@push.rocks/smartproxy 25.17.9 → 26.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (179) hide show
  1. package/changelog.md +16 -0
  2. package/dist_rust/rustproxy_linux_amd64 +0 -0
  3. package/dist_rust/rustproxy_linux_arm64 +0 -0
  4. package/dist_ts/00_commitinfo_data.js +2 -2
  5. package/dist_ts/core/index.d.ts +0 -1
  6. package/dist_ts/core/index.js +1 -2
  7. package/dist_ts/core/models/index.d.ts +0 -1
  8. package/dist_ts/core/models/index.js +1 -2
  9. package/dist_ts/core/utils/index.d.ts +0 -12
  10. package/dist_ts/core/utils/index.js +1 -13
  11. package/dist_ts/index.d.ts +0 -3
  12. package/dist_ts/index.js +2 -7
  13. package/dist_ts/protocols/http/index.d.ts +0 -1
  14. package/dist_ts/protocols/http/index.js +1 -2
  15. package/dist_ts/protocols/index.d.ts +0 -7
  16. package/dist_ts/protocols/index.js +1 -8
  17. package/dist_ts/proxies/smart-proxy/socket-handler-server.js +6 -1
  18. package/dist_ts/proxies/smart-proxy/utils/route-helpers/socket-handlers.d.ts +0 -7
  19. package/dist_ts/proxies/smart-proxy/utils/route-helpers/socket-handlers.js +50 -51
  20. package/dist_ts/routing/index.d.ts +0 -1
  21. package/dist_ts/routing/index.js +1 -3
  22. package/package.json +1 -1
  23. package/ts/00_commitinfo_data.ts +1 -1
  24. package/ts/core/index.ts +0 -1
  25. package/ts/core/models/index.ts +0 -1
  26. package/ts/core/utils/index.ts +0 -12
  27. package/ts/index.ts +1 -7
  28. package/ts/protocols/http/index.ts +1 -2
  29. package/ts/protocols/index.ts +0 -7
  30. package/ts/proxies/smart-proxy/socket-handler-server.ts +6 -0
  31. package/ts/proxies/smart-proxy/utils/route-helpers/socket-handlers.ts +60 -59
  32. package/ts/routing/index.ts +0 -3
  33. package/dist_ts/core/events/index.d.ts +0 -4
  34. package/dist_ts/core/events/index.js +0 -5
  35. package/dist_ts/core/models/socket-augmentation.d.ts +0 -15
  36. package/dist_ts/core/models/socket-augmentation.js +0 -18
  37. package/dist_ts/core/utils/async-utils.d.ts +0 -81
  38. package/dist_ts/core/utils/async-utils.js +0 -216
  39. package/dist_ts/core/utils/binary-heap.d.ts +0 -73
  40. package/dist_ts/core/utils/binary-heap.js +0 -193
  41. package/dist_ts/core/utils/enhanced-connection-pool.d.ts +0 -110
  42. package/dist_ts/core/utils/enhanced-connection-pool.js +0 -325
  43. package/dist_ts/core/utils/fs-utils.d.ts +0 -144
  44. package/dist_ts/core/utils/fs-utils.js +0 -252
  45. package/dist_ts/core/utils/ip-utils.d.ts +0 -69
  46. package/dist_ts/core/utils/ip-utils.js +0 -270
  47. package/dist_ts/core/utils/lifecycle-component.d.ts +0 -59
  48. package/dist_ts/core/utils/lifecycle-component.js +0 -211
  49. package/dist_ts/core/utils/log-deduplicator.d.ts +0 -39
  50. package/dist_ts/core/utils/log-deduplicator.js +0 -305
  51. package/dist_ts/core/utils/security-utils.d.ts +0 -111
  52. package/dist_ts/core/utils/security-utils.js +0 -212
  53. package/dist_ts/core/utils/shared-security-manager.d.ts +0 -128
  54. package/dist_ts/core/utils/shared-security-manager.js +0 -362
  55. package/dist_ts/core/utils/socket-utils.d.ts +0 -63
  56. package/dist_ts/core/utils/socket-utils.js +0 -249
  57. package/dist_ts/core/utils/template-utils.d.ts +0 -37
  58. package/dist_ts/core/utils/template-utils.js +0 -104
  59. package/dist_ts/core/utils/validation-utils.d.ts +0 -61
  60. package/dist_ts/core/utils/validation-utils.js +0 -149
  61. package/dist_ts/core/utils/websocket-utils.d.ts +0 -22
  62. package/dist_ts/core/utils/websocket-utils.js +0 -30
  63. package/dist_ts/detection/detectors/http-detector.d.ts +0 -33
  64. package/dist_ts/detection/detectors/http-detector.js +0 -101
  65. package/dist_ts/detection/detectors/quick-detector.d.ts +0 -28
  66. package/dist_ts/detection/detectors/quick-detector.js +0 -131
  67. package/dist_ts/detection/detectors/routing-extractor.d.ts +0 -28
  68. package/dist_ts/detection/detectors/routing-extractor.js +0 -122
  69. package/dist_ts/detection/detectors/tls-detector.d.ts +0 -47
  70. package/dist_ts/detection/detectors/tls-detector.js +0 -183
  71. package/dist_ts/detection/index.d.ts +0 -17
  72. package/dist_ts/detection/index.js +0 -22
  73. package/dist_ts/detection/models/detection-types.d.ts +0 -87
  74. package/dist_ts/detection/models/detection-types.js +0 -5
  75. package/dist_ts/detection/models/interfaces.d.ts +0 -97
  76. package/dist_ts/detection/models/interfaces.js +0 -5
  77. package/dist_ts/detection/protocol-detector.d.ts +0 -79
  78. package/dist_ts/detection/protocol-detector.js +0 -253
  79. package/dist_ts/detection/utils/buffer-utils.d.ts +0 -61
  80. package/dist_ts/detection/utils/buffer-utils.js +0 -127
  81. package/dist_ts/detection/utils/fragment-manager.d.ts +0 -31
  82. package/dist_ts/detection/utils/fragment-manager.js +0 -53
  83. package/dist_ts/detection/utils/parser-utils.d.ts +0 -42
  84. package/dist_ts/detection/utils/parser-utils.js +0 -63
  85. package/dist_ts/protocols/common/fragment-handler.d.ts +0 -73
  86. package/dist_ts/protocols/common/fragment-handler.js +0 -121
  87. package/dist_ts/protocols/common/index.d.ts +0 -7
  88. package/dist_ts/protocols/common/index.js +0 -8
  89. package/dist_ts/protocols/common/types.d.ts +0 -68
  90. package/dist_ts/protocols/common/types.js +0 -7
  91. package/dist_ts/protocols/http/parser.d.ts +0 -58
  92. package/dist_ts/protocols/http/parser.js +0 -184
  93. package/dist_ts/protocols/proxy/index.d.ts +0 -5
  94. package/dist_ts/protocols/proxy/index.js +0 -6
  95. package/dist_ts/protocols/proxy/types.d.ts +0 -47
  96. package/dist_ts/protocols/proxy/types.js +0 -6
  97. package/dist_ts/protocols/tls/alerts/index.d.ts +0 -4
  98. package/dist_ts/protocols/tls/alerts/index.js +0 -5
  99. package/dist_ts/protocols/tls/alerts/tls-alert.d.ts +0 -150
  100. package/dist_ts/protocols/tls/alerts/tls-alert.js +0 -226
  101. package/dist_ts/protocols/tls/index.d.ts +0 -12
  102. package/dist_ts/protocols/tls/index.js +0 -27
  103. package/dist_ts/protocols/tls/sni/client-hello-parser.d.ts +0 -100
