@push.rocks/smartproxy 3.37.0 → 3.37.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,45 @@
1
+ import { Buffer } from 'buffer';
2
+ /**
3
+ * SNI (Server Name Indication) handler for TLS connections.
4
+ * Provides robust extraction of SNI values from TLS ClientHello messages.
5
+ */
6
+ export declare class SniHandler {
7
+ private static readonly TLS_HANDSHAKE_RECORD_TYPE;
8
+ private static readonly TLS_CLIENT_HELLO_HANDSHAKE_TYPE;
9
+ private static readonly TLS_SNI_EXTENSION_TYPE;
10
+ private static readonly TLS_SESSION_TICKET_EXTENSION_TYPE;
11
+ private static readonly TLS_SNI_HOST_NAME_TYPE;
12
+ /**
13
+ * Checks if a buffer contains a TLS handshake message (record type 22)
14
+ * @param buffer - The buffer to check
15
+ * @returns true if the buffer starts with a TLS handshake record type
16
+ */
17
+ static isTlsHandshake(buffer: Buffer): boolean;
18
+ /**
19
+ * Checks if a buffer contains a TLS ClientHello message
20
+ * @param buffer - The buffer to check
21
+ * @returns true if the buffer appears to be a ClientHello message
22
+ */
23
+ static isClientHello(buffer: Buffer): boolean;
24
+ /**
25
+ * Extracts the SNI (Server Name Indication) from a TLS ClientHello message.
26
+ * Implements robust parsing with support for session resumption edge cases.
27
+ *
28
+ * @param buffer - The buffer containing the TLS ClientHello message
29
+ * @param enableLogging - Whether to enable detailed debug logging
30
+ * @returns The extracted server name or undefined if not found
31
+ */
32
+ static extractSNI(buffer: Buffer, enableLogging?: boolean): string | undefined;
33
+ /**
34
+ * Attempts to extract SNI from an initial ClientHello packet and handles
35
+ * session resumption edge cases more robustly than the standard extraction.
36
+ *
37
+ * This method is specifically designed for Chrome and other browsers that
38
+ * may send different ClientHello formats during session resumption.
39
+ *
40
+ * @param buffer - The buffer containing the TLS ClientHello message
41
+ * @param enableLogging - Whether to enable detailed debug logging
42
+ * @returns The extracted server name or undefined if not found
43
+ */
44
+ static extractSNIWithResumptionSupport(buffer: Buffer, enableLogging?: boolean): string | undefined;
45
+ }
@@ -0,0 +1,274 @@
1
+ import { Buffer } from 'buffer';
2
+ /**
3
+ * SNI (Server Name Indication) handler for TLS connections.
4
+ * Provides robust extraction of SNI values from TLS ClientHello messages.
5
+ */
6
+ export class SniHandler {
7
+ // TLS record types and constants
8
+ static { this.TLS_HANDSHAKE_RECORD_TYPE = 22; }
9
+ static { this.TLS_CLIENT_HELLO_HANDSHAKE_TYPE = 1; }
10
+ static { this.TLS_SNI_EXTENSION_TYPE = 0x0000; }
11
+ static { this.TLS_SESSION_TICKET_EXTENSION_TYPE = 0x0023; }
12
+ static { this.TLS_SNI_HOST_NAME_TYPE = 0; }
13
+ /**
14
+ * Checks if a buffer contains a TLS handshake message (record type 22)
15
+ * @param buffer - The buffer to check
16
+ * @returns true if the buffer starts with a TLS handshake record type
17
+ */
18
+ static isTlsHandshake(buffer) {
19
+ return buffer.length > 0 && buffer[0] === this.TLS_HANDSHAKE_RECORD_TYPE;
20
+ }
21
+ /**
22
+ * Checks if a buffer contains a TLS ClientHello message
23
+ * @param buffer - The buffer to check
24
+ * @returns true if the buffer appears to be a ClientHello message
25
+ */
26
+ static isClientHello(buffer) {
27
+ // Minimum ClientHello size (TLS record header + handshake header)
28
+ if (buffer.length < 9) {
29
+ return false;
30
+ }
31
+ // Check record type (must be TLS_HANDSHAKE_RECORD_TYPE)
32
+ if (buffer[0] !== this.TLS_HANDSHAKE_RECORD_TYPE) {
33
+ return false;
34
+ }
35
+ // Skip version and length in TLS record header (5 bytes total)
36
+ // Check handshake type at byte 5 (must be CLIENT_HELLO)
37
+ return buffer[5] === this.TLS_CLIENT_HELLO_HANDSHAKE_TYPE;
38
+ }
39
+ /**
40
+ * Extracts the SNI (Server Name Indication) from a TLS ClientHello message.
41
+ * Implements robust parsing with support for session resumption edge cases.
