@push.rocks/smartproxy 21.0.0 → 21.1.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (146) hide show
  1. package/changelog.md +18 -0
  2. package/dist_ts/core/utils/proxy-protocol.d.ts +5 -17
  3. package/dist_ts/core/utils/proxy-protocol.js +13 -97
  4. package/dist_ts/core/utils/websocket-utils.d.ts +6 -7
  5. package/dist_ts/core/utils/websocket-utils.js +10 -66
  6. package/dist_ts/detection/detectors/http-detector-v2.d.ts +33 -0
  7. package/dist_ts/detection/detectors/http-detector-v2.js +87 -0
  8. package/dist_ts/detection/detectors/http-detector.d.ts +33 -0
  9. package/dist_ts/detection/detectors/http-detector.js +89 -0
  10. package/dist_ts/detection/detectors/quick-detector.d.ts +28 -0
  11. package/dist_ts/detection/detectors/quick-detector.js +131 -0
  12. package/dist_ts/detection/detectors/routing-extractor.d.ts +28 -0
  13. package/dist_ts/detection/detectors/routing-extractor.js +122 -0
  14. package/dist_ts/detection/detectors/tls-detector-v2.d.ts +33 -0
  15. package/dist_ts/detection/detectors/tls-detector-v2.js +80 -0
  16. package/dist_ts/detection/detectors/tls-detector.d.ts +55 -0
  17. package/dist_ts/detection/detectors/tls-detector.js +206 -0
  18. package/dist_ts/detection/index.d.ts +17 -0
  19. package/dist_ts/detection/index.js +22 -0
  20. package/dist_ts/detection/models/detection-types.d.ts +87 -0
  21. package/dist_ts/detection/models/detection-types.js +5 -0
  22. package/dist_ts/detection/models/interfaces.d.ts +97 -0
  23. package/dist_ts/detection/models/interfaces.js +5 -0
  24. package/dist_ts/detection/protocol-detector-v2.d.ts +46 -0
  25. package/dist_ts/detection/protocol-detector-v2.js +116 -0
  26. package/dist_ts/detection/protocol-detector.d.ts +74 -0
  27. package/dist_ts/detection/protocol-detector.js +173 -0
  28. package/dist_ts/detection/utils/buffer-utils.d.ts +61 -0
  29. package/dist_ts/detection/utils/buffer-utils.js +127 -0
  30. package/dist_ts/detection/utils/fragment-manager.d.ts +31 -0
  31. package/dist_ts/detection/utils/fragment-manager.js +53 -0
  32. package/dist_ts/detection/utils/parser-utils.d.ts +42 -0
  33. package/dist_ts/detection/utils/parser-utils.js +63 -0
  34. package/dist_ts/index.d.ts +2 -0
  35. package/dist_ts/index.js +3 -1
  36. package/dist_ts/protocols/common/fragment-handler.d.ts +73 -0
  37. package/dist_ts/protocols/common/fragment-handler.js +117 -0
  38. package/dist_ts/protocols/common/index.d.ts +7 -0
  39. package/dist_ts/protocols/common/index.js +8 -0
  40. package/dist_ts/protocols/common/types.d.ts +68 -0
  41. package/dist_ts/protocols/common/types.js +7 -0
  42. package/dist_ts/protocols/http/constants.d.ts +119 -0
  43. package/dist_ts/protocols/http/constants.js +200 -0
  44. package/dist_ts/protocols/http/index.d.ts +7 -0
  45. package/dist_ts/protocols/http/index.js +8 -0
  46. package/dist_ts/protocols/http/parser.d.ts +58 -0
  47. package/dist_ts/protocols/http/parser.js +184 -0
  48. package/dist_ts/protocols/http/types.d.ts +62 -0
  49. package/dist_ts/protocols/http/types.js +5 -0
  50. package/dist_ts/protocols/index.d.ts +11 -0
  51. package/dist_ts/protocols/index.js +12 -0
  52. package/dist_ts/protocols/proxy/index.d.ts +6 -0
  53. package/dist_ts/protocols/proxy/index.js +7 -0
  54. package/dist_ts/protocols/proxy/parser.d.ts +44 -0
  55. package/dist_ts/protocols/proxy/parser.js +153 -0
  56. package/dist_ts/protocols/proxy/types.d.ts +47 -0
  57. package/dist_ts/protocols/proxy/types.js +6 -0
  58. package/dist_ts/protocols/tls/alerts/index.d.ts +4 -0
  59. package/dist_ts/protocols/tls/alerts/index.js +5 -0
  60. package/dist_ts/protocols/tls/alerts/tls-alert.d.ts +150 -0
  61. package/dist_ts/protocols/tls/alerts/tls-alert.js +226 -0
  62. package/dist_ts/protocols/tls/constants.d.ts +122 -0
  63. package/dist_ts/protocols/tls/constants.js +135 -0
  64. package/dist_ts/protocols/tls/index.d.ts +12 -0
  65. package/dist_ts/protocols/tls/index.js +27 -0
  66. package/dist_ts/protocols/tls/parser.d.ts +53 -0
  67. package/dist_ts/protocols/tls/parser.js +294 -0
  68. package/dist_ts/protocols/tls/sni/client-hello-parser.d.ts +100 -0
  69. package/dist_ts/protocols/tls/sni/client-hello-parser.js +463 -0
  70. package/dist_ts/protocols/tls/sni/index.d.ts +5 -0
  71. package/dist_ts/protocols/tls/sni/index.js +6 -0
  72. package/dist_ts/protocols/tls/sni/sni-extraction.d.ts +58 -0
  73. package/dist_ts/protocols/tls/sni/sni-extraction.js +275 -0
  74. package/dist_ts/protocols/tls/types.d.ts +65 -0
  75. package/dist_ts/protocols/tls/types.js +5 -0
  76. package/dist_ts/protocols/tls/utils/index.d.ts +4 -0
  77. package/dist_ts/protocols/tls/utils/index.js +5 -0
  78. package/dist_ts/protocols/tls/utils/tls-utils.d.ts +158 -0
  79. package/dist_ts/protocols/tls/utils/tls-utils.js +187 -0
  80. package/dist_ts/protocols/websocket/constants.d.ts +55 -0
  81. package/dist_ts/protocols/websocket/constants.js +58 -0
  82. package/dist_ts/protocols/websocket/index.d.ts +7 -0
  83. package/dist_ts/protocols/websocket/index.js +8 -0
  84. package/dist_ts/protocols/websocket/types.d.ts +47 -0
  85. package/dist_ts/protocols/websocket/types.js +5 -0
  86. package/dist_ts/protocols/websocket/utils.d.ts +25 -0
  87. package/dist_ts/protocols/websocket/utils.js +103 -0
  88. package/dist_ts/proxies/http-proxy/models/http-types.d.ts +25 -27
  89. package/dist_ts/proxies/http-proxy/models/http-types.js +24 -44
  90. package/dist_ts/proxies/smart-proxy/models/interfaces.d.ts +5 -0
  91. package/dist_ts/proxies/smart-proxy/route-connection-handler.js +81 -61
  92. package/dist_ts/proxies/smart-proxy/tls-manager.js +2 -1
