@push.rocks/smartproxy 25.17.10 → 26.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (184) hide show
  1. package/changelog.md +15 -0
  2. package/dist_rust/rustproxy_linux_amd64 +0 -0
  3. package/dist_rust/rustproxy_linux_arm64 +0 -0
  4. package/dist_ts/00_commitinfo_data.js +2 -2
  5. package/dist_ts/core/index.d.ts +0 -1
  6. package/dist_ts/core/index.js +1 -2
  7. package/dist_ts/core/models/index.d.ts +0 -1
  8. package/dist_ts/core/models/index.js +1 -2
  9. package/dist_ts/core/utils/index.d.ts +0 -12
  10. package/dist_ts/core/utils/index.js +1 -13
  11. package/dist_ts/index.d.ts +0 -3
  12. package/dist_ts/index.js +2 -7
  13. package/dist_ts/protocols/http/index.d.ts +0 -1
  14. package/dist_ts/protocols/http/index.js +1 -2
  15. package/dist_ts/protocols/index.d.ts +0 -7
  16. package/dist_ts/protocols/index.js +1 -8
  17. package/dist_ts/proxies/smart-proxy/models/metrics-types.d.ts +20 -0
  18. package/dist_ts/proxies/smart-proxy/rust-metrics-adapter.d.ts +2 -1
  19. package/dist_ts/proxies/smart-proxy/rust-metrics-adapter.js +4 -1
  20. package/dist_ts/proxies/smart-proxy/socket-handler-server.js +6 -1
  21. package/dist_ts/proxies/smart-proxy/utils/route-helpers/socket-handlers.d.ts +0 -7
  22. package/dist_ts/proxies/smart-proxy/utils/route-helpers/socket-handlers.js +50 -51
  23. package/dist_ts/routing/index.d.ts +0 -1
  24. package/dist_ts/routing/index.js +1 -3
  25. package/package.json +1 -1
  26. package/ts/00_commitinfo_data.ts +1 -1
  27. package/ts/core/index.ts +0 -1
  28. package/ts/core/models/index.ts +0 -1
  29. package/ts/core/utils/index.ts +0 -12
  30. package/ts/index.ts +1 -7
  31. package/ts/protocols/http/index.ts +1 -2
  32. package/ts/protocols/index.ts +0 -7
  33. package/ts/proxies/smart-proxy/models/metrics-types.ts +21 -0
  34. package/ts/proxies/smart-proxy/rust-metrics-adapter.ts +4 -1
  35. package/ts/proxies/smart-proxy/socket-handler-server.ts +6 -0
  36. package/ts/proxies/smart-proxy/utils/route-helpers/socket-handlers.ts +60 -59
  37. package/ts/routing/index.ts +0 -3
  38. package/dist_ts/core/events/index.d.ts +0 -4
  39. package/dist_ts/core/events/index.js +0 -5
  40. package/dist_ts/core/models/socket-augmentation.d.ts +0 -15
  41. package/dist_ts/core/models/socket-augmentation.js +0 -18
  42. package/dist_ts/core/utils/async-utils.d.ts +0 -81
  43. package/dist_ts/core/utils/async-utils.js +0 -216
  44. package/dist_ts/core/utils/binary-heap.d.ts +0 -73
  45. package/dist_ts/core/utils/binary-heap.js +0 -193
  46. package/dist_ts/core/utils/enhanced-connection-pool.d.ts +0 -110
  47. package/dist_ts/core/utils/enhanced-connection-pool.js +0 -325
  48. package/dist_ts/core/utils/fs-utils.d.ts +0 -144
  49. package/dist_ts/core/utils/fs-utils.js +0 -252
  50. package/dist_ts/core/utils/ip-utils.d.ts +0 -69
  51. package/dist_ts/core/utils/ip-utils.js +0 -270
  52. package/dist_ts/core/utils/lifecycle-component.d.ts +0 -59
  53. package/dist_ts/core/utils/lifecycle-component.js +0 -211
  54. package/dist_ts/core/utils/log-deduplicator.d.ts +0 -39
  55. package/dist_ts/core/utils/log-deduplicator.js +0 -305
  56. package/dist_ts/core/utils/security-utils.d.ts +0 -111
  57. package/dist_ts/core/utils/security-utils.js +0 -212
  58. package/dist_ts/core/utils/shared-security-manager.d.ts +0 -128
  59. package/dist_ts/core/utils/shared-security-manager.js +0 -362
  60. package/dist_ts/core/utils/socket-utils.d.ts +0 -63
  61. package/dist_ts/core/utils/socket-utils.js +0 -249
  62. package/dist_ts/core/utils/template-utils.d.ts +0 -37
  63. package/dist_ts/core/utils/template-utils.js +0 -104
  64. package/dist_ts/core/utils/validation-utils.d.ts +0 -61
  65. package/dist_ts/core/utils/validation-utils.js +0 -149
  66. package/dist_ts/core/utils/websocket-utils.d.ts +0 -22
  67. package/dist_ts/core/utils/websocket-utils.js +0 -30
  68. package/dist_ts/detection/detectors/http-detector.d.ts +0 -33
  69. package/dist_ts/detection/detectors/http-detector.js +0 -101
  70. package/dist_ts/detection/detectors/quick-detector.d.ts +0 -28
  71. package/dist_ts/detection/detectors/quick-detector.js +0 -131
  72. package/dist_ts/detection/detectors/routing-extractor.d.ts +0 -28
  73. package/dist_ts/detection/detectors/routing-extractor.js +0 -122
  74. package/dist_ts/detection/detectors/tls-detector.d.ts +0 -47
  75. package/dist_ts/detection/detectors/tls-detector.js +0 -183
  76. package/dist_ts/detection/index.d.ts +0 -17
  77. package/dist_ts/detection/index.js +0 -22
  78. package/dist_ts/detection/models/detection-types.d.ts +0 -87
  79. package/dist_ts/detection/models/detection-types.js +0 -5
  80. package/dist_ts/detection/models/interfaces.d.ts +0 -97
  81. package/dist_ts/detection/models/interfaces.js +0 -5
  82. package/dist_ts/detection/protocol-detector.d.ts +0 -79
  83. package/dist_ts/detection/protocol-detector.js +0 -253
  84. package/dist_ts/detection/utils/buffer-utils.d.ts +0 -61
  85. package/dist_ts/detection/utils/buffer-utils.js +0 -127
  86. package/dist_ts/detection/utils/fragment-manager.d.ts +0 -31
  87. package/dist_ts/detection/utils/fragment-manager.js +0 -53
  88. package/dist_ts/detection/utils/parser-utils.d.ts +0 -42
  89. package/dist_ts/detection/utils/parser-utils.js +0 -63
  90. package/dist_ts/protocols/common/fragment-handler.d.ts +0 -73
  91. package/dist_ts/protocols/common/fragment-handler.js +0 -121
  92. package/dist_ts/protocols/common/index.d.ts +0 -7
  93. package/dist_ts/protocols/common/index.js +0 -8
  94. package/dist_ts/protocols/common/types.d.ts +0 -68
  95. package/dist_ts/protocols/common/types.js +0 -7
  96. package/dist_ts/protocols/http/parser.d.ts +0 -58
  97. package/dist_ts/protocols/http/parser.js +0 -184
  98. package/dist_ts/protocols/proxy/index.d.ts +0 -5
  99. package/dist_ts/protocols/proxy/index.js +0 -6
  100. package/dist_ts/protocols/proxy/types.d.ts +0 -47
  101. package/dist_ts/protocols/proxy/types.js +0 -6
  102. package/dist_ts/protocols/tls/alerts/index.d.ts +0 -4
  103. package/dist_ts/protocols/tls/alerts/index.js +0 -5
  104. package/dist_ts/protocols/tls/alerts/tls-alert.d.ts +0 -150
  105. package/dist_ts/protocols/tls/alerts/tls-alert.js +0 -226