42
+ *
43
+ * @param buffer - The buffer containing the TLS ClientHello message
44
+ * @param enableLogging - Whether to enable detailed debug logging
45
+ * @returns The extracted server name or undefined if not found
46
+ */
47
+ static extractSNI(buffer, enableLogging = false) {
48
+ // Logging helper
49
+ const log = (message) => {
50
+ if (enableLogging) {
51
+ console.log(`[SNI Extraction] ${message}`);
52
+ }
53
+ };
54
+ try {
55
+ // Buffer must be at least 5 bytes (TLS record header)
56
+ if (buffer.length < 5) {
57
+ log('Buffer too small for TLS record header');
58
+ return undefined;
59
+ }
60
+ // Check record type (must be TLS_HANDSHAKE_RECORD_TYPE = 22)
61
+ if (buffer[0] !== this.TLS_HANDSHAKE_RECORD_TYPE) {
62
+ log(`Not a TLS handshake record: ${buffer[0]}`);
63
+ return undefined;
64
+ }
65
+ // Check TLS version
66
+ const majorVersion = buffer[1];
67
+ const minorVersion = buffer[2];
68
+ log(`TLS version: ${majorVersion}.${minorVersion}`);
69
+ // Parse record length (bytes 3-4, big-endian)
70
+ const recordLength = (buffer[3] << 8) + buffer[4];
71
+ log(`Record length: ${recordLength}`);
72
+ // Validate record length against buffer size
73
+ if (buffer.length < recordLength + 5) {
74
+ log('Buffer smaller than expected record length');
75
+ return undefined;
76
+ }
77
+ // Start of handshake message in the buffer
78
+ let pos = 5;
79
+ // Check handshake type (must be CLIENT_HELLO = 1)
80
+ if (buffer[pos] !== this.TLS_CLIENT_HELLO_HANDSHAKE_TYPE) {
81
+ log(`Not a ClientHello message: ${buffer[pos]}`);
82
+ return undefined;
83
+ }
84
+ // Skip handshake type (1 byte)
85
+ pos += 1;
86
+ // Parse handshake length (3 bytes, big-endian)
87
+ const handshakeLength = (buffer[pos] << 16) + (buffer[pos + 1] << 8) + buffer[pos + 2];
88
+ log(`Handshake length: ${handshakeLength}`);
89
+ // Skip handshake length (3 bytes)
90
+ pos += 3;
91
+ // Check client version (2 bytes)
92
+ const clientMajorVersion = buffer[pos];
93
+ const clientMinorVersion = buffer[pos + 1];
94
+ log(`Client version: ${clientMajorVersion}.${clientMinorVersion}`);
95
+ // Skip client version (2 bytes)
96
+ pos += 2;
97
+ // Skip client random (32 bytes)
98
+ pos += 32;
99
+ // Parse session ID
100
+ if (pos + 1 > buffer.length) {
101
+ log('Buffer too small for session ID length');
102
+ return undefined;
103
+ }
104
+ const sessionIdLength = buffer[pos];
105
+ log(`Session ID length: ${sessionIdLength}`);
106
+ // Skip session ID length (1 byte) and session ID
107
+ pos += 1 + sessionIdLength;
108
+ // Check if we have enough bytes left
109
+ if (pos + 2 > buffer.length) {
110
+ log('Buffer too small for cipher suites length');
111
+ return undefined;
112
+ }
113
+ // Parse cipher suites length (2 bytes, big-endian)
114
+ const cipherSuitesLength = (buffer[pos] << 8) + buffer[pos + 1];
115
+ log(`Cipher suites length: ${cipherSuitesLength}`);
116
+ // Skip cipher suites length (2 bytes) and cipher suites
117
+ pos += 2 + cipherSuitesLength;
118
+ // Check if we have enough bytes left
119
+ if (pos + 1 > buffer.length) {
120
+ log('Buffer too small for compression methods length');
121
+ return undefined;
122
+ }
123
+ // Parse compression methods length (1 byte)
124
+ const compressionMethodsLength = buffer[pos];
125
+ log(`Compression methods length: ${compressionMethodsLength}`);
126
+ // Skip compression methods length (1 byte) and compression methods
127
+ pos += 1 + compressionMethodsLength;
128
+ // Check if we have enough bytes for extensions length
129
+ if (pos + 2 > buffer.length) {
130
+ log('No extensions present or buffer too small');
131
+ return undefined;
132
+ }
133
+ // Parse extensions length (2 bytes, big-endian)
134
+ const extensionsLength = (buffer[pos] << 8) + buffer[pos + 1];
135
+ log(`Extensions length: ${extensionsLength}`);
136
+ // Skip extensions length (2 bytes)
137
+ pos += 2;
138
+ // Extensions end position
139
+ const extensionsEnd = pos + extensionsLength;
140
+ // Check if extensions length is valid
141
+ if (extensionsEnd > buffer.length) {
142
+ log('Extensions length exceeds buffer size');
143
+ return undefined;
144
+ }
145
+ // Track if we found session tickets (for improved resumption handling)