  104. package/dist_ts/protocols/tls/sni/client-hello-parser.js +0 -463
  105. package/dist_ts/protocols/tls/sni/index.d.ts +0 -5
  106. package/dist_ts/protocols/tls/sni/index.js +0 -6
  107. package/dist_ts/protocols/tls/sni/sni-extraction.d.ts +0 -58
  108. package/dist_ts/protocols/tls/sni/sni-extraction.js +0 -275
  109. package/dist_ts/protocols/tls/utils/index.d.ts +0 -4
  110. package/dist_ts/protocols/tls/utils/index.js +0 -5
  111. package/dist_ts/protocols/tls/utils/tls-utils.d.ts +0 -158
  112. package/dist_ts/protocols/tls/utils/tls-utils.js +0 -187
  113. package/dist_ts/protocols/websocket/constants.d.ts +0 -55
  114. package/dist_ts/protocols/websocket/constants.js +0 -58
  115. package/dist_ts/protocols/websocket/index.d.ts +0 -7
  116. package/dist_ts/protocols/websocket/index.js +0 -8
  117. package/dist_ts/protocols/websocket/types.d.ts +0 -47
  118. package/dist_ts/protocols/websocket/types.js +0 -5
  119. package/dist_ts/protocols/websocket/utils.d.ts +0 -25
  120. package/dist_ts/protocols/websocket/utils.js +0 -103
  121. package/dist_ts/routing/router/http-router.d.ts +0 -89
  122. package/dist_ts/routing/router/http-router.js +0 -205
  123. package/dist_ts/routing/router/index.d.ts +0 -5
  124. package/dist_ts/routing/router/index.js +0 -6
  125. package/dist_ts/tls/index.d.ts +0 -16
  126. package/dist_ts/tls/index.js +0 -24
  127. package/dist_ts/tls/sni/index.d.ts +0 -4
  128. package/dist_ts/tls/sni/index.js +0 -5
  129. package/dist_ts/tls/sni/sni-handler.d.ts +0 -154
  130. package/dist_ts/tls/sni/sni-handler.js +0 -191
  131. package/ts/core/events/index.ts +0 -3
  132. package/ts/core/models/socket-augmentation.ts +0 -38
  133. package/ts/core/utils/async-utils.ts +0 -275
  134. package/ts/core/utils/binary-heap.ts +0 -225
  135. package/ts/core/utils/enhanced-connection-pool.ts +0 -425
  136. package/ts/core/utils/fs-utils.ts +0 -270
  137. package/ts/core/utils/ip-utils.ts +0 -303
  138. package/ts/core/utils/lifecycle-component.ts +0 -251
  139. package/ts/core/utils/log-deduplicator.ts +0 -370
  140. package/ts/core/utils/security-utils.ts +0 -305
  141. package/ts/core/utils/shared-security-manager.ts +0 -470
  142. package/ts/core/utils/socket-utils.ts +0 -322
  143. package/ts/core/utils/template-utils.ts +0 -124
  144. package/ts/core/utils/validation-utils.ts +0 -177
  145. package/ts/core/utils/websocket-utils.ts +0 -33
  146. package/ts/detection/detectors/http-detector.ts +0 -127
  147. package/ts/detection/detectors/quick-detector.ts +0 -148
  148. package/ts/detection/detectors/routing-extractor.ts +0 -147
  149. package/ts/detection/detectors/tls-detector.ts +0 -223
  150. package/ts/detection/index.ts +0 -25
  151. package/ts/detection/models/detection-types.ts +0 -102
  152. package/ts/detection/models/interfaces.ts +0 -115
  153. package/ts/detection/protocol-detector.ts +0 -319
  154. package/ts/detection/utils/buffer-utils.ts +0 -141
  155. package/ts/detection/utils/fragment-manager.ts +0 -64
  156. package/ts/detection/utils/parser-utils.ts +0 -77
  157. package/ts/protocols/common/fragment-handler.ts +0 -167
  158. package/ts/protocols/common/index.ts +0 -8
  159. package/ts/protocols/common/types.ts +0 -76
  160. package/ts/protocols/http/parser.ts +0 -219
  161. package/ts/protocols/proxy/index.ts +0 -6
  162. package/ts/protocols/proxy/types.ts +0 -53
  163. package/ts/protocols/tls/alerts/index.ts +0 -3
  164. package/ts/protocols/tls/alerts/tls-alert.ts +0 -259
  165. package/ts/protocols/tls/index.ts +0 -37
  166. package/ts/protocols/tls/sni/client-hello-parser.ts +0 -629
  167. package/ts/protocols/tls/sni/index.ts +0 -6
  168. package/ts/protocols/tls/sni/sni-extraction.ts +0 -353
  169. package/ts/protocols/tls/utils/index.ts +0 -3
  170. package/ts/protocols/tls/utils/tls-utils.ts +0 -201
  171. package/ts/protocols/websocket/constants.ts +0 -60
  172. package/ts/protocols/websocket/index.ts +0 -8
  173. package/ts/protocols/websocket/types.ts +0 -53
  174. package/ts/protocols/websocket/utils.ts +0 -98
  175. package/ts/routing/router/http-router.ts +0 -266
  176. package/ts/routing/router/index.ts +0 -7
  177. package/ts/tls/index.ts +0 -29
  178. package/ts/tls/sni/index.ts +0 -3
  179. package/ts/tls/sni/sni-handler.ts +0 -264
@@ -1,275 +0,0 @@
1
- import { Buffer } from 'node:buffer';
2
- import { TlsExtensionType, TlsUtils } from '../utils/tls-utils.js';
3
- import { ClientHelloParser } from './client-hello-parser.js';
4
- /**
5
- * Utilities for extracting SNI information from TLS handshakes
6
- */
7
- export class SniExtraction {
8
- /**
9
- * Extracts the SNI (Server Name Indication) from a TLS ClientHello message.
10
- *
11
- * @param buffer The buffer containing the TLS ClientHello message
12
- * @param logger Optional logging function
13
- * @returns The extracted server name or undefined if not found
14
- */
15
- static extractSNI(buffer, logger) {
16
- const log = logger || (() => { });
17
- try {
18
- // Parse the ClientHello
19
- const parseResult = ClientHelloParser.parseClientHello(buffer, logger);
20
- if (!parseResult.isValid) {
21
- log(`Failed to parse ClientHello: ${parseResult.error}`);
22
- return undefined;
23
- }
24
- // Check if ServerName extension was found
25
- if (parseResult.serverNameList && parseResult.serverNameList.length > 0) {
26
- // Use the first hostname (most common case)
27
- const serverName = parseResult.serverNameList[0];
28
- log(`Found SNI: ${serverName}`);
29
- return serverName;
30
- }
31
- log('No SNI extension found in ClientHello');
32
- return undefined;
33
- }
34
- catch (error) {
35
- log(`Error extracting SNI: ${error instanceof Error ? error.message : String(error)}`);
36
- return undefined;
37
- }
38
- }
39
- /**
40
- * Attempts to extract SNI from the PSK extension in a TLS 1.3 ClientHello.
41
- *
42
- * In TLS 1.3, when a client attempts to resume a session, it may include
43
- * the server name in the PSK identity hint rather than in the SNI extension.