  106. package/dist_ts/protocols/tls/index.d.ts +0 -12
  107. package/dist_ts/protocols/tls/index.js +0 -27
  108. package/dist_ts/protocols/tls/sni/client-hello-parser.d.ts +0 -100
  109. package/dist_ts/protocols/tls/sni/client-hello-parser.js +0 -463
  110. package/dist_ts/protocols/tls/sni/index.d.ts +0 -5
  111. package/dist_ts/protocols/tls/sni/index.js +0 -6
  112. package/dist_ts/protocols/tls/sni/sni-extraction.d.ts +0 -58
  113. package/dist_ts/protocols/tls/sni/sni-extraction.js +0 -275
  114. package/dist_ts/protocols/tls/utils/index.d.ts +0 -4
  115. package/dist_ts/protocols/tls/utils/index.js +0 -5
  116. package/dist_ts/protocols/tls/utils/tls-utils.d.ts +0 -158
  117. package/dist_ts/protocols/tls/utils/tls-utils.js +0 -187
  118. package/dist_ts/protocols/websocket/constants.d.ts +0 -55
  119. package/dist_ts/protocols/websocket/constants.js +0 -58
  120. package/dist_ts/protocols/websocket/index.d.ts +0 -7
  121. package/dist_ts/protocols/websocket/index.js +0 -8
  122. package/dist_ts/protocols/websocket/types.d.ts +0 -47
  123. package/dist_ts/protocols/websocket/types.js +0 -5
  124. package/dist_ts/protocols/websocket/utils.d.ts +0 -25
  125. package/dist_ts/protocols/websocket/utils.js +0 -103
  126. package/dist_ts/routing/router/http-router.d.ts +0 -89
  127. package/dist_ts/routing/router/http-router.js +0 -205
  128. package/dist_ts/routing/router/index.d.ts +0 -5
  129. package/dist_ts/routing/router/index.js +0 -6
  130. package/dist_ts/tls/index.d.ts +0 -16
  131. package/dist_ts/tls/index.js +0 -24
  132. package/dist_ts/tls/sni/index.d.ts +0 -4
  133. package/dist_ts/tls/sni/index.js +0 -5
  134. package/dist_ts/tls/sni/sni-handler.d.ts +0 -154
  135. package/dist_ts/tls/sni/sni-handler.js +0 -191
  136. package/ts/core/events/index.ts +0 -3
  137. package/ts/core/models/socket-augmentation.ts +0 -38
  138. package/ts/core/utils/async-utils.ts +0 -275
  139. package/ts/core/utils/binary-heap.ts +0 -225
  140. package/ts/core/utils/enhanced-connection-pool.ts +0 -425
  141. package/ts/core/utils/fs-utils.ts +0 -270
  142. package/ts/core/utils/ip-utils.ts +0 -303
  143. package/ts/core/utils/lifecycle-component.ts +0 -251
  144. package/ts/core/utils/log-deduplicator.ts +0 -370
  145. package/ts/core/utils/security-utils.ts +0 -305
  146. package/ts/core/utils/shared-security-manager.ts +0 -470
  147. package/ts/core/utils/socket-utils.ts +0 -322
  148. package/ts/core/utils/template-utils.ts +0 -124
  149. package/ts/core/utils/validation-utils.ts +0 -177
  150. package/ts/core/utils/websocket-utils.ts +0 -33
  151. package/ts/detection/detectors/http-detector.ts +0 -127
  152. package/ts/detection/detectors/quick-detector.ts +0 -148
  153. package/ts/detection/detectors/routing-extractor.ts +0 -147
  154. package/ts/detection/detectors/tls-detector.ts +0 -223
  155. package/ts/detection/index.ts +0 -25
  156. package/ts/detection/models/detection-types.ts +0 -102
  157. package/ts/detection/models/interfaces.ts +0 -115
  158. package/ts/detection/protocol-detector.ts +0 -319
  159. package/ts/detection/utils/buffer-utils.ts +0 -141
  160. package/ts/detection/utils/fragment-manager.ts +0 -64
  161. package/ts/detection/utils/parser-utils.ts +0 -77
  162. package/ts/protocols/common/fragment-handler.ts +0 -167
  163. package/ts/protocols/common/index.ts +0 -8
  164. package/ts/protocols/common/types.ts +0 -76
  165. package/ts/protocols/http/parser.ts +0 -219
  166. package/ts/protocols/proxy/index.ts +0 -6
  167. package/ts/protocols/proxy/types.ts +0 -53
  168. package/ts/protocols/tls/alerts/index.ts +0 -3
  169. package/ts/protocols/tls/alerts/tls-alert.ts +0 -259
  170. package/ts/protocols/tls/index.ts +0 -37
  171. package/ts/protocols/tls/sni/client-hello-parser.ts +0 -629
  172. package/ts/protocols/tls/sni/index.ts +0 -6
  173. package/ts/protocols/tls/sni/sni-extraction.ts +0 -353
  174. package/ts/protocols/tls/utils/index.ts +0 -3
  175. package/ts/protocols/tls/utils/tls-utils.ts +0 -201
  176. package/ts/protocols/websocket/constants.ts +0 -60
  177. package/ts/protocols/websocket/index.ts +0 -8
  178. package/ts/protocols/websocket/types.ts +0 -53
  179. package/ts/protocols/websocket/utils.ts +0 -98
  180. package/ts/routing/router/http-router.ts +0 -266
  181. package/ts/routing/router/index.ts +0 -7
  182. package/ts/tls/index.ts +0 -29
  183. package/ts/tls/sni/index.ts +0 -3
  184. package/ts/tls/sni/sni-handler.ts +0 -264
@@ -1,275 +0,0 @@
1
- import { Buffer } from 'node:buffer';
2
- import { TlsExtensionType, TlsUtils } from '../utils/tls-utils.js';
3
- import { ClientHelloParser } from './client-hello-parser.js';
4
- /**
5
- * Utilities for extracting SNI information from TLS handshakes
6
- */
7
- export class SniExtraction {
8
- /**
9
- * Extracts the SNI (Server Name Indication) from a TLS ClientHello message.
10
- *
11
- * @param buffer The buffer containing the TLS ClientHello message
12
- * @param logger Optional logging function
13
- * @returns The extracted server name or undefined if not found
14
- */
15
- static extractSNI(buffer, logger) {
16
- const log = logger || (() => { });
17
- try {
18
- // Parse the ClientHello
19
- const parseResult = ClientHelloParser.parseClientHello(buffer, logger);
20
- if (!parseResult.isValid) {
21
- log(`Failed to parse ClientHello: ${parseResult.error}`);
22
- return undefined;
23
- }
24
- // Check if ServerName extension was found
25
- if (parseResult.serverNameList && parseResult.serverNameList.length > 0) {
26
- // Use the first hostname (most common case)
27
- const serverName = parseResult.serverNameList[0];
28
- log(`Found SNI: ${serverName}`);
29
- return serverName;
30
- }
31
- log('No SNI extension found in ClientHello');
32
- return undefined;
33
- }
34
- catch (error) {
35
- log(`Error extracting SNI: ${error instanceof Error ? error.message : String(error)}`);
36
- return undefined;
37
- }
38
- }
39
- /**
40
- * Attempts to extract SNI from the PSK extension in a TLS 1.3 ClientHello.
41
- *
42
- * In TLS 1.3, when a client attempts to resume a session, it may include
43
- * the server name in the PSK identity hint rather than in the SNI extension.