146
+ let hasSessionTicket = false;
147
+ // Iterate through extensions
148
+ while (pos + 4 <= extensionsEnd) {
149
+ // Parse extension type (2 bytes, big-endian)
150
+ const extensionType = (buffer[pos] << 8) + buffer[pos + 1];
151
+ log(`Extension type: 0x${extensionType.toString(16).padStart(4, '0')}`);
152
+ // Skip extension type (2 bytes)
153
+ pos += 2;
154
+ // Parse extension length (2 bytes, big-endian)
155
+ const extensionLength = (buffer[pos] << 8) + buffer[pos + 1];
156
+ log(`Extension length: ${extensionLength}`);
157
+ // Skip extension length (2 bytes)
158
+ pos += 2;
159
+ // Check if this is the SNI extension
160
+ if (extensionType === this.TLS_SNI_EXTENSION_TYPE) {
161
+ log('Found SNI extension');
162
+ // Ensure we have enough bytes for the server name list
163
+ if (pos + 2 > extensionsEnd) {
164
+ log('Extension too small for server name list length');
165
+ pos += extensionLength; // Skip this extension
166
+ continue;
167
+ }
168
+ // Parse server name list length (2 bytes, big-endian)
169
+ const serverNameListLength = (buffer[pos] << 8) + buffer[pos + 1];
170
+ log(`Server name list length: ${serverNameListLength}`);
171
+ // Skip server name list length (2 bytes)
172
+ pos += 2;
173
+ // Ensure server name list length is valid
174
+ if (pos + serverNameListLength > extensionsEnd) {
175
+ log('Server name list length exceeds extension size');
176
+ break; // Exit the loop, extension parsing is broken
177
+ }
178
+ // End position of server name list
179
+ const serverNameListEnd = pos + serverNameListLength;
180
+ // Iterate through server names
181
+ while (pos + 3 <= serverNameListEnd) {
182
+ // Check name type (must be HOST_NAME_TYPE = 0 for hostname)
183
+ const nameType = buffer[pos];
184
+ log(`Name type: ${nameType}`);
185
+ if (nameType !== this.TLS_SNI_HOST_NAME_TYPE) {
186
+ log(`Unsupported name type: ${nameType}`);
187
+ pos += 1; // Skip name type (1 byte)
188
+ // Skip name length (2 bytes) and name data
189
+ if (pos + 2 <= serverNameListEnd) {
190
+ const nameLength = (buffer[pos] << 8) + buffer[pos + 1];
191
+ pos += 2 + nameLength;
192
+ }
193
+ else {
194
+ log('Invalid server name entry');
195
+ break;
196
+ }
197
+ continue;
198
+ }
199
+ // Skip name type (1 byte)
200
+ pos += 1;
201
+ // Ensure we have enough bytes for name length
202
+ if (pos + 2 > serverNameListEnd) {
203
+ log('Server name entry too small for name length');
204
+ break;
205
+ }
206
+ // Parse name length (2 bytes, big-endian)
207
+ const nameLength = (buffer[pos] << 8) + buffer[pos + 1];
208
+ log(`Name length: ${nameLength}`);
209
+ // Skip name length (2 bytes)
210
+ pos += 2;
211
+ // Ensure we have enough bytes for the name
212
+ if (pos + nameLength > serverNameListEnd) {
213
+ log('Name length exceeds server name list size');
214
+ break;
215
+ }
216
+ // Extract server name (hostname)
217
+ const serverName = buffer.slice(pos, pos + nameLength).toString('utf8');
218
+ log(`Extracted server name: ${serverName}`);
219
+ return serverName;
220
+ }
221
+ }
222
+ else if (extensionType === this.TLS_SESSION_TICKET_EXTENSION_TYPE) {
223
+ // If we encounter a session ticket extension, mark it for later
224
+ log('Found session ticket extension');
225
+ hasSessionTicket = true;
226
+ pos += extensionLength; // Skip this extension
227
+ }
228
+ else {
229
+ // Skip this extension
230
+ pos += extensionLength;
231
+ }
232
+ }
233
+ // Log if we found a session ticket but no SNI
234
+ if (hasSessionTicket) {
235
+ log('Session ticket present but no SNI found - possible resumption scenario');
236
+ }
237
+ log('No SNI extension found in ClientHello');
238
+ return undefined;
239
+ }
240
+ catch (error) {
241
+ log(`Error parsing SNI: ${error instanceof Error ? error.message : String(error)}`);
242
+ return undefined;
243
+ }
244
+ }
245
+ /**
246
+ * Attempts to extract SNI from an initial ClientHello packet and handles
247
+ * session resumption edge cases more robustly than the standard extraction.
248
+ *
249
+ * This method is specifically designed for Chrome and other browsers that
250
+ * may send different ClientHello formats during session resumption.