44
- *
45
- * @param buffer The buffer containing the TLS ClientHello message
46
- * @param logger Optional logging function
47
- * @returns The extracted server name or undefined if not found
48
- */
49
- static extractSNIFromPSKExtension(buffer, logger) {
50
- const log = logger || (() => { });
51
- try {
52
- // Ensure this is a ClientHello
53
- if (!TlsUtils.isClientHello(buffer)) {
54
- log('Not a ClientHello message');
55
- return undefined;
56
- }
57
- // Parse the ClientHello to find PSK extension
58
- const parseResult = ClientHelloParser.parseClientHello(buffer, logger);
59
- if (!parseResult.isValid || !parseResult.extensions) {
60
- return undefined;
61
- }
62
- // Find the PSK extension
63
- const pskExtension = parseResult.extensions.find(ext => ext.type === TlsExtensionType.PRE_SHARED_KEY);
64
- if (!pskExtension) {
65
- log('No PSK extension found');
66
- return undefined;
67
- }
68
- // Parse the PSK extension data
69
- const data = pskExtension.data;
70
- // PSK extension structure:
71
- // 2 bytes: identities list length
72
- if (data.length < 2)
73
- return undefined;
74
- const identitiesLength = (data[0] << 8) + data[1];
75
- let pos = 2;
76
- // End of identities list
77
- const identitiesEnd = pos + identitiesLength;
78
- if (identitiesEnd > data.length)
79
- return undefined;
80
- // Process each PSK identity
81
- while (pos + 2 <= identitiesEnd) {
82
- // Identity length (2 bytes)
83
- if (pos + 2 > identitiesEnd)
84
- break;
85
- const identityLength = (data[pos] << 8) + data[pos + 1];
86
- pos += 2;
87
- if (pos + identityLength > identitiesEnd)
88
- break;
89
- // Try to extract hostname from identity
90
- // Chrome often embeds the hostname in the PSK identity
91
- // This is a heuristic as there's no standard format
92
- if (identityLength > 0) {
93
- const identity = data.slice(pos, pos + identityLength);
94
- // Skip identity bytes
95
- pos += identityLength;
96
- // Skip obfuscated ticket age (4 bytes)
97
- if (pos + 4 <= identitiesEnd) {
98
- pos += 4;
99
- }
100
- else {
101
- break;
102
- }
103
- // Try to parse the identity as UTF-8
104
- try {
105
- const identityStr = identity.toString('utf8');
106
- log(`PSK identity: ${identityStr}`);
107
- // Check if the identity contains hostname hints
108
- // Chrome often embeds the hostname in a known format
109
- // Try to extract using common patterns
110
- // Pattern 1: Look for domain name pattern
111
- const domainPattern = /([a-z0-9]([a-z0-9-]{0,61}[a-z0-9])?\.)+[a-z0-9]([a-z0-9-]{0,61}[a-z0-9])?/i;
112
- const domainMatch = identityStr.match(domainPattern);
113
- if (domainMatch && domainMatch[0]) {
114
- log(`Found domain in PSK identity: ${domainMatch[0]}`);
115
- return domainMatch[0];
116
- }
117
- // Pattern 2: Chrome sometimes uses a specific format with delimiters
118
- // This is a heuristic approach since the format isn't standardized
119
- const parts = identityStr.split('|');
120
- if (parts.length > 1) {
121
- for (const part of parts) {
122
- if (part.includes('.') && !part.includes('/')) {
123
- const possibleDomain = part.trim();
124
- if (/^[a-z0-9.-]+$/i.test(possibleDomain)) {
125
- log(`Found possible domain in PSK delimiter format: ${possibleDomain}`);
126
- return possibleDomain;
127
- }
128
- }
129
- }
130
- }
131
- }
132
- catch (e) {
133
- log('Failed to parse PSK identity as UTF-8');
134
- }
135
- }
136
- }
137
- log('No hostname found in PSK extension');
138
- return undefined;
139
- }
140
- catch (error) {
141
- log(`Error parsing PSK: ${error instanceof Error ? error.message : String(error)}`);
142
- return undefined;
143
- }
144
- }
145
- /**
146
- * Main entry point for SNI extraction with support for fragmented messages
147
- * and session resumption edge cases.
148
- *
149
- * @param buffer The buffer containing TLS data
150
- * @param connectionInfo Connection tracking information
151
- * @param logger Optional logging function
152
- * @param cachedSni Optional previously cached SNI value
153
- * @returns The extracted server name or undefined
154
- */
155
- static extractSNIWithResumptionSupport(buffer, connectionInfo, logger, cachedSni) {
156
- const log = logger || (() => { });
157
- // Log buffer details for debugging
158
- if (logger) {
159
- log(`Buffer size: ${buffer.length} bytes`);
160
- log(`Buffer starts with: ${buffer.slice(0, Math.min(10, buffer.length)).toString('hex')}`);
161
- if (buffer.length >= 5) {
162
- const recordType = buffer[0];
163
- const majorVersion = buffer[1];
164
- const minorVersion = buffer[2];
165
- const recordLength = (buffer[3] << 8) + buffer[4];
166
- log(`TLS Record: type=${recordType}, version=${majorVersion}.${minorVersion}, length=${recordLength}`);
167
- }
168
- }
169
- // Check if we need to handle fragmented packets
170
- let processBuffer = buffer;
171
- if (connectionInfo) {
172
- const connectionId = TlsUtils.createConnectionId(connectionInfo);
173
- const reassembledBuffer = ClientHelloParser.handleFragmentedClientHello(buffer, connectionId, logger);
174
- if (!reassembledBuffer) {
175
- log(`Waiting for more fragments on connection ${connectionId}`);
176
- return undefined; // Need more fragments to complete ClientHello
177
- }
178
- processBuffer = reassembledBuffer;
179
- log(`Using reassembled buffer of length ${processBuffer.length}`);
180
- }
181
- // First try the standard SNI extraction
182
- const standardSni = this.extractSNI(processBuffer, logger);
183
- if (standardSni) {
184
- log(`Found standard SNI: ${standardSni}`);
185
- return standardSni;
186
- }
187
- // Check for session resumption when standard SNI extraction fails
188
- if (TlsUtils.isClientHello(processBuffer)) {
189
- const resumptionInfo = ClientHelloParser.hasSessionResumption(processBuffer, logger);
190
- if (resumptionInfo.isResumption) {
191
- log(`Detected session resumption in ClientHello without standard SNI`);
192
- // Try to extract SNI from PSK extension
193
- const pskSni = this.extractSNIFromPSKExtension(processBuffer, logger);
194
- if (pskSni) {
195
- log(`Extracted SNI from PSK extension: ${pskSni}`);
196
- return pskSni;
197
- }
198
- }
199
- }
200
- // If cached SNI was provided, use it for application data packets
201
- if (cachedSni && TlsUtils.isTlsApplicationData(buffer)) {
202
- log(`Using provided cached SNI for application data: ${cachedSni}`);
203
- return cachedSni;
204
- }
205
- return undefined;
206
- }
207
- /**
208
- * Unified method for processing a TLS packet and extracting SNI.
209
- * Main entry point for SNI extraction that handles all edge cases.