44
- *
45
- * @param buffer The buffer containing the TLS ClientHello message
46
- * @param logger Optional logging function
47
- * @returns The extracted server name or undefined if not found
48
- */
49
- static extractSNIFromPSKExtension(buffer, logger) {
50
- const log = logger || (() => { });
51
- try {
52
- // Ensure this is a ClientHello
53
- if (!TlsUtils.isClientHello(buffer)) {
54
- log('Not a ClientHello message');
55
- return undefined;
56
- }
57
- // Parse the ClientHello to find PSK extension
58
- const parseResult = ClientHelloParser.parseClientHello(buffer, logger);
59
- if (!parseResult.isValid || !parseResult.extensions) {
60
- return undefined;
61
- }
62
- // Find the PSK extension
63
- const pskExtension = parseResult.extensions.find(ext => ext.type === TlsExtensionType.PRE_SHARED_KEY);
64
- if (!pskExtension) {
65
- log('No PSK extension found');
66
- return undefined;
67
- }
68
- // Parse the PSK extension data
69
- const data = pskExtension.data;
70
- // PSK extension structure:
71
- // 2 bytes: identities list length
72
- if (data.length < 2)
73
- return undefined;
74
- const identitiesLength = (data[0] << 8) + data[1];
75
- let pos = 2;
76
- // End of identities list
77
- const identitiesEnd = pos + identitiesLength;
78
- if (identitiesEnd > data.length)
79
- return undefined;
80
- // Process each PSK identity
81
- while (pos + 2 <= identitiesEnd) {
82
- // Identity length (2 bytes)
83
- if (pos + 2 > identitiesEnd)
84
- break;
85
- const identityLength = (data[pos] << 8) + data[pos + 1];
86
- pos += 2;
87
- if (pos + identityLength > identitiesEnd)
88
- break;
89
- // Try to extract hostname from identity
90
- // Chrome often embeds the hostname in the PSK identity
91
- // This is a heuristic as there's no standard format
92
- if (identityLength > 0) {
93
- const identity = data.slice(pos, pos + identityLength);
94
- // Skip identity bytes
95
- pos += identityLength;
96
- // Skip obfuscated ticket age (4 bytes)
97
- if (pos + 4 <= identitiesEnd) {
98
- pos += 4;
99
- }
100
- else {
101
- break;
102
- }
103
- // Try to parse the identity as UTF-8
104
- try {
105
- const identityStr = identity.toString('utf8');
106
- log(`PSK identity: ${identityStr}`);
107
- // Check if the identity contains hostname hints
108
- // Chrome often embeds the hostname in a known format
109
- // Try to extract using common patterns
110
- // Pattern 1: Look for domain name pattern
111
- const domainPattern = /([a-z0-9]([a-z0-9-]{0,61}[a-z0-9])?\.)+[a-z0-9]([a-z0-9-]{0,61}[a-z0-9])?/i;
112
- const domainMatch = identityStr.match(domainPattern);
113
- if (domainMatch && domainMatch[0]) {
114
- log(`Found domain in PSK identity: ${domainMatch[0]}`);
115
- return domainMatch[0];
116
- }
117
- // Pattern 2: Chrome sometimes uses a specific format with delimiters
118
- // This is a heuristic approach since the format isn't standardized
119
- const parts = identityStr.split('|');
120
- if (parts.length > 1) {
121
- for (const part of parts) {
122
- if (part.includes('.') && !part.includes('/')) {
123
- const possibleDomain = part.trim();
124
- if (/^[a-z0-9.-]+$/i.test(possibleDomain)) {
125
- log(`Found possible domain in PSK delimiter format: ${possibleDomain}`);
126
- return possibleDomain;
127
- }
128
- }
129
- }
130
- }
131
- }
132
- catch (e) {
133
- log('Failed to parse PSK identity as UTF-8');
134
- }
135
- }
136
- }
137
- log('No hostname found in PSK extension');
138
- return undefined;
139
- }
140
- catch (error) {
141
- log(`Error parsing PSK: ${error instanceof Error ? error.message : String(error)}`);
142
- return undefined;
143
- }
144
- }
145
- /**
146
- * Main entry point for SNI extraction with support for fragmented messages
147
- * and session resumption edge cases.
148
- *
149
- * @param buffer The buffer containing TLS data
150
- * @param connectionInfo Connection tracking information
151
- * @param logger Optional logging function
152
- * @param cachedSni Optional previously cached SNI value
153
- * @returns The extracted server name or undefined
154
- */
155
- static extractSNIWithResumptionSupport(buffer, connectionInfo, logger, cachedSni) {
156
- const log = logger || (() => { });
157
- // Log buffer details for debugging
158
- if (logger) {
159
- log(`Buffer size: ${buffer.length} bytes`);
160
- log(`Buffer starts with: ${buffer.slice(0, Math.min(10, buffer.length)).toString('hex')}`);
161
- if (buffer.length >= 5) {
162
- const recordType = buffer[0];
163
- const majorVersion = buffer[1];
164
- const minorVersion = buffer[2];
165
- const recordLength = (buffer[3] << 8) + buffer[4];
166
- log(`TLS Record: type=${recordType}, version=${majorVersion}.${minorVersion}, length=${recordLength}`);
167
- }
168
- }
169
- // Check if we need to handle fragmented packets
170
- let processBuffer = buffer;
171
- if (connectionInfo) {
172
- const connectionId = TlsUtils.createConnectionId(connectionInfo);
173
- const reassembledBuffer = ClientHelloParser.handleFragmentedClientHello(buffer, connectionId, logger);
174
- if (!reassembledBuffer) {
175
- log(`Waiting for more fragments on connection ${connectionId}`);
176
- return undefined; // Need more fragments to complete ClientHello
177
- }
178
- processBuffer = reassembledBuffer;
179
- log(`Using reassembled buffer of length ${processBuffer.length}`);
180
- }
181
- // First try the standard SNI extraction
182
- const standardSni = this.extractSNI(processBuffer, logger);
183
- if (standardSni) {
184
- log(`Found standard SNI: ${standardSni}`);
185
- return standardSni;
186
- }
187
- // Check for session resumption when standard SNI extraction fails
188
- if (TlsUtils.isClientHello(processBuffer)) {
189
- const resumptionInfo = ClientHelloParser.hasSessionResumption(processBuffer, logger);
190
- if (resumptionInfo.isResumption) {
191
- log(`Detected session resumption in ClientHello without standard SNI`);
192
- // Try to extract SNI from PSK extension
193
- const pskSni = this.extractSNIFromPSKExtension(processBuffer, logger);
194
- if (pskSni) {
195
- log(`Extracted SNI from PSK extension: ${pskSni}`);
196
- return pskSni;
197
- }
198
- }
199
- }
200
- // If cached SNI was provided, use it for application data packets
201
- if (cachedSni && TlsUtils.isTlsApplicationData(buffer)) {
202
- log(`Using provided cached SNI for application data: ${cachedSni}`);
203
- return cachedSni;
204
- }
205
- return undefined;
206
- }
207
- /**
208
- * Unified method for processing a TLS packet and extracting SNI.
209
- * Main entry point for SNI extraction that handles all edge cases.