251
+ *
252
+ * @param buffer - The buffer containing the TLS ClientHello message
253
+ * @param enableLogging - Whether to enable detailed debug logging
254
+ * @returns The extracted server name or undefined if not found
255
+ */
256
+ static extractSNIWithResumptionSupport(buffer, enableLogging = false) {
257
+ // First try the standard SNI extraction
258
+ const standardSni = this.extractSNI(buffer, enableLogging);
259
+ if (standardSni) {
260
+ return standardSni;
261
+ }
262
+ // If standard extraction failed and we have a valid ClientHello,
263
+ // this might be a session resumption with non-standard format
264
+ if (this.isClientHello(buffer)) {
265
+ if (enableLogging) {
266
+ console.log('[SNI Extraction] Detected ClientHello without standard SNI, possible session resumption');
267
+ }
268
+ // Additional handling could be implemented here for specific browser behaviors
269
+ // For now, this is a placeholder for future improvements
270
+ }
271
+ return undefined;
272
+ }
273
+ }
274
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.snihandler.js","sourceRoot":"","sources":["../ts/classes.snihandler.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,QAAQ,CAAC;AAEhC;;;GAGG;AACH,MAAM,OAAO,UAAU;IACrB,iCAAiC;aACT,8BAAyB,GAAG,EAAE,CAAC;aAC/B,oCAA+B,GAAG,CAAC,CAAC;aACpC,2BAAsB,GAAG,MAAM,CAAC;aAChC,sCAAiC,GAAG,MAAM,CAAC;aAC3C,2BAAsB,GAAG,CAAC,CAAC;IAEnD;;;;OAIG;IACI,MAAM,CAAC,cAAc,CAAC,MAAc;QACzC,OAAO,MAAM,CAAC,MAAM,GAAG,CAAC,IAAI,MAAM,CAAC,CAAC,CAAC,KAAK,IAAI,CAAC,yBAAyB,CAAC;IAC3E,CAAC;IAED;;;;OAIG;IACI,MAAM,CAAC,aAAa,CAAC,MAAc;QACxC,kEAAkE;QAClE,IAAI,MAAM,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACtB,OAAO,KAAK,CAAC;QACf,CAAC;QAED,wDAAwD;QACxD,IAAI,MAAM,CAAC,CAAC,CAAC,KAAK,IAAI,CAAC,yBAAyB,EAAE,CAAC;YACjD,OAAO,KAAK,CAAC;QACf,CAAC;QAED,+DAA+D;QAC/D,wDAAwD;QACxD,OAAO,MAAM,CAAC,CAAC,CAAC,KAAK,IAAI,CAAC,+BAA+B,CAAC;IAC5D,CAAC;IAED;;;;;;;OAOG;IACI,MAAM,CAAC,UAAU,CAAC,MAAc,EAAE,gBAAyB,KAAK;QACrE,iBAAiB;QACjB,MAAM,GAAG,GAAG,CAAC,OAAe,EAAE,EAAE;YAC9B,IAAI,aAAa,EAAE,CAAC;gBAClB,OAAO,CAAC,GAAG,CAAC,oBAAoB,OAAO,EAAE,CAAC,CAAC;YAC7C,CAAC;QACH,CAAC,CAAC;QAEF,IAAI,CAAC;YACH,sDAAsD;YACtD,IAAI,MAAM,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBACtB,GAAG,CAAC,wCAAwC,CAAC,CAAC;gBAC9C,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,6DAA6D;YAC7D,IAAI,MAAM,CAAC,CAAC,CAAC,KAAK,IAAI,CAAC,yBAAyB,EAAE,CAAC;gBACjD,GAAG,CAAC,+BAA+B,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC;gBAChD,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,oBAAoB;YACpB,MAAM,YAAY,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;YAC/B,MAAM,YAAY,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;YAC/B,GAAG,CAAC,gBAAgB,YAAY,IAAI,YAAY,EAAE,CAAC,CAAC;YAEpD,8CAA8C;YAC9C,MAAM,YAAY,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;YAClD,GAAG,CAAC,kBAAkB,YAAY,EAAE,CAAC,CAAC;YAEtC,6CAA6C;YAC7C,IAAI,MAAM,CAAC,MAAM,GAAG,YAAY,GAAG,CAAC,EAAE,CAAC;gBACrC,GAAG,CAAC,4CAA4C,CAAC,CAAC;gBAClD,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,2CAA2C;YAC3C,IAAI,GAAG,GAAG,CAAC,CAAC;YAEZ,kDAAkD;YAClD,IAAI,MAAM,CAAC,GAAG,CAAC,KAAK,IAAI,CAAC,+BAA+B,EAAE,CAAC;gBACzD,GAAG,CAAC,8BAA8B,MAAM,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;gBACjD,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,+BAA+B;YAC/B,GAAG,IAAI,CAAC,CAAC;YAET,+CAA+C;YAC/C,MAAM,eAAe,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,EAAE,CAAC,GAAG,CAAC,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;YACvF,GAAG,CAAC,qBAAqB,eAAe,EAAE,CAAC,CAAC;YAE5C,kCAAkC;YAClC,GAAG,IAAI,CAAC,CAAC;YAET,iCAAiC;YACjC,MAAM,kBAAkB,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