210
- *
211
- * @param buffer The buffer containing TLS data
212
- * @param connectionInfo Connection tracking information
213
- * @param logger Optional logging function
214
- * @param cachedSni Optional previously cached SNI value
215
- * @returns The extracted server name or undefined
216
- */
217
- static processTlsPacket(buffer, connectionInfo, logger, cachedSni) {
218
- const log = logger || (() => { });
219
- // Add timestamp if not provided
220
- if (!connectionInfo.timestamp) {
221
- connectionInfo.timestamp = Date.now();
222
- }
223
- // Check if this is a TLS handshake or application data
224
- if (!TlsUtils.isTlsHandshake(buffer) && !TlsUtils.isTlsApplicationData(buffer)) {
225
- log('Not a TLS handshake or application data packet');
226
- return undefined;
227
- }
228
- // Create connection ID for tracking
229
- const connectionId = TlsUtils.createConnectionId(connectionInfo);
230
- log(`Processing TLS packet for connection ${connectionId}, buffer length: ${buffer.length}`);
231
- // Handle application data with cached SNI (for connection racing)
232
- if (TlsUtils.isTlsApplicationData(buffer)) {
233
- // If explicit cachedSni was provided, use it
234
- if (cachedSni) {
235
- log(`Using provided cached SNI for application data: ${cachedSni}`);
236
- return cachedSni;
237
- }
238
- log('Application data packet without cached SNI, cannot determine hostname');
239
- return undefined;
240
- }
241
- // Enhanced session resumption detection
242
- if (TlsUtils.isClientHello(buffer)) {
243
- const resumptionInfo = ClientHelloParser.hasSessionResumption(buffer, logger);
244
- if (resumptionInfo.isResumption) {
245
- log(`Session resumption detected in TLS packet`);
246
- // Always try standard SNI extraction first
247
- const standardSni = this.extractSNI(buffer, logger);
248
- if (standardSni) {
249
- log(`Found standard SNI in session resumption: ${standardSni}`);
250
- return standardSni;
251
- }
252
- // Enhanced session resumption SNI extraction
253
- // Try extracting from PSK identity
254
- const pskSni = this.extractSNIFromPSKExtension(buffer, logger);
255
- if (pskSni) {
256
- log(`Extracted SNI from PSK extension: ${pskSni}`);
257
- return pskSni;
258
- }
259
- log(`Session resumption without extractable SNI`);
260
- }
261
- }
262
- // For handshake messages, try the full extraction process
263
- const sni = this.extractSNIWithResumptionSupport(buffer, connectionInfo, logger);
264
- if (sni) {
265
- log(`Successfully extracted SNI: ${sni}`);
266
- return sni;
267
- }
268
- // If we couldn't extract an SNI, check if this is a valid ClientHello
269
- if (TlsUtils.isClientHello(buffer)) {
270
- log('Valid ClientHello detected, but no SNI extracted - might need more data');
271
- }
272
- return undefined;
273
- }
274
- }
275
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"sni-extraction.js","sourceRoot":"","sources":["../../../../ts/protocols/tls/sni/sni-extraction.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,aAAa,CAAC;AACrC,OAAO,EAAE,gBAAgB,EAAE,QAAQ,EAAE,MAAM,uBAAuB,CAAC;AACnE,OAAO,EACL,iBAAiB,EAElB,MAAM,0BAA0B,CAAC;AAalC;;GAEG;AACH,MAAM,OAAO,aAAa;IACxB;;;;;;OAMG;IACI,MAAM,CAAC,UAAU,CAAC,MAAc,EAAE,MAAuB;QAC9D,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,GAAG,EAAE,GAAE,CAAC,CAAC,CAAC;QAEjC,IAAI,CAAC;YACH,wBAAwB;YACxB,MAAM,WAAW,GAAG,iBAAiB,CAAC,gBAAgB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;YACvE,IAAI,CAAC,WAAW,CAAC,OAAO,EAAE,CAAC;gBACzB,GAAG,CAAC,gCAAgC,WAAW,CAAC,KAAK,EAAE,CAAC,CAAC;gBACzD,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,0CAA0C;YAC1C,IAAI,WAAW,CAAC,cAAc,IAAI,WAAW,CAAC,cAAc,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBACxE,4CAA4C;gBAC5C,MAAM,UAAU,GAAG,WAAW,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC;gBACjD,GAAG,CAAC,cAAc,UAAU,EAAE,CAAC,CAAC;gBAChC,OAAO,UAAU,CAAC;YACpB,CAAC;YAED,GAAG,CAAC,uCAAuC,CAAC,CAAC;YAC7C,OAAO,SAAS,CAAC;QACnB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,GAAG,CAAC,yBAAyB,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC;YACvF,OAAO,SAAS,CAAC;QACnB,CAAC;IACH,CAAC;IAED;;;;;;;;;OASG;IACI,MAAM,CAAC,0BAA0B,CACtC,MAAc,EACd,MAAuB;QAEvB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,GAAG,EAAE,GAAE,CAAC,CAAC,CAAC;QAEjC,IAAI,CAAC;YACH,+BAA+B;YAC/B,IAAI,CAAC,QAAQ,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;gBACpC,GAAG,CAAC,2BAA2B,CAAC,CAAC;gBACjC,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,8CAA8C;YAC9C,MAAM,WAAW,GAAG,iBAAiB,CAAC,gBAAgB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;YACvE,IAAI,CAAC,WAAW,CAAC,OAAO,IAAI,CAAC,WAAW,CAAC,UAAU,EAAE,CAAC;gBACpD,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,yBAAyB;YACzB,MAAM,YAAY,GAAG,WAAW,CAAC,UAAU,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,CACrD,GAAG,CAAC,IAAI,KAAK,gBAAgB,CAAC,cAAc,CAAC,CAAC;YAEhD,IAAI,CAAC,YAAY,EAAE,CAAC;gBAClB,GAAG,CAAC,wBAAwB,CAAC,CAAC;gBAC9B,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,+BAA+B;YAC/B,MAAM,IAAI,GAAG,YAAY,CAAC,IAAI,CAAC;YAE/B,2BAA2B;YAC3B,kCAAkC;YAClC,IAAI,IAAI,CAAC,MAAM,GAAG,CAAC;gBAAE,OAAO,SAAS,CAAC;YAEtC,MAAM,gBAAgB,GAAG,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,CAAC;YAClD,IAAI,GAAG,GAAG,CAAC,CAAC;YAEZ,yBAAyB;YACzB,MAAM,aAAa,GAAG,GAAG,GAAG,gBAAgB,CAAC;YAC7C,IAAI,aAAa,GAAG,IAAI,CAAC,MAAM;gBAAE,OAAO,SAAS,CAAC;YAElD,4BAA4B;YAC5B,OAAO,GAAG,GAAG,CAAC,IAAI,aAAa,EAAE,CAAC;gBAChC,4BAA4B;gBAC5B,IAAI,GAAG,GAAG,CAAC,GAAG,aAAa;oBAAE,MAAM;gBAEnC,MAAM,cAAc,GAAG,CAAC,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