  93. package/dist_ts/proxies/smart-proxy/utils/route-helpers.d.ts +2 -0
  94. package/dist_ts/proxies/smart-proxy/utils/route-helpers.js +61 -52
  95. package/dist_ts/tls/index.d.ts +5 -7
  96. package/dist_ts/tls/index.js +8 -11
  97. package/dist_ts/tls/sni/client-hello-parser.js +3 -2
  98. package/dist_ts/tls/sni/sni-handler.js +4 -4
  99. package/dist_ts/tls/utils/tls-utils.d.ts +1 -110
  100. package/dist_ts/tls/utils/tls-utils.js +4 -116
  101. package/package.json +1 -1
  102. package/readme.plan.md +0 -0
  103. package/ts/core/utils/proxy-protocol.ts +14 -131
  104. package/ts/core/utils/websocket-utils.ts +12 -60
  105. package/ts/detection/detectors/http-detector.ts +114 -0
  106. package/ts/detection/detectors/quick-detector.ts +148 -0
  107. package/ts/detection/detectors/routing-extractor.ts +147 -0
  108. package/ts/detection/detectors/tls-detector.ts +252 -0
  109. package/ts/detection/index.ts +25 -0
  110. package/ts/detection/models/detection-types.ts +102 -0
  111. package/ts/detection/models/interfaces.ts +115 -0
  112. package/ts/detection/protocol-detector.ts +230 -0
  113. package/ts/detection/utils/buffer-utils.ts +141 -0
  114. package/ts/detection/utils/fragment-manager.ts +64 -0
  115. package/ts/detection/utils/parser-utils.ts +77 -0
  116. package/ts/index.ts +3 -1
  117. package/ts/protocols/common/fragment-handler.ts +163 -0
  118. package/ts/protocols/common/index.ts +8 -0
  119. package/ts/protocols/common/types.ts +76 -0
  120. package/ts/protocols/http/constants.ts +219 -0
  121. package/ts/protocols/http/index.ts +8 -0
  122. package/ts/protocols/http/parser.ts +219 -0
  123. package/ts/protocols/http/types.ts +70 -0
  124. package/ts/protocols/index.ts +12 -0
  125. package/ts/protocols/proxy/index.ts +7 -0
  126. package/ts/protocols/proxy/parser.ts +183 -0
  127. package/ts/protocols/proxy/types.ts +53 -0
  128. package/ts/{tls → protocols/tls}/alerts/tls-alert.ts +1 -1
  129. package/ts/protocols/tls/index.ts +37 -0
  130. package/ts/protocols/tls/sni/index.ts +6 -0
  131. package/ts/{tls → protocols/tls}/utils/tls-utils.ts +1 -1
  132. package/ts/protocols/websocket/constants.ts +60 -0
  133. package/ts/protocols/websocket/index.ts +8 -0
  134. package/ts/protocols/websocket/types.ts +53 -0
  135. package/ts/protocols/websocket/utils.ts +98 -0
  136. package/ts/proxies/http-proxy/models/http-types.ts +29 -46
  137. package/ts/proxies/smart-proxy/models/interfaces.ts +7 -0
  138. package/ts/proxies/smart-proxy/route-connection-handler.ts +91 -68
  139. package/ts/proxies/smart-proxy/tls-manager.ts +1 -0
  140. package/ts/proxies/smart-proxy/utils/route-helpers.ts +72 -56
  141. package/ts/tls/index.ts +8 -12
  142. package/ts/tls/sni/sni-handler.ts +3 -3
  143. /package/ts/{tls → protocols/tls}/alerts/index.ts +0 -0
  144. /package/ts/{tls → protocols/tls}/sni/client-hello-parser.ts +0 -0
  145. /package/ts/{tls → protocols/tls}/sni/sni-extraction.ts +0 -0
  146. /package/ts/{tls → protocols/tls}/utils/index.ts +0 -0
@@ -0,0 +1,463 @@
1
+ import { Buffer } from 'buffer';
2
+ import { TlsRecordType, TlsHandshakeType, TlsExtensionType, TlsUtils } from '../utils/tls-utils.js';
3
+ /**
4
+ * Class for parsing TLS ClientHello messages
5
+ */
6
+ export class ClientHelloParser {
7
+ // Buffer for handling fragmented ClientHello messages
8
+ static { this.fragmentedBuffers = new Map(); }
9
+ static { this.fragmentTimeout = 1000; } // ms to wait for fragments before cleanup
10
+ /**
11
+ * Clean up expired fragments
12
+ */
13
+ static cleanupExpiredFragments() {
14
+ const now = Date.now();
15
+ for (const [connectionId, info] of this.fragmentedBuffers.entries()) {
16
+ if (now - info.timestamp > this.fragmentTimeout) {
17
+ this.fragmentedBuffers.delete(connectionId);
18
+ }
19
+ }
20
+ }
21
+ /**
22
+ * Handles potential fragmented ClientHello messages by buffering and reassembling
23
+ * TLS record fragments that might span multiple TCP packets.
24
+ *
25
+ * @param buffer The current buffer fragment
26
+ * @param connectionId Unique identifier for the connection
27
+ * @param logger Optional logging function
28
+ * @returns A complete buffer if reassembly is successful, or undefined if more fragments are needed
29
+ */
30
+ static handleFragmentedClientHello(buffer, connectionId, logger) {
31
+ const log = logger || (() => { });
32
+ // Periodically clean up expired fragments
33
+ this.cleanupExpiredFragments();
34
+ // Check if we've seen this connection before
35
+ if (!this.fragmentedBuffers.has(connectionId)) {
36
+ // New connection, start with this buffer
37
+ this.fragmentedBuffers.set(connectionId, {
38
+ buffer,
39
+ timestamp: Date.now(),
40
+ connectionId
41
+ });
42
+ // Evaluate if this buffer already contains a complete ClientHello
43
+ try {
44
+ if (buffer.length >= 5) {
45
+ // Get the record length from TLS header
46
+ const recordLength = (buffer[3] << 8) + buffer[4] + 5; // +5 for the TLS record header itself
47
+ log(`Initial buffer size: ${buffer.length}, expected record length: ${recordLength}`);
48
+ // Check if this buffer already contains a complete TLS record
49
+ if (buffer.length >= recordLength) {
50
+ log(`Initial buffer contains complete ClientHello, length: ${buffer.length}`);
51
+ return buffer;
52
+ }
53
+ }
54
+ else {
55
+ log(`Initial buffer too small (${buffer.length} bytes), needs at least 5 bytes for TLS header`);
56
+ }
57
+ }
58
+ catch (e) {
59
+ log(`Error checking initial buffer completeness: ${e}`);
60
+ }
61
+ log(`Started buffering connection ${connectionId}, initial size: ${buffer.length}`);