;YACvC,MAAM,kBAAkB,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;YAC3C,GAAG,CAAC,mBAAmB,kBAAkB,IAAI,kBAAkB,EAAE,CAAC,CAAC;YAEnE,gCAAgC;YAChC,GAAG,IAAI,CAAC,CAAC;YAET,gCAAgC;YAChC,GAAG,IAAI,EAAE,CAAC;YAEV,mBAAmB;YACnB,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAC5B,GAAG,CAAC,wCAAwC,CAAC,CAAC;gBAC9C,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,MAAM,eAAe,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;YACpC,GAAG,CAAC,sBAAsB,eAAe,EAAE,CAAC,CAAC;YAE7C,iDAAiD;YACjD,GAAG,IAAI,CAAC,GAAG,eAAe,CAAC;YAE3B,qCAAqC;YACrC,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAC5B,GAAG,CAAC,2CAA2C,CAAC,CAAC;gBACjD,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,mDAAmD;YACnD,MAAM,kBAAkB,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;YAChE,GAAG,CAAC,yBAAyB,kBAAkB,EAAE,CAAC,CAAC;YAEnD,wDAAwD;YACxD,GAAG,IAAI,CAAC,GAAG,kBAAkB,CAAC;YAE9B,qCAAqC;YACrC,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAC5B,GAAG,CAAC,iDAAiD,CAAC,CAAC;gBACvD,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,4CAA4C;YAC5C,MAAM,wBAAwB,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;YAC7C,GAAG,CAAC,+BAA+B,wBAAwB,EAAE,CAAC,CAAC;YAE/D,mEAAmE;YACnE,GAAG,IAAI,CAAC,GAAG,wBAAwB,CAAC;YAEpC,sDAAsD;YACtD,IAAI,GAAG,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAC5B,GAAG,CAAC,2CAA2C,CAAC,CAAC;gBACjD,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,gDAAgD;YAChD,MAAM,gBAAgB,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;YAC9D,GAAG,CAAC,sBAAsB,gBAAgB,EAAE,CAAC,CAAC;YAE9C,mCAAmC;YACnC,GAAG,IAAI,CAAC,CAAC;YAET,0BAA0B;YAC1B,MAAM,aAAa,GAAG,GAAG,GAAG,gBAAgB,CAAC;YAE7C,sCAAsC;YACtC,IAAI,aAAa,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC;gBAClC,GAAG,CAAC,uCAAuC,CAAC,CAAC;gBAC7C,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,uEAAuE;YACvE,IAAI,gBAAgB,GAAG,KAAK,CAAC;YAE7B,6BAA6B;YAC7B,OAAO,GAAG,GAAG,CAAC,IAAI,aAAa,EAAE,CAAC;gBAChC,6CAA6C;gBAC7C,MAAM,aAAa,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;gBAC3D,GAAG,CAAC,qBAAqB,aAAa,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,QAAQ,CAAC,CAAC,EAAE,GAAG,CAAC,EAAE,CAAC,CAAC;gBAExE,gCAAgC;gBAChC,GAAG,IAAI,CAAC,CAAC;gBAET,+CAA+C;gBAC/C,MAAM,eAAe,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;gBAC7D,GAAG,CAAC,qBAAqB,eAAe,EAAE,CAAC,CAAC;gBAE5C,kCAAkC;gBAClC,GAAG,IAAI,CAAC,CAAC;gBAET,qCAAqC;gBACrC,IAAI,aAAa,KAAK,IAAI,CAAC,sBAAsB,EAAE,CAAC;oBAClD,GAAG,CAAC,qBAAqB,CAAC,CAAC;oBAE3B,uDAAuD;oBACvD,IAAI,GAAG,GAAG,CAAC,GAAG,aAAa,EAAE,CAAC;wBAC5B,GAAG,CAAC,iDAAiD,CAAC,CAAC;wBACvD,GAAG,IAAI,eAAe,CAAC,CAAC,sBAAsB;wBAC9C,SAAS;oBACX,CAAC;oBAED,sDAAsD;oBACtD,MAAM,oBAAoB,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;oBAClE,GAAG,CAAC,4BAA4B,oBAAoB,EAAE,CAAC,CAAC;oBAExD,yCAAyC;oBACzC,GAAG,IAAI,CAAC,CAAC;oBAET,0CAA0C;oBAC1C,IAAI,GAAG,GAAG,oBAAoB,GAAG,aAAa,EAAE,CAAC;wBAC/C,GAAG,CAAC,gDAAgD,CAAC,CAAC;wBACtD,MAAM,CAAC,6CAA6C;oBACtD,CAAC;oBAED,mCAAmC;oBACnC,MAAM,iBAAiB,GAAG,GAAG,GAAG,oBAAoB,CAAC;oBAErD,+BAA+B;oBAC/B,OAAO,GAAG,GAAG,CAAC,IAAI,iBAAiB,EAAE,CAAC;wBACpC,4DAA4D;wBAC5D,MAAM,QAAQ,GAAG,MAAM,CAAC,GAAG,CAAC,CAAC;wBAC7B,GAAG,CAAC,cAAc,QAAQ,EAAE,CAAC,CAAC;wBAE9B,IAAI,QAAQ,KAAK,IAAI,CAAC,sBAAsB,EAAE,CAAC;4BAC7C,GAAG,CAAC,0BAA0B,QAAQ,EAAE,CAAC,CAAC;4BAC1C,GAAG,IAAI,CAAC,CAAC,CAAC,0BAA0B;4BAEpC,2CAA2C;4BAC3C,IAAI,GAAG,GAAG,CAAC,IAAI,iBAAiB,EAAE,CAAC;gCACjC,MAAM,UAAU,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;gCACxD,GAAG,IAAI,CAAC,GAAG,UAAU,CAAC;4BACxB,CAAC;iCAAM,CAAC;gCACN,GAAG,CAAC,2BAA2B,CAAC,CAAC;gCACjC,MAAM;4BACR,CAAC;4BACD,SAAS;wBACX,CAAC;wBAED,0BAA0B;wBAC1B,GAAG,IAAI,CAAC,CAAC;wBAET,8CAA8C;wBAC9C,IAAI,GAAG,