,IAAI,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;gBACxD,GAAG,IAAI,CAAC,CAAC;gBAET,IAAI,GAAG,GAAG,cAAc,GAAG,aAAa;oBAAE,MAAM;gBAEhD,wCAAwC;gBACxC,uDAAuD;gBACvD,oDAAoD;gBACpD,IAAI,cAAc,GAAG,CAAC,EAAE,CAAC;oBACvB,MAAM,QAAQ,GAAG,IAAI,CAAC,KAAK,CAAC,GAAG,EAAE,GAAG,GAAG,cAAc,CAAC,CAAC;oBAEvD,sBAAsB;oBACtB,GAAG,IAAI,cAAc,CAAC;oBAEtB,uCAAuC;oBACvC,IAAI,GAAG,GAAG,CAAC,IAAI,aAAa,EAAE,CAAC;wBAC7B,GAAG,IAAI,CAAC,CAAC;oBACX,CAAC;yBAAM,CAAC;wBACN,MAAM;oBACR,CAAC;oBAED,qCAAqC;oBACrC,IAAI,CAAC;wBACH,MAAM,WAAW,GAAG,QAAQ,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;wBAC9C,GAAG,CAAC,iBAAiB,WAAW,EAAE,CAAC,CAAC;wBAEpC,gDAAgD;wBAChD,qDAAqD;wBACrD,uCAAuC;wBAEvC,0CAA0C;wBAC1C,MAAM,aAAa,GACjB,4EAA4E,CAAC;wBAC/E,MAAM,WAAW,GAAG,WAAW,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC;wBACrD,IAAI,WAAW,IAAI,WAAW,CAAC,CAAC,CAAC,EAAE,CAAC;4BAClC,GAAG,CAAC,iCAAiC,WAAW,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC;4BACvD,OAAO,WAAW,CAAC,CAAC,CAAC,CAAC;wBACxB,CAAC;wBAED,qEAAqE;wBACrE,mEAAmE;wBACnE,MAAM,KAAK,GAAG,WAAW,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;wBACrC,IAAI,KAAK,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;4BACrB,KAAK,MAAM,IAAI,IAAI,KAAK,EAAE,CAAC;gCACzB,IAAI,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;oCAC9C,MAAM,cAAc,GAAG,IAAI,CAAC,IAAI,EAAE,CAAC;oCACnC,IAAI,gBAAgB,CAAC,IAAI,CAAC,cAAc,CAAC,EAAE,CAAC;wCAC1C,GAAG,CAAC,kDAAkD,cAAc,EAAE,CAAC,CAAC;wCACxE,OAAO,cAAc,CAAC;oCACxB,CAAC;gCACH,CAAC;4BACH,CAAC;wBACH,CAAC;oBACH,CAAC;oBAAC,OAAO,CAAC,EAAE,CAAC;wBACX,GAAG,CAAC,uCAAuC,CAAC,CAAC;oBAC/C,CAAC;gBACH,CAAC;YACH,CAAC;YAED,GAAG,CAAC,oCAAoC,CAAC,CAAC;YAC1C,OAAO,SAAS,CAAC;QACnB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,GAAG,CAAC,sBAAsB,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC;YACpF,OAAO,SAAS,CAAC;QACnB,CAAC;IACH,CAAC;IAED;;;;;;;;;OASG;IACI,MAAM,CAAC,+BAA+B,CAC3C,MAAc,EACd,cAA+B,EAC/B,MAAuB,EACvB,SAAkB;QAElB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,GAAG,EAAE,GAAE,CAAC,CAAC,CAAC;QAEjC,mCAAmC;QACnC,IAAI,MAAM,EAAE,CAAC;YACX,GAAG,CAAC,gBAAgB,MAAM,CAAC,MAAM,QAAQ,CAAC,CAAC;YAC3C,GAAG,CAAC,uBAAuB,MAAM,CAAC,KAAK,CAAC,CAAC,EAAE,IAAI,CAAC,GAAG,CAAC,EAAE,EAAE,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC;YAE3F,IAAI,MAAM,CAAC,MAAM,IAAI,CAAC,EAAE,CAAC;gBACvB,MAAM,UAAU,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;gBAC7B,MAAM,YAAY,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;gBAC/B,MAAM,YAAY,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;gBAC/B,MAAM,YAAY,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;gBAElD,GAAG,CACD,oBAAoB,UAAU,aAAa,YAAY,IAAI,YAAY,YAAY,YAAY,EAAE,CAClG,CAAC;YACJ,CAAC;QACH,CAAC;QAED,gDAAgD;QAChD,IAAI,aAAa,GAAG,MAAM,CAAC;QAC3B,IAAI,cAAc,EAAE,CAAC;YACnB,MAAM,YAAY,GAAG,QAAQ,CAAC,kBAAkB,CAAC,cAAc,CAAC,CAAC;YACjE,MAAM,iBAAiB,GAAG,iBAAiB,CAAC,2BAA2B,CACrE,MAAM,EACN,YAAY,EACZ,MAAM,CACP,CAAC;YAEF,IAAI,CAAC,iBAAiB,EAAE,CAAC;gBACvB,GAAG,CAAC,4CAA4C,YAAY,EAAE,CAAC,CAAC;gBAChE,OAAO,SAAS,CAAC,CAAC,8CAA8C;YAClE,CAAC;YAED,aAAa,GAAG,iBAAiB,CAAC;YAClC,GAAG,CAAC,sCAAsC,aAAa,CAAC,MAAM,EAAE,CAAC,CAAC;QACpE,CAAC;QAED,wCAAwC;QACxC,MAAM,WAAW,GAAG,IAAI,CAAC,UAAU,CAAC,aAAa,EAAE,MAAM,CAAC,CAAC;QAC3D,IAAI,WAAW,EAAE,CAAC;YAChB,GAAG,CAAC,uBAAuB,WAAW,EAAE,CAAC,CAAC;YAC1C,OAAO,WAAW,CAAC;QACrB,CAAC;QAED,kEAAkE;QAClE,IAAI,QAAQ,CAAC,aAAa,CAAC,aAAa,CAAC,EAAE,CAAC;YAC1C,MAAM,cAAc,GAAG,iBAAiB,CAAC,oBAAoB,CAAC,aAAa,EAAE,MAAM,CAAC,CAAC;YAErF,IAAI,cAAc,CAAC,YAAY,EAAE,CAAC;gBAChC,GAAG,CAAC,iEAAiE,CAAC,CAAC;gBAEvE,wCAAwC;gBACxC,MAAM,MAAM,GAAG,IAAI,CAAC,0BAA0B,CAAC,aAAa,EAAE,MAAM,CAAC,CAAC;gBACtE,IAAI,MAAM,EAAE,CAAC;oBACX,GAAG,CAAC,qCAAqC,MAAM,EAAE,CAAC,CAAC;oBACnD,OAAO,MAAM,CAAC;gBAChB,CAAC;YACH,CAAC;QACH,CAAC;QAED,kEAAkE;QAClE,IAAI,SAAS,IAAI,QAAQ,CAAC,oBAAoB,CAAC,MAAM,CAAC,EAAE,CAAC;YACvD,GAAG,CAAC,mDAAmD,SAAS,EAAE,CAAC,CAAC;YACpE,OAAO,SAAS,CAAC;QACnB,CAAC;QAED,OAAO,SAAS,CAAC;IACnB,CAAC;IAED;;;;;;;;;OASG;IACI,MAAM,CAAC,gBAAgB,CAC5B,MAAc,EACd,cAA8B,EAC9B,MAAuB,EACvB,SAAkB;QAElB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,GAAG,EAAE,GAAE,CAAC,CAAC,CAAC;QAEjC,gCAAgC;QAChC,IAAI,CAAC,cAAc,CAAC,SAAS,EAAE,CAAC;YAC9B,cAAc,CAAC,SAAS,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACxC,CAAC;QAED,uDAAuD;QACvD,IAAI,CAAC,QAAQ,CAAC,cAAc,CAAC,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,oBAAoB,CAAC,MAAM,CAAC,EAAE,CAAC;YAC/E,GAAG,CAAC,gDAAgD,CAAC,CAAC;YACtD,OAAO,SAAS,CAAC;QACnB,CAAC;QAED,oCAAoC;QACpC,MAAM,YAAY,GAAG,QAAQ,CAAC,kBAAkB,CAAC,cAAc,CAAC,CAAC;QACjE,GAAG,CAAC,wCAAwC,YAAY,oBAAoB,MAAM,CAAC,MAAM,EAAE,CAAC,CAAC;QAE7F,kEAAkE;QAClE,IAAI,QAAQ,CAAC,oBAAoB,CAAC,MAAM,CAAC,EAAE,CAAC;YAC1C,6CAA6C;YAC7C,IAAI,SAAS,EAAE,CAAC;gBACd,GAAG,CAAC,mDAAmD,SAAS,EAAE,CAAC,CAAC;gBACpE,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,GAAG,CAAC,uEAAuE,CAAC,CAAC;YAC7E,OAAO,SAAS,CAAC;QACnB,CAAC;QAED,wCAAwC;QACxC,IAAI,QAAQ,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;YACnC,MAAM,cAAc,GAAG,iBAAiB,CAAC,oBAAoB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;YAE9E,IAAI,cAAc,CAAC,YAAY,EAAE,CAAC;gBAChC,GAAG,CAAC,2CAA2C,CAAC,CAAC;gBAEjD,2CAA2C;gBAC3C,MAAM,WAAW,GAAG,IAAI,CAAC,UAAU,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;gBACpD,IAAI,WAAW,EAAE,CAAC;oBAChB,GAAG,CAAC,6CAA6C,WAAW,EAAE,CAAC,CAAC;oBAChE,OAAO,WAAW,CAAC;gBACrB,CAAC;gBAED,6CAA6C;gBAC7C,mCAAmC;gBACnC,MAAM,MAAM,GAAG,IAAI,CAAC,0BAA0B,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;gBAC/D,IAAI,MAAM,EAAE,CAAC;oBACX,GAAG,CAAC,qCAAqC,MAAM,EAAE,CAAC,CAAC;oBACnD,OAAO,MAAM,CAAC;gBAChB,CAAC;gBAED,GAAG,CAAC,4CAA4C,CAAC,CAAC;YACpD,CAAC;QACH,CAAC;QAED,0DAA0D;QAC1D,MAAM,GAAG,GAAG,IAAI,CAAC,+BAA+B,CAAC,MAAM,EAAE,cAAc,EAAE,MAAM,CAAC,CAAC;QAEjF,IAAI,GAAG,EAAE,CAAC;YACR,GAAG,CAAC,+BAA+B,GAAG,EAAE,CAAC,CAAC;YAC1C,OAAO,GAAG,CAAC;QACb,CAAC;QAED,sEAAsE;QACtE,IAAI,QAAQ,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;YACnC,GAAG,CAAC,yEAAyE,CAAC,CAAC;QACjF,CAAC;QAED,OAAO,SAAS,CAAC;IACnB,CAAC;CACF"}