62
+ return undefined; // Need more fragments
63
+ }
64
+ else {
65
+ // Existing connection, append this buffer
66
+ const existingInfo = this.fragmentedBuffers.get(connectionId);
67
+ const newBuffer = Buffer.concat([existingInfo.buffer, buffer]);
68
+ // Update the buffer and timestamp
69
+ this.fragmentedBuffers.set(connectionId, {
70
+ ...existingInfo,
71
+ buffer: newBuffer,
72
+ timestamp: Date.now()
73
+ });
74
+ log(`Appended to buffer for ${connectionId}, new size: ${newBuffer.length}`);
75
+ // Check if we now have a complete ClientHello
76
+ try {
77
+ if (newBuffer.length >= 5) {
78
+ // Get the record length from TLS header
79
+ const recordLength = (newBuffer[3] << 8) + newBuffer[4] + 5; // +5 for the TLS record header itself
80
+ log(`Reassembled buffer size: ${newBuffer.length}, expected record length: ${recordLength}`);
81
+ // Check if we have a complete TLS record now
82
+ if (newBuffer.length >= recordLength) {
83
+ log(`Assembled complete ClientHello, length: ${newBuffer.length}, needed: ${recordLength}`);
84
+ // Extract the complete TLS record (might be followed by more data)
85
+ const completeRecord = newBuffer.slice(0, recordLength);
86
+ // Check if this record is indeed a ClientHello (type 1) at position 5
87
+ if (completeRecord.length > 5 &&
88
+ completeRecord[5] === TlsHandshakeType.CLIENT_HELLO) {
89
+ log(`Verified record is a ClientHello handshake message`);
90
+ // Complete message received, remove from tracking
91
+ this.fragmentedBuffers.delete(connectionId);
92
+ return completeRecord;
93
+ }
94
+ else {
95
+ log(`Record is complete but not a ClientHello handshake, continuing to buffer`);
96
+ // This might be another TLS record type preceding the ClientHello
97
+ // Try checking for a ClientHello starting at the end of this record
98
+ if (newBuffer.length > recordLength + 5) {
99
+ const nextRecordType = newBuffer[recordLength];
100
+ log(`Next record type: ${nextRecordType} (looking for ${TlsRecordType.HANDSHAKE})`);
101
+ if (nextRecordType === TlsRecordType.HANDSHAKE) {
102
+ const handshakeType = newBuffer[recordLength + 5];
103
+ log(`Next handshake type: ${handshakeType} (looking for ${TlsHandshakeType.CLIENT_HELLO})`);
104
+ if (handshakeType === TlsHandshakeType.CLIENT_HELLO) {
105
+ // Found a ClientHello in the next record, return the entire buffer
106
+ log(`Found ClientHello in subsequent record, returning full buffer`);
107
+ this.fragmentedBuffers.delete(connectionId);
108
+ return newBuffer;
109
+ }
110
+ }
111
+ }
112
+ }
113
+ }
114
+ }
115
+ }
116
+ catch (e) {
117
+ log(`Error checking reassembled buffer completeness: ${e}`);
118
+ }
119
+ return undefined; // Still need more fragments
120
+ }
121
+ }
122
+ /**
123
+ * Parses a TLS ClientHello message and extracts all components
124
+ *
125
+ * @param buffer The buffer containing the ClientHello message
126
+ * @param logger Optional logging function
127
+ * @returns Parsed ClientHello or undefined if parsing failed
128
+ */
129
+ static parseClientHello(buffer, logger) {
130
+ const log = logger || (() => { });
131
+ const result = {
132
+ isValid: false,
133
+ hasSessionId: false,
134
+ extensions: [],
135
+ hasSessionTicket: false,
136
+ hasPsk: false,
137
+ hasEarlyData: false
138
+ };
139
+ try {
140
+ // Check basic validity
141
+ if (buffer.length < 5) {
142
+ result.error = 'Buffer too small for TLS record header';
143
+ return result;
144
+ }
145
+ // Check record type (must be HANDSHAKE)
146
+ if (buffer[0] !== TlsRecordType.HANDSHAKE) {
147
+ result.error = `Not a TLS handshake record: ${buffer[0]}`;
148
+ return result;
149
+ }
150
+ // Get TLS version from record header
151
+ const majorVersion = buffer[1];
152
+ const minorVersion = buffer[2];
153
+ result.version = [majorVersion, minorVersion];
154
+ log(`TLS record version: ${majorVersion}.${minorVersion}`);
155
+ // Parse record length (bytes 3-4, big-endian)
156
+ const recordLength = (buffer[3] << 8) + buffer[4];
157
+ log(`Record length: ${recordLength}`);
158
+ // Validate record length against buffer size
159
+ if (buffer.length < recordLength + 5) {
160
+ result.error = 'Buffer smaller than expected record length';
161
+ return result;
162
+ }
163
+ // Start of handshake message in the buffer
164
+ let pos = 5;
165
+ // Check handshake type (must be CLIENT_HELLO)
166
+ if (buffer[pos] !== TlsHandshakeType.CLIENT_HELLO) {
167
+ result.error = `Not a ClientHello message: ${buffer[pos]}`;
168
+ return result;
169
+ }
170
+ // Skip handshake type (1 byte)
171
+ pos += 1;
172
+ // Parse handshake length (3 bytes, big-endian)
173
+ const handshakeLength = (buffer[pos] << 16) + (buffer[pos + 1] << 8) + buffer[pos + 2];
174
+ log(`Handshake length: ${handshakeLength}`);
175
+ // Skip handshake length (3 bytes)
176
+ pos += 3;
177
+ // Check client version (2 bytes)
178
+ const clientMajorVersion = buffer[pos];
179
+ const clientMinorVersion = buffer[pos + 1];
180
+ log(`Client version: ${clientMajorVersion}.${clientMinorVersion}`);
181
+ // Skip client version (2 bytes)
182
+ pos += 2;
183
+ // Extract client random (32 bytes)
184
+ if (pos + 32 > buffer.length) {
185
+ result.error = 'Buffer too small for client random';
186
+ return result;
187
+ }
188
+ result.random = buffer.slice(pos, pos + 32);
189
+ log(`Client random: ${result.random.toString('hex')}`);
190
+ // Skip client random (32 bytes)
191
+ pos += 32;
192
+ // Parse session ID
193
+ if (pos + 1 > buffer.length) {
194
+ result.error = 'Buffer too small for session ID length';
195
+ return result;
196
+ }
197
+ const sessionIdLength = buffer[pos];
198