GAAG,CAAC,GAAG,iBAAiB,EAAE,CAAC;4BAChC,GAAG,CAAC,6CAA6C,CAAC,CAAC;4BACnD,MAAM;wBACR,CAAC;wBAED,0CAA0C;wBAC1C,MAAM,UAAU,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;wBACxD,GAAG,CAAC,gBAAgB,UAAU,EAAE,CAAC,CAAC;wBAElC,6BAA6B;wBAC7B,GAAG,IAAI,CAAC,CAAC;wBAET,2CAA2C;wBAC3C,IAAI,GAAG,GAAG,UAAU,GAAG,iBAAiB,EAAE,CAAC;4BACzC,GAAG,CAAC,2CAA2C,CAAC,CAAC;4BACjD,MAAM;wBACR,CAAC;wBAED,iCAAiC;wBACjC,MAAM,UAAU,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,EAAE,GAAG,GAAG,UAAU,CAAC,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;wBACxE,GAAG,CAAC,0BAA0B,UAAU,EAAE,CAAC,CAAC;wBAC5C,OAAO,UAAU,CAAC;oBACpB,CAAC;gBACH,CAAC;qBAAM,IAAI,aAAa,KAAK,IAAI,CAAC,iCAAiC,EAAE,CAAC;oBACpE,gEAAgE;oBAChE,GAAG,CAAC,gCAAgC,CAAC,CAAC;oBACtC,gBAAgB,GAAG,IAAI,CAAC;oBACxB,GAAG,IAAI,eAAe,CAAC,CAAC,sBAAsB;gBAChD,CAAC;qBAAM,CAAC;oBACN,sBAAsB;oBACtB,GAAG,IAAI,eAAe,CAAC;gBACzB,CAAC;YACH,CAAC;YAED,8CAA8C;YAC9C,IAAI,gBAAgB,EAAE,CAAC;gBACrB,GAAG,CAAC,wEAAwE,CAAC,CAAC;YAChF,CAAC;YAED,GAAG,CAAC,uCAAuC,CAAC,CAAC;YAC7C,OAAO,SAAS,CAAC;QACnB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,GAAG,CAAC,sBAAsB,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC;YACpF,OAAO,SAAS,CAAC;QACnB,CAAC;IACH,CAAC;IAED;;;;;;;;;;OAUG;IACI,MAAM,CAAC,+BAA+B,CAC3C,MAAc,EACd,gBAAyB,KAAK;QAE9B,wCAAwC;QACxC,MAAM,WAAW,GAAG,IAAI,CAAC,UAAU,CAAC,MAAM,EAAE,aAAa,CAAC,CAAC;QAC3D,IAAI,WAAW,EAAE,CAAC;YAChB,OAAO,WAAW,CAAC;QACrB,CAAC;QAED,iEAAiE;QACjE,8DAA8D;QAC9D,IAAI,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;YAC/B,IAAI,aAAa,EAAE,CAAC;gBAClB,OAAO,CAAC,GAAG,CAAC,yFAAyF,CAAC,CAAC;YACzG,CAAC;YAED,+EAA+E;YAC/E,yDAAyD;QAC3D,CAAC;QAED,OAAO,SAAS,CAAC;IACnB,CAAC"}
@@ -3,3 +3,4 @@ export * from './classes.networkproxy.js';
3
3
  export * from './classes.portproxy.js';
4
4
  export * from './classes.port80handler.js';
5
5
  export * from './classes.sslredirect.js';
6
+ export * from './classes.snihandler.js';
package/dist_ts/index.js CHANGED
@@ -3,4 +3,5 @@ export * from './classes.networkproxy.js';
3
3
  export * from './classes.portproxy.js';
4
4
  export * from './classes.port80handler.js';
5
5
  export * from './classes.sslredirect.js';
6
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi90cy9pbmRleC50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiQUFBQSxjQUFjLDRCQUE0QixDQUFDO0FBQzNDLGNBQWMsMkJBQTJCLENBQUM7QUFDMUMsY0FBYyx3QkFBd0IsQ0FBQztBQUN2QyxjQUFjLDRCQUE0QixDQUFDO0FBQzNDLGNBQWMsMEJBQTBCLENBQUMifQ==
6
+ export * from './classes.snihandler.js';
7
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi90cy9pbmRleC50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiQUFBQSxjQUFjLDRCQUE0QixDQUFDO0FBQzNDLGNBQWMsMkJBQTJCLENBQUM7QUFDMUMsY0FBYyx3QkFBd0IsQ0FBQztBQUN2QyxjQUFjLDRCQUE0QixDQUFDO0FBQzNDLGNBQWMsMEJBQTBCLENBQUM7QUFDekMsY0FBYyx5QkFBeUIsQ0FBQyJ9
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@push.rocks/smartproxy",
3
- "version": "3.37.0",
3
+ "version": "3.37.1",
4
4
  "private": false,
5
5
  "description": "A powerful proxy package that effectively handles high traffic, with features such as SSL/TLS support, port proxying, WebSocket handling, dynamic routing with authentication options, and automatic ACME certificate management.",
6
6
  "main": "dist_ts/index.js",
@@ -3,6 +3,6 @@
3
3
  */
4
4
  export const commitinfo = {
5
5
  name: '@push.rocks/smartproxy',
6
- version: '3.37.0',
6
+ version: '3.37.1',
7
7
  description: 'A powerful proxy package that effectively handles high traffic, with features such as SSL/TLS support, port proxying, WebSocket handling, dynamic routing with authentication options, and automatic ACME certificate management.'