@@ -1,4 +0,0 @@
1
- export {};
2
- /**
3
- * TLS utilities
4
- */
@@ -1,5 +0,0 @@
1
- export {};
2
- /**
3
- * TLS utilities
4
- */
5
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi8uLi90cy9wcm90b2NvbHMvdGxzL3V0aWxzL2luZGV4LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7QUFBQTs7R0FFRyJ9
@@ -1,158 +0,0 @@
1
- /**
2
- * TLS record types as defined in various RFCs
3
- */
4
- export declare enum TlsRecordType {
5
- CHANGE_CIPHER_SPEC = 20,
6
- ALERT = 21,
7
- HANDSHAKE = 22,
8
- APPLICATION_DATA = 23,
9
- HEARTBEAT = 24
10
- }
11
- /**
12
- * TLS handshake message types
13
- */
14
- export declare enum TlsHandshakeType {
15
- HELLO_REQUEST = 0,
16
- CLIENT_HELLO = 1,
17
- SERVER_HELLO = 2,
18
- NEW_SESSION_TICKET = 4,
19
- ENCRYPTED_EXTENSIONS = 8,// TLS 1.3
20
- CERTIFICATE = 11,
21
- SERVER_KEY_EXCHANGE = 12,
22
- CERTIFICATE_REQUEST = 13,
23
- SERVER_HELLO_DONE = 14,
24
- CERTIFICATE_VERIFY = 15,
25
- CLIENT_KEY_EXCHANGE = 16,
26
- FINISHED = 20
27
- }
28
- /**
29
- * TLS extension types
30
- */
31
- export declare enum TlsExtensionType {
32
- SERVER_NAME = 0,// SNI
33
- MAX_FRAGMENT_LENGTH = 1,
34
- CLIENT_CERTIFICATE_URL = 2,
35
- TRUSTED_CA_KEYS = 3,
36
- TRUNCATED_HMAC = 4,
37
- STATUS_REQUEST = 5,// OCSP
38
- SUPPORTED_GROUPS = 10,// Previously named "elliptic_curves"
39
- EC_POINT_FORMATS = 11,
40
- SIGNATURE_ALGORITHMS = 13,
41
- APPLICATION_LAYER_PROTOCOL_NEGOTIATION = 16,// ALPN
42
- SIGNED_CERTIFICATE_TIMESTAMP = 18,// Certificate Transparency
43
- PADDING = 21,
44
- SESSION_TICKET = 35,
45
- PRE_SHARED_KEY = 41,// TLS 1.3
46
- EARLY_DATA = 42,// TLS 1.3 0-RTT
47
- SUPPORTED_VERSIONS = 43,// TLS 1.3
48
- COOKIE = 44,// TLS 1.3
49
- PSK_KEY_EXCHANGE_MODES = 45,// TLS 1.3
50
- CERTIFICATE_AUTHORITIES = 47,// TLS 1.3
51
- POST_HANDSHAKE_AUTH = 49,// TLS 1.3
52
- SIGNATURE_ALGORITHMS_CERT = 50,// TLS 1.3
53
- KEY_SHARE = 51
54
- }
55
- /**
56
- * TLS alert levels
57
- */
58
- export declare enum TlsAlertLevel {
59
- WARNING = 1,
60
- FATAL = 2
61
- }
62
- /**
63
- * TLS alert description codes
64
- */
65
- export declare enum TlsAlertDescription {
66
- CLOSE_NOTIFY = 0,
67
- UNEXPECTED_MESSAGE = 10,
68
- BAD_RECORD_MAC = 20,
69
- DECRYPTION_FAILED = 21,// TLS 1.0 only
70
- RECORD_OVERFLOW = 22,
71
- DECOMPRESSION_FAILURE = 30,// TLS 1.2 and below
72
- HANDSHAKE_FAILURE = 40,
73
- NO_CERTIFICATE = 41,// SSLv3 only
74
- BAD_CERTIFICATE = 42,
75
- UNSUPPORTED_CERTIFICATE = 43,
76
- CERTIFICATE_REVOKED = 44,
77
- CERTIFICATE_EXPIRED = 45,
78
- CERTIFICATE_UNKNOWN = 46,
79
- ILLEGAL_PARAMETER = 47,
80
- UNKNOWN_CA = 48,
81
- ACCESS_DENIED = 49,
82
- DECODE_ERROR = 50,
83
- DECRYPT_ERROR = 51,
84
- EXPORT_RESTRICTION = 60,// TLS 1.0 only
85
- PROTOCOL_VERSION = 70,
86
- INSUFFICIENT_SECURITY = 71,
87
- INTERNAL_ERROR = 80,
88
- INAPPROPRIATE_FALLBACK = 86,
89
- USER_CANCELED = 90,
90
- NO_RENEGOTIATION = 100,// TLS 1.2 and below
91
- MISSING_EXTENSION = 109,// TLS 1.3
92
- UNSUPPORTED_EXTENSION = 110,// TLS 1.3
93
- CERTIFICATE_REQUIRED = 111,// TLS 1.3
94
- UNRECOGNIZED_NAME = 112,
95
- BAD_CERTIFICATE_STATUS_RESPONSE = 113,
96
- BAD_CERTIFICATE_HASH_VALUE = 114,// TLS 1.2 and below
97
- UNKNOWN_PSK_IDENTITY = 115,
98
- CERTIFICATE_REQUIRED_1_3 = 116,// TLS 1.3
99
- NO_APPLICATION_PROTOCOL = 120
100
- }
101
- /**
102
- * TLS version codes (major.minor)
103
- */
104
- export declare const TlsVersion: {
105
- SSL3: number[];
106
- TLS1_0: number[];
107
- TLS1_1: number[];
108
- TLS1_2: number[];
109
- TLS1_3: number[];
110
- };
111
- /**
112
- * Utility functions for TLS protocol operations
113
- */
114
- export declare class TlsUtils {
115
- /**
116
- * Checks if a buffer contains a TLS handshake record
117
- * @param buffer The buffer to check
118
- * @returns true if the buffer starts with a TLS handshake record
119
- */
120
- static isTlsHandshake(buffer: Buffer): boolean;
121
- /**
122
- * Checks if a buffer contains TLS application data
123
- * @param buffer The buffer to check
124
- * @returns true if the buffer starts with a TLS application data record
125
- */
126
- static isTlsApplicationData(buffer: Buffer): boolean;
127
- /**
128
- * Checks if a buffer contains a TLS alert record
129
- * @param buffer The buffer to check
130
- * @returns true if the buffer starts with a TLS alert record
131
- */
132
- static isTlsAlert(buffer: Buffer): boolean;
133
- /**
134
- * Checks if a buffer contains a TLS ClientHello message
135
- * @param buffer The buffer to check
136
- * @returns true if the buffer appears to be a ClientHello message
137
- */
138
- static isClientHello(buffer: Buffer): boolean;
139
- /**
140
- * Gets the record length from a TLS record header
141
- * @param buffer Buffer containing a TLS record
142
- * @returns The record length if the buffer is valid, -1 otherwise
143
- */
144
- static getTlsRecordLength(buffer: Buffer): number;
145
- /**
146
- * Creates a connection ID based on source/destination information
147
- * Used to track fragmented ClientHello messages across multiple packets
148
- *
149
- * @param connectionInfo Object containing connection identifiers
150