210
- *
211
- * @param buffer The buffer containing TLS data
212
- * @param connectionInfo Connection tracking information
213
- * @param logger Optional logging function
214
- * @param cachedSni Optional previously cached SNI value
215
- * @returns The extracted server name or undefined
216
- */
217
- static processTlsPacket(buffer, connectionInfo, logger, cachedSni) {
218
- const log = logger || (() => { });
219
- // Add timestamp if not provided
220
- if (!connectionInfo.timestamp) {
221
- connectionInfo.timestamp = Date.now();
222
- }
223
- // Check if this is a TLS handshake or application data
224
- if (!TlsUtils.isTlsHandshake(buffer) && !TlsUtils.isTlsApplicationData(buffer)) {
225
- log('Not a TLS handshake or application data packet');
226
- return undefined;
227
- }
228
- // Create connection ID for tracking
229
- const connectionId = TlsUtils.createConnectionId(connectionInfo);
230
- log(`Processing TLS packet for connection ${connectionId}, buffer length: ${buffer.length}`);
231
- // Handle application data with cached SNI (for connection racing)
232
- if (TlsUtils.isTlsApplicationData(buffer)) {
233
- // If explicit cachedSni was provided, use it
234
- if (cachedSni) {
235
- log(`Using provided cached SNI for application data: ${cachedSni}`);
236
- return cachedSni;
237
- }
238
- log('Application data packet without cached SNI, cannot determine hostname');
239
- return undefined;
240
- }
241
- // Enhanced session resumption detection
242
- if (TlsUtils.isClientHello(buffer)) {
243
- const resumptionInfo = ClientHelloParser.hasSessionResumption(buffer, logger);
244
- if (resumptionInfo.isResumption) {
245
- log(`Session resumption detected in TLS packet`);
246
- // Always try standard SNI extraction first
247
- const standardSni = this.extractSNI(buffer, logger);
248
- if (standardSni) {
249
- log(`Found standard SNI in session resumption: ${standardSni}`);
250
- return standardSni;
251
- }
252
- // Enhanced session resumption SNI extraction
253
- // Try extracting from PSK identity
254
- const pskSni = this.extractSNIFromPSKExtension(buffer, logger);
255
- if (pskSni) {
256
- log(`Extracted SNI from PSK extension: ${pskSni}`);
257
- return pskSni;
258
- }
259
- log(`Session resumption without extractable SNI`);
260
- }
261
- }
262
- // For handshake messages, try the full extraction process
263
- const sni = this.extractSNIWithResumptionSupport(buffer, connectionInfo, logger);
264
- if (sni) {
265
- log(`Successfully extracted SNI: ${sni}`);
266
- return sni;
267
- }
268
- // If we couldn't extract an SNI, check if this is a valid ClientHello
269
- if (TlsUtils.isClientHello(buffer)) {
270
- log('Valid ClientHello detected, but no SNI extracted - might need more data');
271
- }
272
- return undefined;
273
- }
274
- }
275
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"sni-extraction.js","sourceRoot":"","sources":["../../../../ts/protocols/tls/sni/sni-extraction.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,aAAa,CAAC;AACrC,OAAO,EAAE,gBAAgB,EAAE,QAAQ,EAAE,MAAM,uBAAuB,CAAC;AACnE,OAAO,EACL,iBAAiB,EAElB,MAAM,0BAA0B,CAAC;AAalC;;GAEG;AACH,MAAM,OAAO,aAAa;IACxB;;;;;;OAMG;IACI,MAAM,CAAC,UAAU,CAAC,MAAc,EAAE,MAAuB;QAC9D,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,GAAG,EAAE,GAAE,CAAC,CAAC,CAAC;QAEjC,IAAI,CAAC;YACH,wBAAwB;YACxB,MAAM,WAAW,GAAG,iBAAiB,CAAC,gBAAgB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;YACvE,IAAI,CAAC,WAAW,CAAC,OAAO,EAAE,CAAC;gBACzB,GAAG,CAAC,gCAAgC,WAAW,CAAC,KAAK,EAAE,CAAC,CAAC;gBACzD,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,0CAA0C;YAC1C,IAAI,WAAW,CAAC,cAAc,IAAI,WAAW,CAAC,cAAc,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBACxE,4CAA4C;gBAC5C,MAAM,UAAU,GAAG,WAAW,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC;gBACjD,GAAG,CAAC,cAAc,UAAU,EAAE,CAAC,CAAC;gBAChC,OAAO,UAAU,CAAC;YACpB,CAAC;YAED,GAAG,CAAC,uCAAuC,CAAC,CAAC;YAC7C,OAAO,SAAS,CAAC;QACnB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,GAAG,CAAC,yBAAyB,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC;YACvF,OAAO,SAAS,CAAC;QACnB,CAAC;IACH,CAAC;IAED;;;;;;;;;OASG;IACI,MAAM,CAAC,0BAA0B,CACtC,MAAc,EACd,MAAuB;QAEvB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,GAAG,EAAE,GAAE,CAAC,CAAC,CAAC;QAEjC,IAAI,CAAC;YACH,+BAA+B;YAC/B,IAAI,CAAC,QAAQ,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;gBACpC,GAAG,CAAC,2BAA2B,CAAC,CAAC;gBACjC,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,8CAA8C;YAC9C,MAAM,WAAW,GAAG,iBAAiB,CAAC,gBAAgB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;YACvE,IAAI,CAAC,WAAW,CAAC,OAAO,IAAI,CAAC,WAAW,CAAC,UAAU,EAAE,CAAC;gBACpD,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,yBAAyB;YACzB,MAAM,YAAY,GAAG,WAAW,CAAC,UAAU,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,CACrD,GAAG,CAAC,IAAI,KAAK,gBAAgB,CAAC,cAAc,CAAC,CAAC;YAEhD,IAAI,CAAC,YAAY,EAAE,CAAC;gBAClB,GAAG,CAAC,wBAAwB,CAAC,CAAC;gBAC9B,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,+BAA+B;YAC/B,MAAM,IAAI,GAAG,YAAY,CAAC,IAAI,CAAC;YAE/B,2BAA2B;YAC3B,kCAAkC;YAClC,IAAI,IAAI,CAAC,MAAM,GAAG,CAAC;gBAAE,OAAO,SAAS,CAAC;YAEtC,MAAM,gBAAgB,GAAG,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,CAAC;YAClD,IAAI,GAAG,GAAG,CAAC,CAAC;YAEZ,yBAAyB;YACzB,MAAM,aAAa,GAAG,GAAG,GAAG,gBAAgB,CAAC;YAC7C,IAAI,aAAa,GAAG,IAAI,CAAC,MAAM;gBAAE,OAAO,SAAS,CAAC;YAElD,4BAA4B;YAC5B,OAAO,GAAG,GAAG,CAAC,IAAI,aAAa,EAAE,CAAC;gBAChC,4BAA4B;gBAC5B,IAAI,GAAG,GAAG,CAAC,GAAG,aAAa;oBAAE,MAAM;gBAEnC,MAAM,cAAc,GAAG,CAAC,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