf,CAAC;gBACH,CAAC;gBAED,kCAAkC;gBAClC,IAAI,GAAG,GAAG,CAAC,GAAG,OAAO,EAAE,CAAC;oBACtB,GAAG,CAAC,yBAAyB,CAAC,CAAC;oBAC/B,OAAO,KAAK,CAAC;gBACf,CAAC;gBAED,MAAM,UAAU,GAAG,CAAC,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,IAAI,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;gBACpD,GAAG,IAAI,CAAC,CAAC;gBAET,mBAAmB;gBACnB,IAAI,GAAG,GAAG,UAAU,GAAG,OAAO,EAAE,CAAC;oBAC/B,GAAG,CAAC,wBAAwB,CAAC,CAAC;oBAC9B,OAAO,KAAK,CAAC;gBACf,CAAC;gBAED,gCAAgC;gBAChC,IAAI,CAAC;oBACH,MAAM,QAAQ,GAAG,IAAI,CAAC,KAAK,CAAC,GAAG,EAAE,GAAG,GAAG,UAAU,CAAC,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;oBACpE,GAAG,CAAC,uBAAuB,QAAQ,EAAE,CAAC,CAAC;oBACvC,WAAW,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;gBAC7B,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,GAAG,CAAC,8BAA8B,GAAG,EAAE,CAAC,CAAC;gBAC3C,CAAC;gBAED,qBAAqB;gBACrB,GAAG,IAAI,UAAU,CAAC;YACpB,CAAC;YAED,OAAO,WAAW,CAAC,MAAM,GAAG,CAAC,CAAC;QAChC,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,GAAG,CAAC,gCAAgC,KAAK,EAAE,CAAC,CAAC;YAC7C,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,oBAAoB,CAChC,MAAc,EACd,MAAuB;QAEvB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,GAAG,EAAE,GAAE,CAAC,CAAC,CAAC;QAEjC,IAAI,CAAC,QAAQ,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;YACpC,OAAO,EAAE,YAAY,EAAE,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE,CAAC;QAChD,CAAC;QAED,MAAM,WAAW,GAAG,IAAI,CAAC,gBAAgB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;QAC1D,IAAI,CAAC,WAAW,CAAC,OAAO,EAAE,CAAC;YACzB,GAAG,CAAC,6BAA6B,WAAW,CAAC,KAAK,EAAE,CAAC,CAAC;YACtD,OAAO,EAAE,YAAY,EAAE,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE,CAAC;QAChD,CAAC;QAED,8BAA8B;QAC9B,MAAM,YAAY,GAAG,WAAW,CAAC,YAAY,CAAC;QAC9C,MAAM,gBAAgB,GAAG,WAAW,CAAC,gBAAgB,CAAC;QACtD,MAAM,MAAM,GAAG,WAAW,CAAC,MAAM,CAAC;QAClC,MAAM,YAAY,GAAG,WAAW,CAAC,YAAY,CAAC;QAE9C,gBAAgB;QAChB,MAAM,MAAM,GAAG,CAAC,CAAC,WAAW,CAAC,cAAc,IAAI,WAAW,CAAC,cAAc,CAAC,MAAM,GAAG,CAAC,CAAC;QAErF,kEAAkE;QAClE,MAAM,YAAY,GAAG,gBAAgB,IAAI,MAAM,IAAI,YAAY;YAC1C,CAAC,YAAY,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,oBAAoB;QAEpE,cAAc;QACd,IAAI,YAAY,EAAE,CAAC;YACjB,GAAG,CACD,+BAA+B;gBAC/B,CAAC,gBAAgB,CAAC,CAAC,CAAC,kBAAkB,CAAC,CAAC,CAAC,EAAE,CAAC;gBAC5C,CAAC,MAAM,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,CAAC;gBACvB,CAAC,YAAY,CAAC,CAAC,CAAC,cAAc,CAAC,CAAC,CAAC,EAAE,CAAC;gBACpC,CAAC,YAAY,CAAC,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,EAAE,CAAC;gBAClC,CAAC,MAAM,CAAC,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,eAAe,CAAC,CAC1C,CAAC;QACJ,CAAC;QAED,OAAO,EAAE,YAAY,EAAE,MAAM,EAAE,CAAC;IAClC,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,0BAA0B,CACtC,MAAc,EACd,MAAuB;QAEvB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,GAAG,EAAE,GAAE,CAAC,CAAC,CAAC;QAEjC,IAAI,CAAC,QAAQ,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;YACpC,OAAO,KAAK,CAAC;QACf,CAAC;QAED,wBAAwB;QACxB,MAAM,WAAW,GAAG,IAAI,CAAC,gBAAgB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;QAC1D,IAAI,CAAC,WAAW,CAAC,OAAO,EAAE,CAAC;YACzB,OAAO,KAAK,CAAC;QACf,CAAC;QAED,4EAA4E;QAC5E,MAAM,YAAY,GAAG,WAAW,CAAC,YAAY,CAAC;QAC9C,MAAM,gBAAgB,GAAG,WAAW,CAAC,gBAAgB,CAAC;QACtD,MAAM,MAAM,GAAG,WAAW,CAAC,MAAM,CAAC;QAClC,MAAM,MAAM,GAAG,CAAC,CAAC,WAAW,CAAC,cAAc,IAAI,WAAW,CAAC,cAAc,CAAC,MAAM,GAAG,CAAC,CAAC;QAErF,IAAI,CAAC,YAAY,IAAI,CAAC,gBAAgB,IAAI,MAAM,CAAC,CAAC,IAAI,CAAC,MAAM,EAAE,CAAC;YAC9D,GAAG,CAAC,mEAAmE,CAAC,CAAC;YACzE,OAAO,IAAI,CAAC;QACd,CAAC;QAED,OAAO,KAAK,CAAC;IACf,CAAC"}