+ log(`Session ID length: ${sessionIdLength}`);
199
+ pos += 1;
200
+ result.hasSessionId = sessionIdLength > 0;
201
+ if (sessionIdLength > 0) {
202
+ if (pos + sessionIdLength > buffer.length) {
203
+ result.error = 'Buffer too small for session ID';
204
+ return result;
205
+ }
206
+ result.sessionId = buffer.slice(pos, pos + sessionIdLength);
207
+ log(`Session ID: ${result.sessionId.toString('hex')}`);
208
+ }
209
+ // Skip session ID
210
+ pos += sessionIdLength;
211
+ // Check if we have enough bytes left for cipher suites
212
+ if (pos + 2 > buffer.length) {
213
+ result.error = 'Buffer too small for cipher suites length';
214
+ return result;
215
+ }
216
+ // Parse cipher suites length (2 bytes, big-endian)
217
+ const cipherSuitesLength = (buffer[pos] << 8) + buffer[pos + 1];
218
+ log(`Cipher suites length: ${cipherSuitesLength}`);
219
+ pos += 2;
220
+ // Extract cipher suites
221
+ if (pos + cipherSuitesLength > buffer.length) {
222
+ result.error = 'Buffer too small for cipher suites';
223
+ return result;
224
+ }
225
+ result.cipherSuites = buffer.slice(pos, pos + cipherSuitesLength);
226
+ // Skip cipher suites
227
+ pos += cipherSuitesLength;
228
+ // Check if we have enough bytes left for compression methods
229
+ if (pos + 1 > buffer.length) {
230
+ result.error = 'Buffer too small for compression methods length';
231
+ return result;
232
+ }
233
+ // Parse compression methods length (1 byte)
234
+ const compressionMethodsLength = buffer[pos];
235
+ log(`Compression methods length: ${compressionMethodsLength}`);
236
+ pos += 1;
237
+ // Extract compression methods
238
+ if (pos + compressionMethodsLength > buffer.length) {
239
+ result.error = 'Buffer too small for compression methods';
240
+ return result;
241
+ }
242
+ result.compressionMethods = buffer.slice(pos, pos + compressionMethodsLength);
243
+ // Skip compression methods
244
+ pos += compressionMethodsLength;
245
+ // Check if we have enough bytes for extensions length
246
+ if (pos + 2 > buffer.length) {
247
+ // No extensions present - this is valid for older TLS versions
248
+ result.isValid = true;
249
+ return result;
250
+ }
251
+ // Parse extensions length (2 bytes, big-endian)
252
+ const extensionsLength = (buffer[pos] << 8) + buffer[pos + 1];
253
+ log(`Extensions length: ${extensionsLength}`);
254
+ pos += 2;
255
+ // Extensions end position
256
+ const extensionsEnd = pos + extensionsLength;
257
+ // Check if extensions length is valid
258
+ if (extensionsEnd > buffer.length) {
259
+ result.error = 'Extensions length exceeds buffer size';
260
+ return result;
261
+ }
262
+ // Iterate through extensions
263
+ const serverNames = [];
264
+ while (pos + 4 <= extensionsEnd) {
265
+ // Parse extension type (2 bytes, big-endian)
266
+ const extensionType = (buffer[pos] << 8) + buffer[pos + 1];
267
+ log(`Extension type: 0x${extensionType.toString(16).padStart(4, '0')}`);
268
+ pos += 2;
269
+ // Parse extension length (2 bytes, big-endian)
270
+ const extensionLength = (buffer[pos] << 8) + buffer[pos + 1];
271
+ log(`Extension length: ${extensionLength}`);
272
+ pos += 2;
273
+ // Extract extension data
274
+ if (pos + extensionLength > extensionsEnd) {
275
+ result.error = `Extension ${extensionType} data exceeds bounds`;
276
+ return result;
277
+ }
278
+ const extensionData = buffer.slice(pos, pos + extensionLength);
279
+ // Record all extensions
280
+ result.extensions.push({
281
+ type: extensionType,
282
+ length: extensionLength,
283
+ data: extensionData
284
+ });
285
+ // Track specific extension types
286
+ if (extensionType === TlsExtensionType.SERVER_NAME) {
287
+ // Server Name Indication (SNI)
288
+ this.parseServerNameExtension(extensionData, serverNames, logger);
289
+ }
290
+ else if (extensionType === TlsExtensionType.SESSION_TICKET) {
291
+ // Session ticket
292
+ result.hasSessionTicket = true;
293
+ }
294
+ else if (extensionType === TlsExtensionType.PRE_SHARED_KEY) {
295
+ // TLS 1.3 PSK
296
+ result.hasPsk = true;
297
+ }
298
+ else if (extensionType === TlsExtensionType.EARLY_DATA) {
299
+ // TLS 1.3 Early Data (0-RTT)
300
+ result.hasEarlyData = true;
301
+ }
302
+ // Move to next extension
303
+ pos += extensionLength;
304
+ }
305
+ // Store any server names found
306
+ if (serverNames.length > 0) {
307
+ result.serverNameList = serverNames;
308
+ }
309
+ // Mark as valid if we get here
310
+ result.isValid = true;
311
+ return result;
312
+ }
313
+ catch (error) {
314
+ const errorMessage = error instanceof Error ? error.message : String(error);
315
+ log(`Error parsing ClientHello: ${errorMessage}`);
316
+ result.error = errorMessage;
317
+ return result;
318
+ }
319
+ }
320
+ /**
321
+ * Parses the server name extension data and extracts hostnames
322
+ *
323
+ * @param data Extension data buffer
324
+ * @param serverNames Array to populate with found server names
325
+ * @param logger Optional logging function
326
+ * @returns true if parsing succeeded
327
+ */
328
+ static parseServerNameExtension(data, serverNames, logger) {
329
+ const log = logger || (() => { });
330
+ try {
331
+ // Need at least 2 bytes for server name list length
332
+ if (data.length < 2) {
333
+ log('SNI extension too small for server name list length');
334
+ return false;
335
+ }
336
+ // Parse server name list length (2 bytes)
337
+ const listLength = (data[0] << 8) + data[1];
338
+ // Skip to first name entry
339
+ let pos = 2;
340
+ // End of list
341
+ const listEnd = pos + listLength;
342
+ // Validate length
343
+ if (listEnd > data.length) {
344
+ log('SNI server name list exceeds extension data');
345