,IAAI,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;gBACxD,GAAG,IAAI,CAAC,CAAC;gBAET,IAAI,GAAG,GAAG,cAAc,GAAG,aAAa;oBAAE,MAAM;gBAEhD,wCAAwC;gBACxC,uDAAuD;gBACvD,oDAAoD;gBACpD,IAAI,cAAc,GAAG,CAAC,EAAE,CAAC;oBACvB,MAAM,QAAQ,GAAG,IAAI,CAAC,KAAK,CAAC,GAAG,EAAE,GAAG,GAAG,cAAc,CAAC,CAAC;oBAEvD,sBAAsB;oBACtB,GAAG,IAAI,cAAc,CAAC;oBAEtB,uCAAuC;oBACvC,IAAI,GAAG,GAAG,CAAC,IAAI,aAAa,EAAE,CAAC;wBAC7B,GAAG,IAAI,CAAC,CAAC;oBACX,CAAC;yBAAM,CAAC;wBACN,MAAM;oBACR,CAAC;oBAED,qCAAqC;oBACrC,IAAI,CAAC;wBACH,MAAM,WAAW,GAAG,QAAQ,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;wBAC9C,GAAG,CAAC,iBAAiB,WAAW,EAAE,CAAC,CAAC;wBAEpC,gDAAgD;wBAChD,qDAAqD;wBACrD,uCAAuC;wBAEvC,0CAA0C;wBAC1C,MAAM,aAAa,GACjB,4EAA4E,CAAC;wBAC/E,MAAM,WAAW,GAAG,WAAW,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC;wBACrD,IAAI,WAAW,IAAI,WAAW,CAAC,CAAC,CAAC,EAAE,CAAC;4BAClC,GAAG,CAAC,iCAAiC,WAAW,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC;4BACvD,OAAO,WAAW,CAAC,CAAC,CAAC,CAAC;wBACxB,CAAC;wBAED,qEAAqE;wBACrE,mEAAmE;wBACnE,MAAM,KAAK,GAAG,WAAW,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;wBACrC,IAAI,KAAK,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;4BACrB,KAAK,MAAM,IAAI,IAAI,KAAK,EAAE,CAAC;gCACzB,IAAI,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;oCAC9C,MAAM,cAAc,GAAG,IAAI,CAAC,IAAI,EAAE,CAAC;oCACnC,IAAI,gBAAgB,CAAC,IAAI,CAAC,cAAc,CAAC,EAAE,CAAC;wCAC1C,GAAG,CAAC,kDAAkD,cAAc,EAAE,CAAC,CAAC;wCACxE,OAAO,cAAc,CAAC;oCACxB,CAAC;gCACH,CAAC;4BACH,CAAC;wBACH,CAAC;oBACH,CAAC;oBAAC,OAAO,CAAC,EAAE,CAAC;wBACX,GAAG,CAAC,uCAAuC,CAAC,CAAC;oBAC/C,CAAC;gBACH,CAAC;YACH,CAAC;YAED,GAAG,CAAC,oCAAoC,CAAC,CAAC;YAC1C,OAAO,SAAS,CAAC;QACnB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,GAAG,CAAC,sBAAsB,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC;YACpF,OAAO,SAAS,CAAC;QACnB,CAAC;IACH,CAAC;IAED;;;;;;;;;OASG;IACI,MAAM,CAAC,+BAA+B,CAC3C,MAAc,EACd,cAA+B,EAC/B,MAAuB,EACvB,SAAkB;QAElB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,GAAG,EAAE,GAAE,CAAC,CAAC,CAAC;QAEjC,mCAAmC;QACnC,IAAI,MAAM,EAAE,CAAC;YACX,GAAG,CAAC,gBAAgB,MAAM,CAAC,MAAM,QAAQ,CAAC,CAAC;YAC3C,GAAG,CAAC,uBAAuB,MAAM,CAAC,KAAK,CAAC,CAAC,EAAE,IAAI,CAAC,GAAG,CAAC,EAAE,EAAE,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC;YAE3F,IAAI,MAAM,CAAC,MAAM,IAAI,CAAC,EAAE,CAAC;gBACvB,MAAM,UAAU,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;gBAC7B,MAAM,YAAY,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;gBAC/B,MAAM,YAAY,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;gBAC/B,MAAM,YAAY,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;gBAElD,GAAG,CACD,oBAAoB,UAAU,aAAa,YAAY,IAAI,YAAY,YAAY,YAAY,EAAE,CAClG,CAAC;YACJ,CAAC;QACH,CAAC;QAED,gDAAgD;QAChD,IAAI,aAAa,GAAG,MAAM,CAAC;QAC3B,IAAI,cAAc,EAAE,CAAC;YACnB,MAAM,YAAY,GAAG,QAAQ,CAAC,kBAAkB,CAAC,cAAc,CAAC,CAAC;YACjE,MAAM,iBAAiB,GAAG,iBAAiB,CAAC,2BAA2B,CACrE,MAAM,EACN,YAAY,EACZ,MAAM,CACP,CAAC;YAEF,IAAI,CAAC,iBAAiB,EAAE,CAAC;gBACvB,GAAG,CAAC,4CAA4C,YAAY,EAAE,CAAC,CAAC;gBAChE,OAAO,SAAS,CAAC,CAAC,8CAA8C;YAClE,CAAC;YAED,aAAa,GAAG,iBAAiB,CAAC;YAClC,GAAG,CAAC,sCAAsC,aAAa,CAAC,MAAM,EAAE,CAAC,CAAC;QACpE,CAAC;QAED,wCAAwC;QACxC,MAAM,WAAW,GAAG,IAAI,CAAC,UAAU,CAAC,aAAa,EAAE,MAAM,CAAC,CAAC;QAC3D,IAAI,WAAW,EAAE,CAAC;YAChB,GAAG,CAAC,uBAAuB,WAAW,EAAE,CAAC,CAAC;YAC1C,OAAO,WAAW,CAAC;QACrB,CAAC;QAED,kEAAkE;QAClE,IAAI,QAAQ,CAAC,aAAa,CAAC,aAAa,CAAC,EAAE,CAAC;YAC1C,MAAM,cAAc,GAAG,iBAAiB,CAAC,oBAAoB,CAAC,aAAa,EAAE,MAAM,CAAC,CAAC;YAErF,IAAI,cAAc,CAAC,YAAY,EAAE,CAAC;gBAChC,GAAG,CAAC,iEAAiE,CAAC,CAAC;gBAEvE,wCAAwC;gBACxC,MAAM,MAAM,GAAG,IAAI,CAAC,0BAA0B,CAAC,aAAa,EAAE,MAAM,CAAC,CAAC;gBACtE,IAAI,MAAM,EAAE,CAAC;oBACX,GAAG,CAAC,qCAAqC,MAAM,EAAE,CAAC,CAAC;oBACnD,OAAO,MAAM,CAAC;gBAChB,CAAC;YACH,CAAC;QACH,CAAC;QAED,kEAAkE;QAClE,IAAI,SAAS,IAAI,QAAQ,CAAC,oBAAoB,CAAC,MAAM,CAAC,EAAE,CAAC;YACvD,GAAG,CAAC,mDAAmD,SAAS,EAAE,CAAC,CAAC;YACpE,OAAO,SAAS,CAAC;QACnB,CAAC;QAED,OAAO,SAAS,CAAC;IACnB,CAAC;IAED;;;;;;;;;OASG;IACI,MAAM,CAAC,gBAAgB,CAC5B,MAAc,EACd,cAA8B,EAC9B,MAAuB,EACvB,SAAkB;QAElB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,GAAG,EAAE,GAAE,CAAC,CAAC,CAAC;QAEjC,gCAAgC;QAChC,IAAI,CAAC,cAAc,CAAC,SAAS,EAAE,CAAC;YAC9B,cAAc,CAAC,SAAS,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACxC,CAAC;QAED,uDAAuD;QACvD,IAAI,CAAC,QAAQ,CAAC,cAAc,CAAC,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,oBAAoB,CAAC,MAAM,CAAC,EAAE,CAAC;YAC/E,GAAG,CAAC,gDAAgD,CAAC,CAAC;YACtD,OAAO,SAAS,CAAC;QACnB,CAAC;QAED,oCAAoC;QACpC,MAAM,YAAY,GAAG,QAAQ,CAAC,kBAAkB,CAAC,cAAc,CAAC,CAAC;QACjE,GAAG,CAAC,wCAAwC,YAAY,oBAAoB,MAAM,CAAC,MAAM,EAAE,CAAC,CAAC;QAE7F,kEAAkE;QAClE,IAAI,QAAQ,CAAC,oBAAoB,CAAC,MAAM,CAAC,EAAE,CAAC;YAC1C,6CAA6C;YAC7C,IAAI,SAAS,EAAE,CAAC;gBACd,GAAG,CAAC,mDAAmD,SAAS,EAAE,CAAC,CAAC;gBACpE,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,GAAG,CAAC,uEAAuE,CAAC,CAAC;YAC7E,OAAO,SAAS,CAAC;QACnB,CAAC;QAED,wCAAwC;QACxC,IAAI,QAAQ,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;YACnC,MAAM,cAAc,GAAG,iBAAiB,CAAC,oBAAoB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;YAE9E,IAAI,cAAc,CAAC,YAAY,EAAE,CAAC;gBAChC,GAAG,CAAC,2CAA2C,CAAC,CAAC;gBAEjD,2CAA2C;gBAC3C,MAAM,WAAW,GAAG,IAAI,CAAC,UAAU,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;gBACpD,IAAI,WAAW,EAAE,CAAC;oBAChB,GAAG,CAAC,6CAA6C,WAAW,EAAE,CAAC,CAAC;oBAChE,OAAO,WAAW,CAAC;gBACrB,CAAC;gBAED,6CAA6C;gBAC7C,mCAAmC;gBACnC,MAAM,MAAM,GAAG,IAAI,CAAC,0BAA0B,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;gBAC/D,IAAI,MAAM,EAAE,CAAC;oBACX,GAAG,CAAC,qCAAqC,MAAM,EAAE,CAAC,CAAC;oBACnD,OAAO,MAAM,CAAC;gBAChB,CAAC;gBAED,GAAG,CAAC,4CAA4C,CAAC,CAAC;YACpD,CAAC;QACH,CAAC;QAED,0DAA0D;QAC1D,MAAM,GAAG,GAAG,IAAI,CAAC,+BAA+B,CAAC,MAAM,EAAE,cAAc,EAAE,MAAM,CAAC,CAAC;QAEjF,IAAI,GAAG,EAAE,CAAC;YACR,GAAG,CAAC,+BAA+B,GAAG,EAAE,CAAC,CAAC;YAC1C,OAAO,GAAG,CAAC;QACb,CAAC;QAED,sEAAsE;QACtE,IAAI,QAAQ,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;YACnC,GAAG,CAAC,yEAAyE,CAAC,CAAC;QACjF,CAAC;QAED,OAAO,SAAS,CAAC;IACnB,CAAC;CACF"}