|
|
@@ -0,0 +1,6 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* TLS SNI (Server Name Indication) protocol utilities
|
|
3
|
+
*/
|
|
4
|
+
export * from './client-hello-parser.js';
|
|
5
|
+
export * from './sni-extraction.js';
|
|
6
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi8uLi90cy9wcm90b2NvbHMvdGxzL3NuaS9pbmRleC50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiQUFBQTs7R0FFRztBQUVILGNBQWMsMEJBQTBCLENBQUM7QUFDekMsY0FBYyxxQkFBcUIsQ0FBQyJ9
|
|
@@ -0,0 +1,58 @@
|
|
|
1
|
+
import { Buffer } from 'buffer';
|
|
2
|
+
import { type LoggerFunction } from './client-hello-parser.js';
|
|
3
|
+
/**
|
|
4
|
+
* Connection tracking information
|
|
5
|
+
*/
|
|
6
|
+
export interface ConnectionInfo {
|
|
7
|
+
sourceIp: string;
|
|
8
|
+
sourcePort: number;
|
|
9
|
+
destIp: string;
|
|
10
|
+
destPort: number;
|
|
11
|
+
timestamp?: number;
|
|
12
|
+
}
|
|
13
|
+
/**
|
|
14
|
+
* Utilities for extracting SNI information from TLS handshakes
|
|
15
|
+
*/
|
|
16
|
+
export declare class SniExtraction {
|
|
17
|
+
/**
|
|
18
|
+
* Extracts the SNI (Server Name Indication) from a TLS ClientHello message.
|
|
19
|
+
*
|
|
20
|
+
* @param buffer The buffer containing the TLS ClientHello message
|
|
21
|
+
* @param logger Optional logging function
|
|
22
|
+
* @returns The extracted server name or undefined if not found
|
|
23
|
+
*/
|
|
24
|
+
static extractSNI(buffer: Buffer, logger?: LoggerFunction): string | undefined;
|
|
25
|
+
/**
|
|
26
|
+
* Attempts to extract SNI from the PSK extension in a TLS 1.3 ClientHello.
|
|
27
|
+
*
|
|
28
|
+
* In TLS 1.3, when a client attempts to resume a session, it may include
|
|
29
|
+
* the server name in the PSK identity hint rather than in the SNI extension.
|
|
30
|
+
*
|
|
31
|
+
* @param buffer The buffer containing the TLS ClientHello message
|
|
32
|
+
* @param logger Optional logging function
|
|
33
|
+
* @returns The extracted server name or undefined if not found
|
|
34
|
+
*/
|
|
35
|
+
static extractSNIFromPSKExtension(buffer: Buffer, logger?: LoggerFunction): string | undefined;
|
|
36
|
+
/**
|
|
37
|
+
* Main entry point for SNI extraction with support for fragmented messages
|
|
38
|
+
* and session resumption edge cases.
|
|
39
|
+
*
|
|
40
|
+
* @param buffer The buffer containing TLS data
|
|
41
|
+
* @param connectionInfo Connection tracking information
|
|
42
|
+
* @param logger Optional logging function
|
|
43
|
+
* @param cachedSni Optional previously cached SNI value
|
|
44
|
+
* @returns The extracted server name or undefined
|
|
45
|
+
*/
|
|
46
|
+
static extractSNIWithResumptionSupport(buffer: Buffer, connectionInfo?: ConnectionInfo, logger?: LoggerFunction, cachedSni?: string): string | undefined;
|
|
47
|
+
/**
|
|
48
|
+
* Unified method for processing a TLS packet and extracting SNI.
|
|
49
|
+
* Main entry point for SNI extraction that handles all edge cases.
|
|
50
|
+
*
|
|
51
|
+
* @param buffer The buffer containing TLS data
|
|
52
|
+
* @param connectionInfo Connection tracking information
|
|
53
|
+
* @param logger Optional logging function
|
|
54
|
+
* @param cachedSni Optional previously cached SNI value
|
|
55
|
+
* @returns The extracted server name or undefined
|
|
56
|
+
*/
|
|
57
|
+
static processTlsPacket(buffer: Buffer, connectionInfo: ConnectionInfo, logger?: LoggerFunction, cachedSni?: string): string | undefined;
|
|
58
|
+
}
|