- * @returns A string ID for the connection
151
- */
152
- static createConnectionId(connectionInfo: {
153
- sourceIp?: string;
154
- sourcePort?: number;
155
- destIp?: string;
156
- destPort?: number;
157
- }): string;
158
- }
@@ -1,187 +0,0 @@
1
- import * as plugins from '../../../plugins.js';
2
- /**
3
- * TLS record types as defined in various RFCs
4
- */
5
- export var TlsRecordType;
6
- (function (TlsRecordType) {
7
- TlsRecordType[TlsRecordType["CHANGE_CIPHER_SPEC"] = 20] = "CHANGE_CIPHER_SPEC";
8
- TlsRecordType[TlsRecordType["ALERT"] = 21] = "ALERT";
9
- TlsRecordType[TlsRecordType["HANDSHAKE"] = 22] = "HANDSHAKE";
10
- TlsRecordType[TlsRecordType["APPLICATION_DATA"] = 23] = "APPLICATION_DATA";
11
- TlsRecordType[TlsRecordType["HEARTBEAT"] = 24] = "HEARTBEAT";
12
- })(TlsRecordType || (TlsRecordType = {}));
13
- /**
14
- * TLS handshake message types
15
- */
16
- export var TlsHandshakeType;
17
- (function (TlsHandshakeType) {
18
- TlsHandshakeType[TlsHandshakeType["HELLO_REQUEST"] = 0] = "HELLO_REQUEST";
19
- TlsHandshakeType[TlsHandshakeType["CLIENT_HELLO"] = 1] = "CLIENT_HELLO";
20
- TlsHandshakeType[TlsHandshakeType["SERVER_HELLO"] = 2] = "SERVER_HELLO";
21
- TlsHandshakeType[TlsHandshakeType["NEW_SESSION_TICKET"] = 4] = "NEW_SESSION_TICKET";
22
- TlsHandshakeType[TlsHandshakeType["ENCRYPTED_EXTENSIONS"] = 8] = "ENCRYPTED_EXTENSIONS";
23
- TlsHandshakeType[TlsHandshakeType["CERTIFICATE"] = 11] = "CERTIFICATE";
24
- TlsHandshakeType[TlsHandshakeType["SERVER_KEY_EXCHANGE"] = 12] = "SERVER_KEY_EXCHANGE";
25
- TlsHandshakeType[TlsHandshakeType["CERTIFICATE_REQUEST"] = 13] = "CERTIFICATE_REQUEST";
26
- TlsHandshakeType[TlsHandshakeType["SERVER_HELLO_DONE"] = 14] = "SERVER_HELLO_DONE";
27
- TlsHandshakeType[TlsHandshakeType["CERTIFICATE_VERIFY"] = 15] = "CERTIFICATE_VERIFY";
28
- TlsHandshakeType[TlsHandshakeType["CLIENT_KEY_EXCHANGE"] = 16] = "CLIENT_KEY_EXCHANGE";
29
- TlsHandshakeType[TlsHandshakeType["FINISHED"] = 20] = "FINISHED";
30
- })(TlsHandshakeType || (TlsHandshakeType = {}));
31
- /**
32
- * TLS extension types
33
- */
34
- export var TlsExtensionType;
35
- (function (TlsExtensionType) {
36
- TlsExtensionType[TlsExtensionType["SERVER_NAME"] = 0] = "SERVER_NAME";
37
- TlsExtensionType[TlsExtensionType["MAX_FRAGMENT_LENGTH"] = 1] = "MAX_FRAGMENT_LENGTH";
38
- TlsExtensionType[TlsExtensionType["CLIENT_CERTIFICATE_URL"] = 2] = "CLIENT_CERTIFICATE_URL";
39
- TlsExtensionType[TlsExtensionType["TRUSTED_CA_KEYS"] = 3] = "TRUSTED_CA_KEYS";
40
- TlsExtensionType[TlsExtensionType["TRUNCATED_HMAC"] = 4] = "TRUNCATED_HMAC";
41
- TlsExtensionType[TlsExtensionType["STATUS_REQUEST"] = 5] = "STATUS_REQUEST";
42
- TlsExtensionType[TlsExtensionType["SUPPORTED_GROUPS"] = 10] = "SUPPORTED_GROUPS";
43
- TlsExtensionType[TlsExtensionType["EC_POINT_FORMATS"] = 11] = "EC_POINT_FORMATS";
44
- TlsExtensionType[TlsExtensionType["SIGNATURE_ALGORITHMS"] = 13] = "SIGNATURE_ALGORITHMS";
45
- TlsExtensionType[TlsExtensionType["APPLICATION_LAYER_PROTOCOL_NEGOTIATION"] = 16] = "APPLICATION_LAYER_PROTOCOL_NEGOTIATION";
46
- TlsExtensionType[TlsExtensionType["SIGNED_CERTIFICATE_TIMESTAMP"] = 18] = "SIGNED_CERTIFICATE_TIMESTAMP";
47
- TlsExtensionType[TlsExtensionType["PADDING"] = 21] = "PADDING";
48
- TlsExtensionType[TlsExtensionType["SESSION_TICKET"] = 35] = "SESSION_TICKET";
49
- TlsExtensionType[TlsExtensionType["PRE_SHARED_KEY"] = 41] = "PRE_SHARED_KEY";
50
- TlsExtensionType[TlsExtensionType["EARLY_DATA"] = 42] = "EARLY_DATA";
51
- TlsExtensionType[TlsExtensionType["SUPPORTED_VERSIONS"] = 43] = "SUPPORTED_VERSIONS";
52
- TlsExtensionType[TlsExtensionType["COOKIE"] = 44] = "COOKIE";
53
- TlsExtensionType[TlsExtensionType["PSK_KEY_EXCHANGE_MODES"] = 45] = "PSK_KEY_EXCHANGE_MODES";
54
- TlsExtensionType[TlsExtensionType["CERTIFICATE_AUTHORITIES"] = 47] = "CERTIFICATE_AUTHORITIES";
55
- TlsExtensionType[TlsExtensionType["POST_HANDSHAKE_AUTH"] = 49] = "POST_HANDSHAKE_AUTH";
56
- TlsExtensionType[TlsExtensionType["SIGNATURE_ALGORITHMS_CERT"] = 50] = "SIGNATURE_ALGORITHMS_CERT";
57
- TlsExtensionType[TlsExtensionType["KEY_SHARE"] = 51] = "KEY_SHARE";
58
- })(TlsExtensionType || (TlsExtensionType = {}));
59
- /**
60
- * TLS alert levels
61
- */
62
- export var TlsAlertLevel;
63
- (function (TlsAlertLevel) {
64
- TlsAlertLevel[TlsAlertLevel["WARNING"] = 1] = "WARNING";
65
- TlsAlertLevel[TlsAlertLevel["FATAL"] = 2] = "FATAL";
66
- })(TlsAlertLevel || (TlsAlertLevel = {}));
67
- /**
68
- * TLS alert description codes
69
- */
70
- export var TlsAlertDescription;
71
- (function (TlsAlertDescription) {
72
- TlsAlertDescription[TlsAlertDescription["CLOSE_NOTIFY"] = 0] = "CLOSE_NOTIFY";
73
- TlsAlertDescription[TlsAlertDescription["UNEXPECTED_MESSAGE"] = 10] = "UNEXPECTED_MESSAGE";
74
- TlsAlertDescription[TlsAlertDescription["BAD_RECORD_MAC"] = 20] = "BAD_RECORD_MAC";
75
- TlsAlertDescription[TlsAlertDescription["DECRYPTION_FAILED"] = 21] = "DECRYPTION_FAILED";
76
- TlsAlertDescription[TlsAlertDescription["RECORD_OVERFLOW"] = 22] = "RECORD_OVERFLOW";
77
- TlsAlertDescription[TlsAlertDescription["DECOMPRESSION_FAILURE"] = 30] = "DECOMPRESSION_FAILURE";
78
- TlsAlertDescription[TlsAlertDescription["HANDSHAKE_FAILURE"] = 40] = "HANDSHAKE_FAILURE";
79
- TlsAlertDescription[TlsAlertDescription["NO_CERTIFICATE"] = 41] = "NO_CERTIFICATE";
80
- TlsAlertDescription[TlsAlertDescription["BAD_CERTIFICATE"] = 42] = "BAD_CERTIFICATE";
81
- TlsAlertDescription[TlsAlertDescription["UNSUPPORTED_CERTIFICATE"] = 43] = "UNSUPPORTED_CERTIFICATE";