@@ -1,4 +0,0 @@
1
- export {};
2
- /**
3
- * TLS utilities
4
- */
@@ -1,5 +0,0 @@
1
- export {};
2
- /**
3
- * TLS utilities
4
- */
5
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi8uLi90cy9wcm90b2NvbHMvdGxzL3V0aWxzL2luZGV4LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7QUFBQTs7R0FFRyJ9
@@ -1,158 +0,0 @@
1
- /**
2
- * TLS record types as defined in various RFCs
3
- */
4
- export declare enum TlsRecordType {
5
- CHANGE_CIPHER_SPEC = 20,
6
- ALERT = 21,
7
- HANDSHAKE = 22,
8
- APPLICATION_DATA = 23,
9
- HEARTBEAT = 24
10
- }
11
- /**
12
- * TLS handshake message types
13
- */
14
- export declare enum TlsHandshakeType {
15
- HELLO_REQUEST = 0,
16
- CLIENT_HELLO = 1,
17
- SERVER_HELLO = 2,
18
- NEW_SESSION_TICKET = 4,
19
- ENCRYPTED_EXTENSIONS = 8,// TLS 1.3
20
- CERTIFICATE = 11,
21
- SERVER_KEY_EXCHANGE = 12,
22
- CERTIFICATE_REQUEST = 13,
23
- SERVER_HELLO_DONE = 14,
24
- CERTIFICATE_VERIFY = 15,
25
- CLIENT_KEY_EXCHANGE = 16,
26
- FINISHED = 20
27
- }
28
- /**
29
- * TLS extension types
30
- */
31
- export declare enum TlsExtensionType {
32
- SERVER_NAME = 0,// SNI
33
- MAX_FRAGMENT_LENGTH = 1,
34
- CLIENT_CERTIFICATE_URL = 2,
35
- TRUSTED_CA_KEYS = 3,
36
- TRUNCATED_HMAC = 4,
37
- STATUS_REQUEST = 5,// OCSP
38
- SUPPORTED_GROUPS = 10,// Previously named "elliptic_curves"
39
- EC_POINT_FORMATS = 11,
40
- SIGNATURE_ALGORITHMS = 13,
41
- APPLICATION_LAYER_PROTOCOL_NEGOTIATION = 16,// ALPN
42
- SIGNED_CERTIFICATE_TIMESTAMP = 18,// Certificate Transparency
43
- PADDING = 21,
44
- SESSION_TICKET = 35,
45
- PRE_SHARED_KEY = 41,// TLS 1.3
46
- EARLY_DATA = 42,// TLS 1.3 0-RTT
47
- SUPPORTED_VERSIONS = 43,// TLS 1.3
48
- COOKIE = 44,// TLS 1.3
49
- PSK_KEY_EXCHANGE_MODES = 45,// TLS 1.3
50
- CERTIFICATE_AUTHORITIES = 47,// TLS 1.3
51
- POST_HANDSHAKE_AUTH = 49,// TLS 1.3
52
- SIGNATURE_ALGORITHMS_CERT = 50,// TLS 1.3
53
- KEY_SHARE = 51
54
- }
55
- /**
56
- * TLS alert levels
57
- */
58
- export declare enum TlsAlertLevel {
59
- WARNING = 1,
60
- FATAL = 2
61
- }
62
- /**
63
- * TLS alert description codes
64
- */
65
- export declare enum TlsAlertDescription {
66
- CLOSE_NOTIFY = 0,
67
- UNEXPECTED_MESSAGE = 10,
68
- BAD_RECORD_MAC = 20,
69
- DECRYPTION_FAILED = 21,// TLS 1.0 only
70
- RECORD_OVERFLOW = 22,
71
- DECOMPRESSION_FAILURE = 30,// TLS 1.2 and below
72
- HANDSHAKE_FAILURE = 40,
73
- NO_CERTIFICATE = 41,// SSLv3 only
74
- BAD_CERTIFICATE = 42,
75
- UNSUPPORTED_CERTIFICATE = 43,
76
- CERTIFICATE_REVOKED = 44,
77
- CERTIFICATE_EXPIRED = 45,
78
- CERTIFICATE_UNKNOWN = 46,
79
- ILLEGAL_PARAMETER = 47,
80
- UNKNOWN_CA = 48,
81
- ACCESS_DENIED = 49,
82
- DECODE_ERROR = 50,
83
- DECRYPT_ERROR = 51,
84
- EXPORT_RESTRICTION = 60,// TLS 1.0 only
85
- PROTOCOL_VERSION = 70,
86
- INSUFFICIENT_SECURITY = 71,
87
- INTERNAL_ERROR = 80,
88
- INAPPROPRIATE_FALLBACK = 86,
89
- USER_CANCELED = 90,
90
- NO_RENEGOTIATION = 100,// TLS 1.2 and below
91
- MISSING_EXTENSION = 109,// TLS 1.3
92
- UNSUPPORTED_EXTENSION = 110,// TLS 1.3
93
- CERTIFICATE_REQUIRED = 111,// TLS 1.3
94
- UNRECOGNIZED_NAME = 112,
95
- BAD_CERTIFICATE_STATUS_RESPONSE = 113,
96
- BAD_CERTIFICATE_HASH_VALUE = 114,// TLS 1.2 and below
97
- UNKNOWN_PSK_IDENTITY = 115,
98
- CERTIFICATE_REQUIRED_1_3 = 116,// TLS 1.3
99
- NO_APPLICATION_PROTOCOL = 120
100
- }
101
- /**
102
- * TLS version codes (major.minor)
103
- */
104
- export declare const TlsVersion: {
105
- SSL3: number[];
106
- TLS1_0: number[];
107
- TLS1_1: number[];
108
- TLS1_2: number[];
109
- TLS1_3: number[];
110
- };
111
- /**
112
- * Utility functions for TLS protocol operations
113
- */
114
- export declare class TlsUtils {
115
- /**
116
- * Checks if a buffer contains a TLS handshake record
117
- * @param buffer The buffer to check
118
- * @returns true if the buffer starts with a TLS handshake record
119
- */
120
- static isTlsHandshake(buffer: Buffer): boolean;
121
- /**
122
- * Checks if a buffer contains TLS application data
123
- * @param buffer The buffer to check
124
- * @returns true if the buffer starts with a TLS application data record
125
- */
126
- static isTlsApplicationData(buffer: Buffer): boolean;
127
- /**
128
- * Checks if a buffer contains a TLS alert record
129
- * @param buffer The buffer to check
130
- * @returns true if the buffer starts with a TLS alert record
131
- */
132
- static isTlsAlert(buffer: Buffer): boolean;
133
- /**
134
- * Checks if a buffer contains a TLS ClientHello message
135
- * @param buffer The buffer to check
136
- * @returns true if the buffer appears to be a ClientHello message
137
- */
138
- static isClientHello(buffer: Buffer): boolean;
139
- /**
140
- * Gets the record length from a TLS record header
141
- * @param buffer Buffer containing a TLS record
142
- * @returns The record length if the buffer is valid, -1 otherwise
143
- */
144
- static getTlsRecordLength(buffer: Buffer): number;
145
- /**
146
- * Creates a connection ID based on source/destination information
147
- * Used to track fragmented ClientHello messages across multiple packets
148
- *
149
- * @param connectionInfo Object containing connection identifiers
150