8
8
  }
@@ -1,5 +1,6 @@
1
1
  import * as plugins from './plugins.js';
2
2
  import { NetworkProxy } from './classes.networkproxy.js';
3
+ import { SniHandler } from './classes.snihandler.js';
3
4
 
4
5
  /** Domain configuration with per-domain allowed port ranges */
5
6
  export interface IDomainConfig {
@@ -117,192 +118,8 @@ interface IConnectionRecord {
117
118
  domainSwitches?: number; // Number of times the domain has been switched on this connection
118
119
  }
119
120
 
120
- /**
121
- * Extracts the SNI (Server Name Indication) from a TLS ClientHello packet.
122
- * Enhanced for robustness and detailed logging.
123
- * @param buffer - Buffer containing the TLS ClientHello.
124
- * @param enableLogging - Whether to enable detailed logging.
125
- * @returns The server name if found, otherwise undefined.
126
- */
127
- function extractSNI(buffer: Buffer, enableLogging: boolean = false): string | undefined {
128
- try {
129
- // Check if buffer is too small for TLS
130
- if (buffer.length < 5) {
131
- if (enableLogging) console.log('Buffer too small for TLS header');
132
- return undefined;
133
- }
134
-
135
- // Check record type (has to be handshake - 22)
136
- const recordType = buffer.readUInt8(0);
137
- if (recordType !== 22) {
138
- if (enableLogging) console.log(`Not a TLS handshake. Record type: ${recordType}`);
139
- return undefined;
140
- }
141
-
142
- // Check TLS version (has to be 3.1 or higher)
143
- const majorVersion = buffer.readUInt8(1);
144
- const minorVersion = buffer.readUInt8(2);
145
- if (enableLogging) console.log(`TLS Version: ${majorVersion}.${minorVersion}`);
146
-
147
- // Check record length
148
- const recordLength = buffer.readUInt16BE(3);
149
- if (buffer.length < 5 + recordLength) {
150
- if (enableLogging)
151
- console.log(
152
- `Buffer too small for TLS record. Expected: ${5 + recordLength}, Got: ${buffer.length}`
153
- );
154
- return undefined;
155
- }
156
-
157
- let offset = 5;
158
- const handshakeType = buffer.readUInt8(offset);
159
- if (handshakeType !== 1) {
160
- if (enableLogging) console.log(`Not a ClientHello. Handshake type: ${handshakeType}`);
161
- return undefined;
162
- }
163
-
164
- offset += 4; // Skip handshake header (type + length)
165
-
166
- // Client version
167
- const clientMajorVersion = buffer.readUInt8(offset);
168
- const clientMinorVersion = buffer.readUInt8(offset + 1);
169
- if (enableLogging) console.log(`Client Version: ${clientMajorVersion}.${clientMinorVersion}`);
170
-
171
- offset += 2 + 32; // Skip client version and random
172
-
173
- // Session ID
174
- const sessionIDLength = buffer.readUInt8(offset);
175
- if (enableLogging) console.log(`Session ID Length: ${sessionIDLength}`);
176
- offset += 1 + sessionIDLength; // Skip session ID
177
-
178
- // Cipher suites
179
- if (offset + 2 > buffer.length) {
180
- if (enableLogging) console.log('Buffer too small for cipher suites length');
181
- return undefined;
182
- }
183
- const cipherSuitesLength = buffer.readUInt16BE(offset);
184
- if (enableLogging) console.log(`Cipher Suites Length: ${cipherSuitesLength}`);
185
- offset += 2 + cipherSuitesLength; // Skip cipher suites
186
-
187
- // Compression methods
188
- if (offset + 1 > buffer.length) {
189
- if (enableLogging) console.log('Buffer too small for compression methods length');
190
- return undefined;
191
- }
192
- const compressionMethodsLength = buffer.readUInt8(offset);
193
- if (enableLogging) console.log(`Compression Methods Length: ${compressionMethodsLength}`);
194
- offset += 1 + compressionMethodsLength; // Skip compression methods
195
-
196
- // Extensions
197
- if (offset + 2 > buffer.length) {
198
- if (enableLogging) console.log('Buffer too small for extensions length');
199
- return undefined;
200
- }
201
- const extensionsLength = buffer.readUInt16BE(offset);
202
- if (enableLogging) console.log(`Extensions Length: ${extensionsLength}`);
203
- offset += 2;
204
- const extensionsEnd = offset + extensionsLength;
205
-
206
- if (extensionsEnd > buffer.length) {
207
- if (enableLogging)
208
- console.log(
209
- `Buffer too small for extensions. Expected end: ${extensionsEnd}, Buffer length: ${buffer.length}`
210
- );
211
- return undefined;
212
- }
213
-
214
- // Parse extensions
215
- while (offset + 4 <= extensionsEnd) {
216
- const extensionType = buffer.readUInt16BE(offset);
217
- const extensionLength = buffer.readUInt16BE(offset + 2);
218
-
219
- if (enableLogging)
220