82
- TlsAlertDescription[TlsAlertDescription["CERTIFICATE_REVOKED"] = 44] = "CERTIFICATE_REVOKED";
83
- TlsAlertDescription[TlsAlertDescription["CERTIFICATE_EXPIRED"] = 45] = "CERTIFICATE_EXPIRED";
84
- TlsAlertDescription[TlsAlertDescription["CERTIFICATE_UNKNOWN"] = 46] = "CERTIFICATE_UNKNOWN";
85
- TlsAlertDescription[TlsAlertDescription["ILLEGAL_PARAMETER"] = 47] = "ILLEGAL_PARAMETER";
86
- TlsAlertDescription[TlsAlertDescription["UNKNOWN_CA"] = 48] = "UNKNOWN_CA";
87
- TlsAlertDescription[TlsAlertDescription["ACCESS_DENIED"] = 49] = "ACCESS_DENIED";
88
- TlsAlertDescription[TlsAlertDescription["DECODE_ERROR"] = 50] = "DECODE_ERROR";
89
- TlsAlertDescription[TlsAlertDescription["DECRYPT_ERROR"] = 51] = "DECRYPT_ERROR";
90
- TlsAlertDescription[TlsAlertDescription["EXPORT_RESTRICTION"] = 60] = "EXPORT_RESTRICTION";
91
- TlsAlertDescription[TlsAlertDescription["PROTOCOL_VERSION"] = 70] = "PROTOCOL_VERSION";
92
- TlsAlertDescription[TlsAlertDescription["INSUFFICIENT_SECURITY"] = 71] = "INSUFFICIENT_SECURITY";
93
- TlsAlertDescription[TlsAlertDescription["INTERNAL_ERROR"] = 80] = "INTERNAL_ERROR";
94
- TlsAlertDescription[TlsAlertDescription["INAPPROPRIATE_FALLBACK"] = 86] = "INAPPROPRIATE_FALLBACK";
95
- TlsAlertDescription[TlsAlertDescription["USER_CANCELED"] = 90] = "USER_CANCELED";
96
- TlsAlertDescription[TlsAlertDescription["NO_RENEGOTIATION"] = 100] = "NO_RENEGOTIATION";
97
- TlsAlertDescription[TlsAlertDescription["MISSING_EXTENSION"] = 109] = "MISSING_EXTENSION";
98
- TlsAlertDescription[TlsAlertDescription["UNSUPPORTED_EXTENSION"] = 110] = "UNSUPPORTED_EXTENSION";
99
- TlsAlertDescription[TlsAlertDescription["CERTIFICATE_REQUIRED"] = 111] = "CERTIFICATE_REQUIRED";
100
- TlsAlertDescription[TlsAlertDescription["UNRECOGNIZED_NAME"] = 112] = "UNRECOGNIZED_NAME";
101
- TlsAlertDescription[TlsAlertDescription["BAD_CERTIFICATE_STATUS_RESPONSE"] = 113] = "BAD_CERTIFICATE_STATUS_RESPONSE";
102
- TlsAlertDescription[TlsAlertDescription["BAD_CERTIFICATE_HASH_VALUE"] = 114] = "BAD_CERTIFICATE_HASH_VALUE";
103
- TlsAlertDescription[TlsAlertDescription["UNKNOWN_PSK_IDENTITY"] = 115] = "UNKNOWN_PSK_IDENTITY";
104
- TlsAlertDescription[TlsAlertDescription["CERTIFICATE_REQUIRED_1_3"] = 116] = "CERTIFICATE_REQUIRED_1_3";
105
- TlsAlertDescription[TlsAlertDescription["NO_APPLICATION_PROTOCOL"] = 120] = "NO_APPLICATION_PROTOCOL";
106
- })(TlsAlertDescription || (TlsAlertDescription = {}));
107
- /**
108
- * TLS version codes (major.minor)
109
- */
110
- export const TlsVersion = {
111
- SSL3: [0x03, 0x00],
112
- TLS1_0: [0x03, 0x01],
113
- TLS1_1: [0x03, 0x02],
114
- TLS1_2: [0x03, 0x03],
115
- TLS1_3: [0x03, 0x04],
116
- };
117
- /**
118
- * Utility functions for TLS protocol operations
119
- */
120
- export class TlsUtils {
121
- /**
122
- * Checks if a buffer contains a TLS handshake record
123
- * @param buffer The buffer to check
124
- * @returns true if the buffer starts with a TLS handshake record
125
- */
126
- static isTlsHandshake(buffer) {
127
- return buffer.length > 0 && buffer[0] === TlsRecordType.HANDSHAKE;
128
- }
129
- /**
130
- * Checks if a buffer contains TLS application data
131
- * @param buffer The buffer to check
132
- * @returns true if the buffer starts with a TLS application data record
133
- */
134
- static isTlsApplicationData(buffer) {
135
- return buffer.length > 0 && buffer[0] === TlsRecordType.APPLICATION_DATA;
136
- }
137
- /**
138
- * Checks if a buffer contains a TLS alert record
139
- * @param buffer The buffer to check
140
- * @returns true if the buffer starts with a TLS alert record
141
- */
142
- static isTlsAlert(buffer) {
143
- return buffer.length > 0 && buffer[0] === TlsRecordType.ALERT;
144
- }
145
- /**
146
- * Checks if a buffer contains a TLS ClientHello message
147
- * @param buffer The buffer to check
148
- * @returns true if the buffer appears to be a ClientHello message
149
- */
150
- static isClientHello(buffer) {
151
- // Minimum ClientHello size (TLS record header + handshake header)
152
- if (buffer.length < 9) {
153
- return false;
154
- }
155
- // Check record type (must be TLS_HANDSHAKE_RECORD_TYPE)
156
- if (buffer[0] !== TlsRecordType.HANDSHAKE) {
157
- return false;
158
- }
159
- // Skip version and length in TLS record header (5 bytes total)
160
- // Check handshake type at byte 5 (must be CLIENT_HELLO)
161
- return buffer[5] === TlsHandshakeType.CLIENT_HELLO;
162
- }
163
- /**
164
- * Gets the record length from a TLS record header
165
- * @param buffer Buffer containing a TLS record
166
- * @returns The record length if the buffer is valid, -1 otherwise
167
- */
168
- static getTlsRecordLength(buffer) {
169
- if (buffer.length < 5) {
170
- return -1;
171
- }
172
- // Bytes 3-4 contain the record length (big-endian)
173
- return (buffer[3] << 8) + buffer[4];
174
- }
175
- /**
176
- * Creates a connection ID based on source/destination information
177
- * Used to track fragmented ClientHello messages across multiple packets
178
- *
179
- * @param connectionInfo Object containing connection identifiers
180
- * @returns A string ID for the connection
181
- */
182
- static createConnectionId(connectionInfo) {
183
- const { sourceIp, sourcePort, destIp, destPort } = connectionInfo;
184
- return `${sourceIp}:${sourcePort}-${destIp}:${destPort}`;
185
- }
186
- }
187
- //# sourceMappingURL=data:application/json;base64,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