- * @returns A string ID for the connection
151
- */
152
- static createConnectionId(connectionInfo: {
153
- sourceIp?: string;
154
- sourcePort?: number;
155
- destIp?: string;
156
- destPort?: number;
157
- }): string;
158
- }
@@ -1,187 +0,0 @@
1
- import * as plugins from '../../../plugins.js';
2
- /**
3
- * TLS record types as defined in various RFCs
4
- */
5
- export var TlsRecordType;
6
- (function (TlsRecordType) {
7
- TlsRecordType[TlsRecordType["CHANGE_CIPHER_SPEC"] = 20] = "CHANGE_CIPHER_SPEC";
8
- TlsRecordType[TlsRecordType["ALERT"] = 21] = "ALERT";
9
- TlsRecordType[TlsRecordType["HANDSHAKE"] = 22] = "HANDSHAKE";
10
- TlsRecordType[TlsRecordType["APPLICATION_DATA"] = 23] = "APPLICATION_DATA";
11
- TlsRecordType[TlsRecordType["HEARTBEAT"] = 24] = "HEARTBEAT";
12
- })(TlsRecordType || (TlsRecordType = {}));
13
- /**
14
- * TLS handshake message types
15
- */
16
- export var TlsHandshakeType;
17
- (function (TlsHandshakeType) {
18
- TlsHandshakeType[TlsHandshakeType["HELLO_REQUEST"] = 0] = "HELLO_REQUEST";
19
- TlsHandshakeType[TlsHandshakeType["CLIENT_HELLO"] = 1] = "CLIENT_HELLO";
20
- TlsHandshakeType[TlsHandshakeType["SERVER_HELLO"] = 2] = "SERVER_HELLO";
21
- TlsHandshakeType[TlsHandshakeType["NEW_SESSION_TICKET"] = 4] = "NEW_SESSION_TICKET";
22
- TlsHandshakeType[TlsHandshakeType["ENCRYPTED_EXTENSIONS"] = 8] = "ENCRYPTED_EXTENSIONS";
23
- TlsHandshakeType[TlsHandshakeType["CERTIFICATE"] = 11] = "CERTIFICATE";
24
- TlsHandshakeType[TlsHandshakeType["SERVER_KEY_EXCHANGE"] = 12] = "SERVER_KEY_EXCHANGE";
25
- TlsHandshakeType[TlsHandshakeType["CERTIFICATE_REQUEST"] = 13] = "CERTIFICATE_REQUEST";
26
- TlsHandshakeType[TlsHandshakeType["SERVER_HELLO_DONE"] = 14] = "SERVER_HELLO_DONE";
27
- TlsHandshakeType[TlsHandshakeType["CERTIFICATE_VERIFY"] = 15] = "CERTIFICATE_VERIFY";
28
- TlsHandshakeType[TlsHandshakeType["CLIENT_KEY_EXCHANGE"] = 16] = "CLIENT_KEY_EXCHANGE";
29
- TlsHandshakeType[TlsHandshakeType["FINISHED"] = 20] = "FINISHED";
30
- })(TlsHandshakeType || (TlsHandshakeType = {}));
31
- /**
32
- * TLS extension types
33
- */
34
- export var TlsExtensionType;
35
- (function (TlsExtensionType) {
36
- TlsExtensionType[TlsExtensionType["SERVER_NAME"] = 0] = "SERVER_NAME";
37
- TlsExtensionType[TlsExtensionType["MAX_FRAGMENT_LENGTH"] = 1] = "MAX_FRAGMENT_LENGTH";
38
- TlsExtensionType[TlsExtensionType["CLIENT_CERTIFICATE_URL"] = 2] = "CLIENT_CERTIFICATE_URL";
39
- TlsExtensionType[TlsExtensionType["TRUSTED_CA_KEYS"] = 3] = "TRUSTED_CA_KEYS";
40
- TlsExtensionType[TlsExtensionType["TRUNCATED_HMAC"] = 4] = "TRUNCATED_HMAC";
41
- TlsExtensionType[TlsExtensionType["STATUS_REQUEST"] = 5] = "STATUS_REQUEST";
42
- TlsExtensionType[TlsExtensionType["SUPPORTED_GROUPS"] = 10] = "SUPPORTED_GROUPS";
43
- TlsExtensionType[TlsExtensionType["EC_POINT_FORMATS"] = 11] = "EC_POINT_FORMATS";
44
- TlsExtensionType[TlsExtensionType["SIGNATURE_ALGORITHMS"] = 13] = "SIGNATURE_ALGORITHMS";
45
- TlsExtensionType[TlsExtensionType["APPLICATION_LAYER_PROTOCOL_NEGOTIATION"] = 16] = "APPLICATION_LAYER_PROTOCOL_NEGOTIATION";
46
- TlsExtensionType[TlsExtensionType["SIGNED_CERTIFICATE_TIMESTAMP"] = 18] = "SIGNED_CERTIFICATE_TIMESTAMP";
47
- TlsExtensionType[TlsExtensionType["PADDING"] = 21] = "PADDING";
48
- TlsExtensionType[TlsExtensionType["SESSION_TICKET"] = 35] = "SESSION_TICKET";
49
- TlsExtensionType[TlsExtensionType["PRE_SHARED_KEY"] = 41] = "PRE_SHARED_KEY";
50
- TlsExtensionType[TlsExtensionType["EARLY_DATA"] = 42] = "EARLY_DATA";
51
- TlsExtensionType[TlsExtensionType["SUPPORTED_VERSIONS"] = 43] = "SUPPORTED_VERSIONS";
52
- TlsExtensionType[TlsExtensionType["COOKIE"] = 44] = "COOKIE";
53
- TlsExtensionType[TlsExtensionType["PSK_KEY_EXCHANGE_MODES"] = 45] = "PSK_KEY_EXCHANGE_MODES";
54
- TlsExtensionType[TlsExtensionType["CERTIFICATE_AUTHORITIES"] = 47] = "CERTIFICATE_AUTHORITIES";
55
- TlsExtensionType[TlsExtensionType["POST_HANDSHAKE_AUTH"] = 49] = "POST_HANDSHAKE_AUTH";
56
- TlsExtensionType[TlsExtensionType["SIGNATURE_ALGORITHMS_CERT"] = 50] = "SIGNATURE_ALGORITHMS_CERT";
57
- TlsExtensionType[TlsExtensionType["KEY_SHARE"] = 51] = "KEY_SHARE";
58
- })(TlsExtensionType || (TlsExtensionType = {}));
59
- /**
60
- * TLS alert levels
61
- */
62
- export var TlsAlertLevel;
63
- (function (TlsAlertLevel) {
64
- TlsAlertLevel[TlsAlertLevel["WARNING"] = 1] = "WARNING";
65
- TlsAlertLevel[TlsAlertLevel["FATAL"] = 2] = "FATAL";
66
- })(TlsAlertLevel || (TlsAlertLevel = {}));
67
- /**
68
- * TLS alert description codes
69
- */
70
- export var TlsAlertDescription;
71
- (function (TlsAlertDescription) {
72
- TlsAlertDescription[TlsAlertDescription["CLOSE_NOTIFY"] = 0] = "CLOSE_NOTIFY";
73
- TlsAlertDescription[TlsAlertDescription["UNEXPECTED_MESSAGE"] = 10] = "UNEXPECTED_MESSAGE";
74
- TlsAlertDescription[TlsAlertDescription["BAD_RECORD_MAC"] = 20] = "BAD_RECORD_MAC";
75
- TlsAlertDescription[TlsAlertDescription["DECRYPTION_FAILED"] = 21] = "DECRYPTION_FAILED";
76
- TlsAlertDescription[TlsAlertDescription["RECORD_OVERFLOW"] = 22] = "RECORD_OVERFLOW";
77
- TlsAlertDescription[TlsAlertDescription["DECOMPRESSION_FAILURE"] = 30] = "DECOMPRESSION_FAILURE";
78
- TlsAlertDescription[TlsAlertDescription["HANDSHAKE_FAILURE"] = 40] = "HANDSHAKE_FAILURE";
79
- TlsAlertDescription[TlsAlertDescription["NO_CERTIFICATE"] = 41] = "NO_CERTIFICATE";
80
- TlsAlertDescription[TlsAlertDescription["BAD_CERTIFICATE"] = 42] = "BAD_CERTIFICATE";
81
- TlsAlertDescription[TlsAlertDescription["UNSUPPORTED_CERTIFICATE"] = 43] = "UNSUPPORTED_CERTIFICATE";