+ return false;
346
+ }
347
+ // Process all name entries
348
+ while (pos + 3 <= listEnd) {
349
+ // Name type (1 byte)
350
+ const nameType = data[pos];
351
+ pos += 1;
352
+ // For hostname, type must be 0
353
+ if (nameType !== 0) {
354
+ // Skip this entry
355
+ if (pos + 2 <= listEnd) {
356
+ const nameLength = (data[pos] << 8) + data[pos + 1];
357
+ pos += 2 + nameLength;
358
+ continue;
359
+ }
360
+ else {
361
+ log('Malformed SNI entry');
362
+ return false;
363
+ }
364
+ }
365
+ // Parse hostname length (2 bytes)
366
+ if (pos + 2 > listEnd) {
367
+ log('SNI extension truncated');
368
+ return false;
369
+ }
370
+ const nameLength = (data[pos] << 8) + data[pos + 1];
371
+ pos += 2;
372
+ // Extract hostname
373
+ if (pos + nameLength > listEnd) {
374
+ log('SNI hostname truncated');
375
+ return false;
376
+ }
377
+ // Extract the hostname as UTF-8
378
+ try {
379
+ const hostname = data.slice(pos, pos + nameLength).toString('utf8');
380
+ log(`Found SNI hostname: ${hostname}`);
381
+ serverNames.push(hostname);
382
+ }
383
+ catch (err) {
384
+ log(`Error extracting hostname: ${err}`);
385
+ }
386
+ // Move to next entry
387
+ pos += nameLength;
388
+ }
389
+ return serverNames.length > 0;
390
+ }
391
+ catch (error) {
392
+ log(`Error parsing SNI extension: ${error}`);
393
+ return false;
394
+ }
395
+ }
396
+ /**
397
+ * Determines if a ClientHello contains session resumption indicators
398
+ *
399
+ * @param buffer The ClientHello buffer
400
+ * @param logger Optional logging function
401
+ * @returns Session resumption result
402
+ */
403
+ static hasSessionResumption(buffer, logger) {
404
+ const log = logger || (() => { });
405
+ if (!TlsUtils.isClientHello(buffer)) {
406
+ return { isResumption: false, hasSNI: false };
407
+ }
408
+ const parseResult = this.parseClientHello(buffer, logger);
409
+ if (!parseResult.isValid) {
410
+ log(`ClientHello parse failed: ${parseResult.error}`);
411
+ return { isResumption: false, hasSNI: false };
412
+ }
413
+ // Check resumption indicators
414
+ const hasSessionId = parseResult.hasSessionId;
415
+ const hasSessionTicket = parseResult.hasSessionTicket;
416
+ const hasPsk = parseResult.hasPsk;
417
+ const hasEarlyData = parseResult.hasEarlyData;
418
+ // Check for SNI
419
+ const hasSNI = !!parseResult.serverNameList && parseResult.serverNameList.length > 0;
420
+ // Consider it a resumption if any resumption mechanism is present
421
+ const isResumption = hasSessionTicket || hasPsk || hasEarlyData ||
422
+ (hasSessionId && !hasPsk); // Legacy resumption
423
+ // Log details
424
+ if (isResumption) {
425
+ log('Session resumption detected: ' +
426
+ (hasSessionTicket ? 'session ticket, ' : '') +
427
+ (hasPsk ? 'PSK, ' : '') +
428
+ (hasEarlyData ? 'early data, ' : '') +
429
+ (hasSessionId ? 'session ID' : '') +
430
+ (hasSNI ? ', with SNI' : ', without SNI'));
431
+ }
432
+ return { isResumption, hasSNI };
433
+ }
434
+ /**
435
+ * Checks if a ClientHello appears to be from a tab reactivation
436
+ *
437
+ * @param buffer The ClientHello buffer
438
+ * @param logger Optional logging function
439
+ * @returns true if it appears to be a tab reactivation
440
+ */
441
+ static isTabReactivationHandshake(buffer, logger) {
442
+ const log = logger || (() => { });
443
+ if (!TlsUtils.isClientHello(buffer)) {
444
+ return false;
445
+ }
446
+ // Parse the ClientHello
447
+ const parseResult = this.parseClientHello(buffer, logger);
448
+ if (!parseResult.isValid) {
449
+ return false;
450
+ }
451
+ // Tab reactivation pattern: session identifier + (ticket or PSK) but no SNI
452
+ const hasSessionId = parseResult.hasSessionId;
453
+ const hasSessionTicket = parseResult.hasSessionTicket;
454
+ const hasPsk = parseResult.hasPsk;
455
+ const hasSNI = !!parseResult.serverNameList && parseResult.serverNameList.length > 0;
456
+ if ((hasSessionId && (hasSessionTicket || hasPsk)) && !hasSNI) {
457
+ log('Detected tab reactivation pattern: session resumption without SNI');
458
+ return true;
459
+ }
460
+ return false;
461
+ }
462
+ }
463
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"client-hello-parser.js","sourceRoot":"","sources":["../../../../ts/protocols/tls/sni/client-hello-parser.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,QAAQ,CAAC;AAChC,OAAO,EACL,aAAa,EACb,gBAAgB,EAChB,gBAAgB,EAChB,QAAQ,EACT,MAAM,uBAAuB,CAAC;AAoD/B;;GAEG;AACH,MAAM,OAAO,iBAAiB;IAC5B,sDAAsD;aACvC,sBAAiB,GAAsC,IAAI,GAAG,EAAE,CAAC;aACjE,oBAAe,GAAW,IAAI,CAAC,GAAC,0CAA0C;IAEzF;;OAEG;IACK,MAAM,CAAC,uBAAuB;QACpC,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACvB,KAAK,MAAM,CAAC,YAAY,EAAE,IAAI,CAAC,IAAI,IAAI,CAAC,iBAAiB,CAAC,OAAO,EAAE,EAAE,CAAC;YACpE,IAAI,GAAG,GAAG,IAAI,CAAC,SAAS,GAAG,IAAI,CAAC,eAAe,EAAE,CAAC;gBAChD,IAAI,CAAC,iBAAiB,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;YAC9C,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;;;;;OAQG;IACI,MAAM,CAAC,2BAA2B,CACvC,MAAc,EACd,YAAoB,EACpB,MAAuB;QAEvB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,GAAG,EAAE,GAAE,CAAC,CAAC,CAAC;QAEjC,0CAA0C;QAC1C,IAAI,CAAC,uBAAuB,EAAE,CAAC;QAE/B,6CAA6C;QAC7C,IAAI,CAAC,IAAI,CAAC,iBAAiB,CAAC,GAAG,CAAC,YAAY,CAAC,EAAE,CAAC;YAC9C,yCAAyC;YACzC,IAAI,CAAC,iBAAiB,CAAC,GAAG,CAAC,YAAY,EAAE;gBACvC,MAAM;gBACN,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;gBACrB,YAAY;aACb,CAAC,CAAC;YAEH,kEAAkE;YAClE,IAAI,CAAC;gBACH,IAAI,MAAM,CAAC,MAAM,IAAI,CAAC,EAAE,CAAC;oBACvB,wCAAwC;oBACxC,MAAM,YAAY,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,sCAAsC;oBAC7F,GAAG,CAAC,wBAAwB,MAAM,CAAC,MAAM,6BAA6B,YAAY,EAAE,CAAC,CAAC;oBAEtF,8DAA8D;oBAC9D,IAAI,MAAM,CAAC,MAAM,IAAI,YAAY,EAAE,CAAC;wBAClC,GAAG,CAAC,yDAAyD,MAAM,CAAC,MAAM,EAAE,CAAC,CAAC;wBAC9E,OAAO,MAAM,CAAC;oBAChB,CAAC;gBACH,CAAC;qBAAM,CAAC;oBACN,GAAG,CACD,6BAA6B,MAAM,CAAC,MAAM,gDAAgD,CAC3F,CAAC;gBACJ,CAAC;YACH,CAAC;YAAC,OAAO,CAAC,EAAE,CAAC;gBACX,GAAG,CAAC,+CAA+C,CAAC,EAAE,CAAC,CAAC;YAC1D,CAAC;YAED,GAAG,CAAC,gCAAgC,YAAY,mBAAmB,MAAM,CAAC,MAAM,EAAE,CAAC,CAAC;YACpF,OAAO,SAAS,CAAC,CAAC,sBAAsB;QAC1C,CAAC;aAAM,CAAC;YACN,0CAA0C;YAC1C,MAAM,YAAY,GAAG,IAAI,CAAC,iBAAiB,CAAC,GAAG,CAAC,YAAY,CAAE,CAAC;YAC/D,MAAM,SAAS,GAAG,MAAM,CAAC,MAAM,CAAC,CAAC,YAAY,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC,CAAC;YAE/D,kCAAkC;YAClC,IAAI,CAAC,iBAAiB,CAAC,GAAG,CAAC,YAAY,EAAE;gBACvC,GAAG,YAAY;gBACf,MAAM,EAAE,SAAS;gBACjB,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;aACtB,CAAC,CAAC;YAEH,GAAG,CAAC,0BAA0B,YAAY,eAAe,SAAS,CAAC,MAAM,EAAE,CAAC,CAAC;YAE7E,8CAA8C;YAC9C,IAAI,CAAC;gBACH,IAAI,SAAS,CAAC,MAAM,IAAI,CAAC,EAAE,CAAC;oBAC1B,wCAAwC;oBACxC,MAAM,YAAY,GAAG,CAAC,SAAS,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,SAAS,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,sCAAsC;oBACnG,GAAG,CACD,4BAA4B,SAAS,CAAC,MAAM,6BAA6B,YAAY,EAAE,CACxF,CAAC;oBAEF,6CAA6C;oBAC7C,IAAI,SAAS,CAAC,MAAM,IAAI,YAAY,EAAE,CAAC;wBACrC,GAAG,CACD,2CAA2C,SAAS,CAAC,MAAM,aAAa,YAAY,EAAE,CACvF,CAAC;wBAEF,mEAAmE;wBACnE,MAAM,cAAc,GAAG,SAAS,CAAC,KAAK,CAAC,CAAC,EAAE,YAAY,CAAC,CAAC;wBAExD,sEAAsE;wBACtE,IACE,cAAc,CAAC,MAAM,GAAG,CAAC;4BACzB,cAAc,CAAC,CAAC,CAAC,KAAK,gBAAgB,CAAC,YAAY,EACnD,CAAC;4BACD,GAAG,CAAC,oDAAoD,CAAC,CAAC;4BAE1D,kDAAkD;4BAClD,IAAI,CAAC,iBAAiB,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;4BAC5C,OAAO,cAAc,CAAC;wBACxB,CAAC;6BAAM,CAAC;4BACN,GAAG,CAAC,0EAA0E,CAAC,CAAC;4BAChF,kEAAkE;4BAElE,oEAAoE;4BACpE,IAAI,SAAS,CAAC,MAAM,GAAG,YAAY,GAAG,CAAC,EAAE,CAAC;gCACxC,MAAM,cAAc,GAAG,SAAS,CAAC,YAAY,CAAC,CAAC;gCAC/C,GAAG,CACD,qBAAqB,cAAc,iBAAiB,aAAa,CAAC,SAAS,GAAG,CAC/E,CAAC;gCAEF,IAAI,cAAc,KAAK,aAAa,CAAC,SAAS,EAAE,CAAC;oCAC/C,MAAM,aAAa,GAAG,SAAS,CAAC,YAAY,GAAG,CAAC,CAAC,CAAC;oCAClD,GAAG,CACD,wBAAwB,aAAa,iBAAiB,gBAAgB,CAAC,YAAY,GAAG,CACvF,CAAC;oCAEF,IAAI,aAAa,KAAK,gBAAgB,CAAC,YAAY,EAAE,CAAC;wCACpD,mEAAmE;wCACnE,GAAG,CAAC,+DAA+D,CAAC,CAAC;wCACrE,IAAI,CAAC,iBAAiB,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;wCAC5C,OAAO,SAAS,CAAC;oCACnB,CAAC;gCACH,CAAC;4BACH,CAAC;wBACH,CAAC;oBACH,CAAC;gBACH,CAAC;YACH,CAAC;YAAC,OAAO,CAAC,EAAE,CAAC;gBACX,GAAG,CAAC,mDAAmD,CAAC,EAAE,CAAC,CAAC;YAC9D,CAAC;YAED,OAAO,SAAS,CAAC,CAAC,4BAA4B;QAChD,CAAC;IACH,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,gBAAgB,CAC5B,MAAc,EACd,MAAuB;QAEvB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,GAAG,EAAE,GAAE,CAAC,CAAC,CAAC;QACjC,MAAM,MAAM,GAA2B;YACrC,OAAO,EAAE,KAAK;YACd,YAAY,EAAE,KAAK;YACnB,UAAU,EAAE,EAAE;YACd,gBAAgB,EAAE,KAAK;YACvB,MAAM,EAAE,KAAK;YACb,YAAY,EAAE,KAAK;SACpB,CAAC;QAEF,IAAI,CAAC;YACH,uBAAuB;YACvB,IAAI,MAAM,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBACtB,MAAM,CAAC,KAAK,GAAG,wCAAwC,CAAC;gBACxD,OAAO,MAAM,CAAC;YAChB,CAAC;YAED,wCAAwC;YACxC,IAAI,MAAM,CAAC,CAAC,CAAC,KAAK,aAAa,CAAC,SAAS,EAAE,CAAC;gBAC1C,MAAM,CAAC,KAAK,GAAG,+BAA+B,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC;gBAC1D,OAAO,MAAM,CAAC;YAChB,CAAC;YAED,qCAAqC;YACrC,MAAM,YAAY,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;YAC/B,MAAM,YAAY,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;YAC/B,MAAM,CAAC,OAAO,GAAG,CAAC,YAAY,EAAE,YAAY,CAAC,CAAC;YAC9C,GAAG,CAAC,uBAAuB,YAAY,IAAI,YAAY,EAAE,CAAC,CAAC;YAE3D,8CAA8C;YAC9C,MAAM,YAAY,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;YAClD,GAAG,CAAC,kBAAkB,YAAY,EAAE,CAAC,CAAC;YAEtC,6CAA6C;YAC7C,IAAI,MAAM,CAAC,MAAM,GAAG,YAAY,GAAG,CAAC,EAAE,CAAC;gBACrC,MAAM,CAAC,KAAK,GAAG,4CAA4C,CAAC;gBAC5D,OAAO,MAAM,CAAC;YAChB,CAAC;YAED,2CAA2C;YAC3C,IAAI,GAAG,GAAG,CAAC,CAAC;YAEZ,8CAA8C;YAC9C,IAAI,MAAM,CAAC,GAAG,CAAC,KAAK,gBAAgB,CAAC,YAAY,EAAE,CAAC;gBAClD,MAAM,CAAC,KAAK,GAAG,8BAA8B,MAAM,CAAC,GAAG,CAAC,EAAE,CAAC;gBAC3D,OAAO,MAAM,CAAC;YAChB,CAAC;YAED,+BAA+B;YAC/B,GAAG,IAAI,CAAC,CAAC;YAET,+CAA+C;YAC/C,MAAM,eAAe,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,EAAE,CAAC,GAAG,CAAC,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;YACvF,GAAG,CAAC,qBAAqB,eAAe,EAAE,CAAC,CAAC;YAE5C,kCAAkC;YAClC,GAAG,IAAI,CAAC,CAAC;YAET,iCAAiC;YACjC,MAAM,kBAAkB,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;YACvC,MAAM,kBAAkB,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;YAC3C,GAAG,CAAC,mBAAmB,kBAAkB,IAAI,kBAAkB,EAAE,CAAC,CAAC;YAEnE,gCAAgC;YAChC,GAAG,IAAI,CAAC,CAAC;YAET,mCAAmC;YACnC,IAAI,GAAG,GAAG,EAAE,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAC7B,MAAM,CAAC,KAAK,GAAG,oCAAoC,CAAC;gBACpD,OAAO,MAAM,CAAC;YAChB,CAAC;YAED,MAAM,CAAC,MAAM,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,EAAE,GAAG,GAAG,EAAE,CAAC,CAAC;YAC5C,GAAG,CAAC,kBAAkB,MAAM,CAAC,MAAM,CAAC,QAAQ,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC;YAEvD,gCAAgC;YAChC,GAAG,IAAI,EAAE,CAAC;YAEV,mBAAmB;YACnB,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAC5B,MAAM,CAAC,KAAK,GAAG,wCAAwC,CAAC;gBACxD,OAAO,MAAM,CAAC;YAChB,CAAC;YAED,MAAM,eAAe,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;YACpC,GAAG,CAAC,sBAAsB,eAAe,EAAE,CAAC,CAAC;YAC7C,GAAG,IAAI,CAAC,CAAC;YAET,MAAM,CAAC,YAAY,GAAG,eAAe,GAAG,CAAC,CAAC;YAE1C,IAAI,eAAe,GAAG,CAAC,EAAE,CAAC;gBACxB,IAAI,GAAG,GAAG,eAAe,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;oBAC1C,MAAM,CAAC,KAAK,GAAG,iCAAiC,CAAC;oBACjD,OAAO,MAAM,CAAC;gBAChB,CAAC;gBAED,MAAM,CAAC,SAAS,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,EAAE,GAAG,GAAG,eAAe,CAAC,CAAC;gBAC5D,GAAG,CAAC,eAAe,MAAM,CAAC,SAAS,CAAC,QAAQ,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC;YACzD,CAAC;YAED,kBAAkB;YAClB,GAAG,IAAI,eAAe,CAAC;YAEvB,uDAAuD;YACvD,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAC5B,MAAM,CAAC,KAAK,GAAG,2CAA2C,CAAC;gBAC3D,OAAO,MAAM,CAAC;YAChB,CAAC;YAED,mDAAmD;YACnD,MAAM,kBAAkB,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;YAChE,GAAG,CAAC,yBAAyB,kBAAkB,EAAE,CAAC,CAAC;YACnD,GAAG,IAAI,CAAC,CAAC;YAET,wBAAwB;YACxB,IAAI,GAAG,GAAG,kBAAkB,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAC7C,MAAM,CAAC,KAAK,GAAG,oCAAoC,CAAC;gBACpD,OAAO,MAAM,CAAC;YAChB,CAAC;YAED,MAAM,CAAC,YAAY,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,EAAE,GAAG,GAAG,kBAAkB,CAAC,CAAC;YAElE,qBAAqB;YACrB,GAAG,IAAI,kBAAkB,CAAC;YAE1B,6DAA6D;YAC7D,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAC5B,MAAM,CAAC,KAAK,GAAG,iDAAiD,CAAC;gBACjE,OAAO,MAAM,CAAC;YAChB,CAAC;YAED,4CAA4C;YAC5C,MAAM,wBAAwB,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;YAC7C,GAAG,CAAC,+BAA+B,wBAAwB,EAAE,CAAC,CAAC;YAC/D,GAAG,IAAI,CAAC,CAAC;YAET,8BAA8B;YAC9B,IAAI,GAAG,GAAG,wBAAwB,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBACnD,MAAM,CAAC,KAAK,GAAG,0CAA0C,CAAC;gBAC1D,OAAO,MAAM,CAAC;YAChB,CAAC;YAED,MAAM,CAAC,kBAAkB,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,EAAE,GAAG,GAAG,wBAAwB,CAAC,CAAC;YAE9E,2BAA2B;YAC3B,GAAG,IAAI,wBAAwB,CAAC;YAEhC,sDAAsD;YACtD,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAC5B,+DAA+D;gBAC/D,MAAM,CAAC,OAAO,GAAG,IAAI,CAAC;gBACtB,OAAO,MAAM,CAAC;YAChB,CAAC;YAED,gDAAgD;YAChD,MAAM,gBAAgB,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;YAC9D,GAAG,CAAC,sBAAsB,gBAAgB,EAAE,CAAC,CAAC;YAC9C,GAAG,IAAI,CAAC,CAAC;YAET,0BAA0B;YAC1B,MAAM,aAAa,GAAG,GAAG,GAAG,gBAAgB,CAAC;YAE7C,sCAAsC;YACtC,IAAI,aAAa,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAClC,MAAM,CAAC,KAAK,GAAG,uCAAuC,CAAC;gBACvD,OAAO,MAAM,CAAC;YAChB,CAAC;YAED,6BAA6B;YAC7B,MAAM,WAAW,GAAa,EAAE,CAAC;YAEjC,OAAO,GAAG,GAAG,CAAC,IAAI,aAAa,EAAE,CAAC;gBAChC,6CAA6C;gBAC7C,MAAM,aAAa,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;gBAC3D,GAAG,CAAC,qBAAqB,aAAa,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,QAAQ,CAAC,CAAC,EAAE,GAAG,CAAC,EAAE,CAAC,CAAC;gBACxE,GAAG,IAAI,CAAC,CAAC;gBAET,+CAA+C;gBAC/C,MAAM,eAAe,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;gBAC7D,GAAG,CAAC,qBAAqB,eAAe,EAAE,CAAC,CAAC;gBAC5C,GAAG,IAAI,CAAC,CAAC;gBAET,yBAAyB;gBACzB,IAAI,GAAG,GAAG,eAAe,GAAG,aAAa,EAAE,CAAC;oBAC1C,MAAM,CAAC,KAAK,GAAG,aAAa,aAAa,sBAAsB,CAAC;oBAChE,OAAO,MAAM,CAAC;gBAChB,CAAC;gBAED,MAAM,aAAa,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,EAAE,GAAG,GAAG,eAAe,CAAC,CAAC;gBAE/D,wBAAwB;gBACxB,MAAM,CAAC,UAAU,CAAC,IAAI,CAAC;oBACrB,IAAI,EAAE,aAAa;oBACnB,MAAM,EAAE,eAAe;oBACvB,IAAI,EAAE,aAAa;iBACpB,CAAC,CAAC;gBAEH,iCAAiC;gBACjC,IAAI,aAAa,KAAK,gBAAgB,CAAC,WAAW,EAAE,CAAC;oBACnD,+BAA+B;oBAC/B,IAAI,CAAC,wBAAwB,CAAC,aAAa,EAAE,WAAW,EAAE,MAAM,CAAC,CAAC;gBACpE,CAAC;qBAAM,IAAI,aAAa,KAAK,gBAAgB,CAAC,cAAc,EAAE,CAAC;oBAC7D,iBAAiB;oBACjB,MAAM,CAAC,gBAAgB,GAAG,IAAI,CAAC;gBACjC,CAAC;qBAAM,IAAI,aAAa,KAAK,gBAAgB,CAAC,cAAc,EAAE,CAAC;oBAC7D,cAAc;oBACd,MAAM,CAAC,MAAM,GAAG,IAAI,CAAC;gBACvB,CAAC;qBAAM,IAAI,aAAa,KAAK,gBAAgB,CAAC,UAAU,EAAE,CAAC;oBACzD,6BAA6B;oBAC7B,MAAM,CAAC,YAAY,GAAG,IAAI,CAAC;gBAC7B,CAAC;gBAED,yBAAyB;gBACzB,GAAG,IAAI,eAAe,CAAC;YACzB,CAAC;YAED,+BAA+B;YAC/B,IAAI,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAC3B,MAAM,CAAC,cAAc,GAAG,WAAW,CAAC;YACtC,CAAC;YAED,+BAA+B;YAC/B,MAAM,CAAC,OAAO,GAAG,IAAI,CAAC;YACtB,OAAO,MAAM,CAAC;QAChB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,YAAY,GAAG,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;YAC5E,GAAG,CAAC,8BAA8B,YAAY,EAAE,CAAC,CAAC;YAClD,MAAM,CAAC,KAAK,GAAG,YAAY,CAAC;YAC5B,OAAO,MAAM,CAAC;QAChB,CAAC;IACH,CAAC;IAED;;;;;;;OAOG;IACK,MAAM,CAAC,wBAAwB,CACrC,IAAY,EACZ,WAAqB,EACrB,MAAuB;QAEvB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,GAAG,EAAE,GAAE,CAAC,CAAC,CAAC;QAEjC,IAAI,CAAC;YACH,oDAAoD;YACpD,IAAI,IAAI,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBACpB,GAAG,CAAC,qDAAqD,CAAC,CAAC;gBAC3D,OAAO,KAAK,CAAC;YACf,CAAC;YAED,0CAA0C;YAC1C,MAAM,UAAU,GAAG,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,CAAC;YAE5C,2BAA2B;YAC3B,IAAI,GAAG,GAAG,CAAC,CAAC;YAEZ,cAAc;YACd,MAAM,OAAO,GAAG,GAAG,GAAG,UAAU,CAAC;YAEjC,kBAAkB;YAClB,IAAI,OAAO,GAAG,IAAI,CAAC,MAAM,EAAE,CAAC;gBAC1B,GAAG,CAAC,6CAA6C,CAAC,CAAC;gBACnD,OAAO,KAAK,CAAC;YACf,CAAC;YAED,2BAA2B;YAC3B,OAAO,GAAG,GAAG,CAAC,IAAI,OAAO,EAAE,CAAC;gBAC1B,qBAAqB;gBACrB,MAAM,QAAQ,GAAG,IAAI,CAAC,GAAG,CAAC,CAAC;gBAC3B,GAAG,IAAI,CAAC,CAAC;gBAET,+BAA+B;gBAC/B,IAAI,QAAQ,KAAK,CAAC,EAAE,CAAC;oBACnB,kBAAkB;oBAClB,IAAI,GAAG,GAAG,CAAC,IAAI,OAAO,EAAE,CAAC;wBACvB,MAAM,UAAU,GAAG,CAAC,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,IAAI,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;wBACpD,GAAG,IAAI,CAAC,GAAG,UAAU,CAAC;wBACtB,SAAS;oBACX,CAAC;yBAAM,CAAC;wBACN,GAAG,CAAC,qBAAqB,CAAC,CAAC;wBAC3B,OAAO,KAAK,CAAC;oBACf,CAAC;gBACH,CAAC;gBAED,kCAAkC;gBAClC,IAAI,GAAG,GAAG,CAAC,GAAG,OAAO,EAAE,CAAC;oBACtB,GAAG,CAAC,yBAAyB,CAAC,CAAC;oBAC/B,OAAO,KAAK,CAAC;gBACf,CAAC;gBAED,MAAM,UAAU,GAAG,CAAC,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,IAAI,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;gBACpD,GAAG,IAAI,CAAC,CAAC;gBAET,mBAAmB;gBACnB,IAAI,GAAG,GAAG,UAAU,GAAG,OAAO,EAAE,CAAC;oBAC/B,GAAG,CAAC,wBAAwB,CAAC,CAAC;oBAC9B,OAAO,KAAK,CAAC;gBACf,CAAC;gBAED,gCAAgC;gBAChC,IAAI,CAAC;oBACH,MAAM,QAAQ,GAAG,IAAI,CAAC,KAAK,CAAC,GAAG,EAAE,GAAG,GAAG,UAAU,CAAC,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;oBACpE,GAAG,CAAC,uBAAuB,QAAQ,EAAE,CAAC,CAAC;oBACvC,WAAW,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;gBAC7B,CAAC;gBAAC,OAAO,GAAG,EAAE,CAAC;oBACb,GAAG,CAAC,8BAA8B,GAAG,EAAE,CAAC,CAAC;gBAC3C,CAAC;gBAED,qBAAqB;gBACrB,GAAG,IAAI,UAAU,CAAC;YACpB,CAAC;YAED,OAAO,WAAW,CAAC,MAAM,GAAG,CAAC,CAAC;QAChC,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