82
- TlsAlertDescription[TlsAlertDescription["CERTIFICATE_REVOKED"] = 44] = "CERTIFICATE_REVOKED";
83
- TlsAlertDescription[TlsAlertDescription["CERTIFICATE_EXPIRED"] = 45] = "CERTIFICATE_EXPIRED";
84
- TlsAlertDescription[TlsAlertDescription["CERTIFICATE_UNKNOWN"] = 46] = "CERTIFICATE_UNKNOWN";
85
- TlsAlertDescription[TlsAlertDescription["ILLEGAL_PARAMETER"] = 47] = "ILLEGAL_PARAMETER";
86
- TlsAlertDescription[TlsAlertDescription["UNKNOWN_CA"] = 48] = "UNKNOWN_CA";
87
- TlsAlertDescription[TlsAlertDescription["ACCESS_DENIED"] = 49] = "ACCESS_DENIED";
88
- TlsAlertDescription[TlsAlertDescription["DECODE_ERROR"] = 50] = "DECODE_ERROR";
89
- TlsAlertDescription[TlsAlertDescription["DECRYPT_ERROR"] = 51] = "DECRYPT_ERROR";
90
- TlsAlertDescription[TlsAlertDescription["EXPORT_RESTRICTION"] = 60] = "EXPORT_RESTRICTION";
91
- TlsAlertDescription[TlsAlertDescription["PROTOCOL_VERSION"] = 70] = "PROTOCOL_VERSION";
92
- TlsAlertDescription[TlsAlertDescription["INSUFFICIENT_SECURITY"] = 71] = "INSUFFICIENT_SECURITY";
93
- TlsAlertDescription[TlsAlertDescription["INTERNAL_ERROR"] = 80] = "INTERNAL_ERROR";
94
- TlsAlertDescription[TlsAlertDescription["INAPPROPRIATE_FALLBACK"] = 86] = "INAPPROPRIATE_FALLBACK";
95
- TlsAlertDescription[TlsAlertDescription["USER_CANCELED"] = 90] = "USER_CANCELED";
96
- TlsAlertDescription[TlsAlertDescription["NO_RENEGOTIATION"] = 100] = "NO_RENEGOTIATION";
97
- TlsAlertDescription[TlsAlertDescription["MISSING_EXTENSION"] = 109] = "MISSING_EXTENSION";
98
- TlsAlertDescription[TlsAlertDescription["UNSUPPORTED_EXTENSION"] = 110] = "UNSUPPORTED_EXTENSION";
99
- TlsAlertDescription[TlsAlertDescription["CERTIFICATE_REQUIRED"] = 111] = "CERTIFICATE_REQUIRED";
100
- TlsAlertDescription[TlsAlertDescription["UNRECOGNIZED_NAME"] = 112] = "UNRECOGNIZED_NAME";
101
- TlsAlertDescription[TlsAlertDescription["BAD_CERTIFICATE_STATUS_RESPONSE"] = 113] = "BAD_CERTIFICATE_STATUS_RESPONSE";
102
- TlsAlertDescription[TlsAlertDescription["BAD_CERTIFICATE_HASH_VALUE"] = 114] = "BAD_CERTIFICATE_HASH_VALUE";
103
- TlsAlertDescription[TlsAlertDescription["UNKNOWN_PSK_IDENTITY"] = 115] = "UNKNOWN_PSK_IDENTITY";
104
- TlsAlertDescription[TlsAlertDescription["CERTIFICATE_REQUIRED_1_3"] = 116] = "CERTIFICATE_REQUIRED_1_3";
105
- TlsAlertDescription[TlsAlertDescription["NO_APPLICATION_PROTOCOL"] = 120] = "NO_APPLICATION_PROTOCOL";
106
- })(TlsAlertDescription || (TlsAlertDescription = {}));
107
- /**
108
- * TLS version codes (major.minor)
109
- */
110
- export const TlsVersion = {
111
- SSL3: [0x03, 0x00],
112
- TLS1_0: [0x03, 0x01],
113
- TLS1_1: [0x03, 0x02],
114
- TLS1_2: [0x03, 0x03],
115
- TLS1_3: [0x03, 0x04],
116
- };
117
- /**
118
- * Utility functions for TLS protocol operations
119
- */
120
- export class TlsUtils {
121
- /**
122
- * Checks if a buffer contains a TLS handshake record
123
- * @param buffer The buffer to check
124
- * @returns true if the buffer starts with a TLS handshake record
125
- */
126
- static isTlsHandshake(buffer) {
127
- return buffer.length > 0 && buffer[0] === TlsRecordType.HANDSHAKE;
128
- }
129
- /**
130
- * Checks if a buffer contains TLS application data
131
- * @param buffer The buffer to check
132
- * @returns true if the buffer starts with a TLS application data record
133
- */
134
- static isTlsApplicationData(buffer) {
135
- return buffer.length > 0 && buffer[0] === TlsRecordType.APPLICATION_DATA;
136
- }
137
- /**
138
- * Checks if a buffer contains a TLS alert record
139
- * @param buffer The buffer to check
140
- * @returns true if the buffer starts with a TLS alert record
141
- */
142
- static isTlsAlert(buffer) {
143
- return buffer.length > 0 && buffer[0] === TlsRecordType.ALERT;
144
- }
145
- /**
146
- * Checks if a buffer contains a TLS ClientHello message
147
- * @param buffer The buffer to check
148
- * @returns true if the buffer appears to be a ClientHello message
149
- */
150
- static isClientHello(buffer) {
151
- // Minimum ClientHello size (TLS record header + handshake header)
152
- if (buffer.length < 9) {
153
- return false;
154
- }
155
- // Check record type (must be TLS_HANDSHAKE_RECORD_TYPE)
156
- if (buffer[0] !== TlsRecordType.HANDSHAKE) {
157
- return false;
158
- }
159
- // Skip version and length in TLS record header (5 bytes total)
160
- // Check handshake type at byte 5 (must be CLIENT_HELLO)
161
- return buffer[5] === TlsHandshakeType.CLIENT_HELLO;
162
- }
163
- /**
164
- * Gets the record length from a TLS record header
165
- * @param buffer Buffer containing a TLS record
166
- * @returns The record length if the buffer is valid, -1 otherwise
167
- */
168
- static getTlsRecordLength(buffer) {
169
- if (buffer.length < 5) {
170
- return -1;
171
- }
172
- // Bytes 3-4 contain the record length (big-endian)
173
- return (buffer[3] << 8) + buffer[4];
174
- }
175
- /**
176
- * Creates a connection ID based on source/destination information
177
- * Used to track fragmented ClientHello messages across multiple packets
178
- *
179
- * @param connectionInfo Object containing connection identifiers
180
- * @returns A string ID for the connection
181
- */
182
- static createConnectionId(connectionInfo) {
183
- const { sourceIp, sourcePort, destIp, destPort } = connectionInfo;
184
- return `${sourceIp}:${sourcePort}-${destIp}:${destPort}`;
185
- }
186
- }
187
- //# sourceMappingURL=data:application/json;base64,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