,GAAG,CAAC,gCAAgC,KAAK,EAAE,CAAC,CAAC;YAC7C,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,oBAAoB,CAChC,MAAc,EACd,MAAuB;QAEvB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,GAAG,EAAE,GAAE,CAAC,CAAC,CAAC;QAEjC,IAAI,CAAC,QAAQ,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;YACpC,OAAO,EAAE,YAAY,EAAE,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE,CAAC;QAChD,CAAC;QAED,MAAM,WAAW,GAAG,IAAI,CAAC,gBAAgB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;QAC1D,IAAI,CAAC,WAAW,CAAC,OAAO,EAAE,CAAC;YACzB,GAAG,CAAC,6BAA6B,WAAW,CAAC,KAAK,EAAE,CAAC,CAAC;YACtD,OAAO,EAAE,YAAY,EAAE,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE,CAAC;QAChD,CAAC;QAED,8BAA8B;QAC9B,MAAM,YAAY,GAAG,WAAW,CAAC,YAAY,CAAC;QAC9C,MAAM,gBAAgB,GAAG,WAAW,CAAC,gBAAgB,CAAC;QACtD,MAAM,MAAM,GAAG,WAAW,CAAC,MAAM,CAAC;QAClC,MAAM,YAAY,GAAG,WAAW,CAAC,YAAY,CAAC;QAE9C,gBAAgB;QAChB,MAAM,MAAM,GAAG,CAAC,CAAC,WAAW,CAAC,cAAc,IAAI,WAAW,CAAC,cAAc,CAAC,MAAM,GAAG,CAAC,CAAC;QAErF,kEAAkE;QAClE,MAAM,YAAY,GAAG,gBAAgB,IAAI,MAAM,IAAI,YAAY;YAC1C,CAAC,YAAY,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,oBAAoB;QAEpE,cAAc;QACd,IAAI,YAAY,EAAE,CAAC;YACjB,GAAG,CACD,+BAA+B;gBAC/B,CAAC,gBAAgB,CAAC,CAAC,CAAC,kBAAkB,CAAC,CAAC,CAAC,EAAE,CAAC;gBAC5C,CAAC,MAAM,CAAC,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,EAAE,CAAC;gBACvB,CAAC,YAAY,CAAC,CAAC,CAAC,cAAc,CAAC,CAAC,CAAC,EAAE,CAAC;gBACpC,CAAC,YAAY,CAAC,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,EAAE,CAAC;gBAClC,CAAC,MAAM,CAAC,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,eAAe,CAAC,CAC1C,CAAC;QACJ,CAAC;QAED,OAAO,EAAE,YAAY,EAAE,MAAM,EAAE,CAAC;IAClC,CAAC;IAED;;;;;;OAMG;IACI,MAAM,CAAC,0BAA0B,CACtC,MAAc,EACd,MAAuB;QAEvB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,GAAG,EAAE,GAAE,CAAC,CAAC,CAAC;QAEjC,IAAI,CAAC,QAAQ,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;YACpC,OAAO,KAAK,CAAC;QACf,CAAC;QAED,wBAAwB;QACxB,MAAM,WAAW,GAAG,IAAI,CAAC,gBAAgB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;QAC1D,IAAI,CAAC,WAAW,CAAC,OAAO,EAAE,CAAC;YACzB,OAAO,KAAK,CAAC;QACf,CAAC;QAED,4EAA4E;QAC5E,MAAM,YAAY,GAAG,WAAW,CAAC,YAAY,CAAC;QAC9C,MAAM,gBAAgB,GAAG,WAAW,CAAC,gBAAgB,CAAC;QACtD,MAAM,MAAM,GAAG,WAAW,CAAC,MAAM,CAAC;QAClC,MAAM,MAAM,GAAG,CAAC,CAAC,WAAW,CAAC,cAAc,IAAI,WAAW,CAAC,cAAc,CAAC,MAAM,GAAG,CAAC,CAAC;QAErF,IAAI,CAAC,YAAY,IAAI,CAAC,gBAAgB,IAAI,MAAM,CAAC,CAAC,IAAI,CAAC,MAAM,EAAE,CAAC;YAC9D,GAAG,CAAC,mEAAmE,CAAC,CAAC;YACzE,OAAO,IAAI,CAAC;QACd,CAAC;QAED,OAAO,KAAK,CAAC;IACf,CAAC"}
@@ -0,0 +1,5 @@
1
+ /**
2
+ * TLS SNI (Server Name Indication) protocol utilities
3
+ */
4
+ export * from './client-hello-parser.js';
5
+ export * from './sni-extraction.js';
@@ -0,0 +1,6 @@
1
+ /**
2
+ * TLS SNI (Server Name Indication) protocol utilities
3
+ */
4
+ export * from './client-hello-parser.js';
5
+ export * from './sni-extraction.js';
6
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi8uLi90cy9wcm90b2NvbHMvdGxzL3NuaS9pbmRleC50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiQUFBQTs7R0FFRztBQUVILGNBQWMsMEJBQTBCLENBQUM7QUFDekMsY0FBYyxxQkFBcUIsQ0FBQyJ9
@@ -0,0 +1,58 @@
1
+ import { Buffer } from 'buffer';
2
+ import { type LoggerFunction } from './client-hello-parser.js';
3
+ /**
4
+ * Connection tracking information
5
+ */
6
+ export interface ConnectionInfo {
7
+ sourceIp: string;
8
+ sourcePort: number;
9
+ destIp: string;
10
+ destPort: number;
11
+ timestamp?: number;
12
+ }
13
+ /**
14
+ * Utilities for extracting SNI information from TLS handshakes
15
+ */
16
+ export declare class SniExtraction {
17
+ /**
18
+ * Extracts the SNI (Server Name Indication) from a TLS ClientHello message.
19
+ *
20
+ * @param buffer The buffer containing the TLS ClientHello message
21
+ * @param logger Optional logging function
22
+ * @returns The extracted server name or undefined if not found
23
+ */
24
+ static extractSNI(buffer: Buffer, logger?: LoggerFunction): string | undefined;
25
+ /**
26
+ * Attempts to extract SNI from the PSK extension in a TLS 1.3 ClientHello.
27
+ *
28
+ * In TLS 1.3, when a client attempts to resume a session, it may include
29
+ * the server name in the PSK identity hint rather than in the SNI extension.
30
+ *
31
+ * @param buffer The buffer containing the TLS ClientHello message
32
+ * @param logger Optional logging function
33
+ * @returns The extracted server name or undefined if not found
34
+ */
35
+ static extractSNIFromPSKExtension(buffer: Buffer, logger?: LoggerFunction): string | undefined;
36
+ /**
37
+ * Main entry point for SNI extraction with support for fragmented messages
38
+ * and session resumption edge cases.
39
+ *
40
+ * @param buffer The buffer containing TLS data
41
+ * @param connectionInfo Connection tracking information
42
+ * @param logger Optional logging function
43
+ * @param cachedSni Optional previously cached SNI value
44
+ * @returns The extracted server name or undefined
45
+ */
46
+ static extractSNIWithResumptionSupport(buffer: Buffer, connectionInfo?: ConnectionInfo, logger?: LoggerFunction, cachedSni?: string): string | undefined;
47
+ /**
48
+ * Unified method for processing a TLS packet and extracting SNI.
49
+ * Main entry point for SNI extraction that handles all edge cases.
50
+ *
51
+ * @param buffer The buffer containing TLS data
52
+ * @param connectionInfo Connection tracking information
53
+ * @param logger Optional logging function
54
+ * @param cachedSni Optional previously cached SNI value
55
+ * @returns The extracted server name or undefined
56
+ */
57
+ static processTlsPacket(buffer: Buffer, connectionInfo: ConnectionInfo, logger?: LoggerFunction, cachedSni?: string): string | undefined;
58
+ }