- console.log(`Extension Type: 0x${extensionType.toString(16)}, Length: ${extensionLength}`);
221
-
222
- offset += 4;
223
-
224
- if (extensionType === 0x0000) {
225
- // SNI extension
226
- if (offset + 2 > buffer.length) {
227
- if (enableLogging) console.log('Buffer too small for SNI list length');
228
- return undefined;
229
- }
230
-
231
- const sniListLength = buffer.readUInt16BE(offset);
232
- if (enableLogging) console.log(`SNI List Length: ${sniListLength}`);
233
- offset += 2;
234
- const sniListEnd = offset + sniListLength;
235
-
236
- if (sniListEnd > buffer.length) {
237
- if (enableLogging)
238
- console.log(
239
- `Buffer too small for SNI list. Expected end: ${sniListEnd}, Buffer length: ${buffer.length}`
240
- );
241
- return undefined;
242
- }
243
-
244
- while (offset + 3 < sniListEnd) {
245
- const nameType = buffer.readUInt8(offset++);
246
- const nameLen = buffer.readUInt16BE(offset);
247
- offset += 2;
248
-
249
- if (enableLogging) console.log(`Name Type: ${nameType}, Name Length: ${nameLen}`);
250
-
251
- if (nameType === 0) {
252
- // host_name
253
- if (offset + nameLen > buffer.length) {
254
- if (enableLogging)
255
- console.log(
256
- `Buffer too small for hostname. Expected: ${offset + nameLen}, Got: ${
257
- buffer.length
258
- }`
259
- );
260
- return undefined;
261
- }
262
-
263
- const serverName = buffer.toString('utf8', offset, offset + nameLen);
264
- if (enableLogging) console.log(`Extracted SNI: ${serverName}`);
265
- return serverName;
266
- }
267
-
268
- offset += nameLen;
269
- }
270
- break;
271
- } else {
272
- offset += extensionLength;
273
- }
274
- }
275
-
276
- if (enableLogging) console.log('No SNI extension found');
277
- return undefined;
278
- } catch (err) {
279
- console.log(`Error extracting SNI: ${err}`);
280
- return undefined;
281
- }
282
- }
283
-
284
- /**
285
- * Checks if a TLS record is a proper ClientHello message (more accurate than just checking record type)
286
- * @param buffer - Buffer containing the TLS record
287
- * @returns true if the buffer contains a proper ClientHello message
288
- */
289
- function isClientHello(buffer: Buffer): boolean {
290
- try {
291
- if (buffer.length < 9) return false; // Too small for a proper ClientHello
292
-
293
- // Check record type (has to be handshake - 22)
294
- if (buffer.readUInt8(0) !== 22) return false;
295
-
296
- // After the TLS record header (5 bytes), check the handshake type (1 for ClientHello)
297
- if (buffer.readUInt8(5) !== 1) return false;
298
-
299
- // Basic checks passed, this appears to be a ClientHello
300
- return true;
301
- } catch (err) {
302
- console.log(`Error checking for ClientHello: ${err}`);
303
- return false;
304
- }
305
- }
121
+ // SNI functions are now imported from SniHandler class
122
+ // No need for wrapper functions
306
123
 
307
124
  // Helper: Check if a port falls within any of the given port ranges
308
125
  const isPortInRanges = (port: number, ranges: Array<{ from: number; to: number }>): boolean => {
@@ -346,10 +163,7 @@ const generateConnectionId = (): string => {
346
163
  return Math.random().toString(36).substring(2, 15) + Math.random().toString(36).substring(2, 15);
347
164
  };
348
165
 
349
- // Helper: Check if a buffer contains a TLS handshake
350
- const isTlsHandshake = (buffer: Buffer): boolean => {
351
- return buffer.length > 0 && buffer[0] === 22; // ContentType.handshake
352
- };
166
+ // SNI functions are now imported from SniHandler class
353
167
 
354
168
  // Helper: Ensure timeout values don't exceed Node.js max safe integer
355
169
  const ensureSafeTimeout = (timeout: number): number => {
@@ -761,7 +575,7 @@ export class PortProxy {
761
575
  record.bytesReceived += chunk.length;
762
576
 
763
577
  // Check for TLS handshake
764
- if (!record.isTLS && isTlsHandshake(chunk)) {
578
+ if (!record.isTLS && SniHandler.isTlsHandshake(chunk)) {
765
579
  record.isTLS = true;
766
580
 
767
581
  if (this.settings.enableTlsDebugLogging) {
@@ -1049,10 +863,10 @@ export class PortProxy {
1049
863
  // Define a handler for checking renegotiation with improved detection
1050
864
  const renegotiationHandler = (renegChunk: Buffer) => {
1051
865
  // Only process if this looks like a TLS ClientHello
1052
- if (isClientHello(renegChunk)) {
866
+ if (SniHandler.isClientHello(renegChunk)) {
1053
867
  try {
1054
868
  // Extract SNI from ClientHello
1055
- const newSNI = extractSNI(renegChunk, this.settings.enableTlsDebugLogging);
869
+ const newSNI = SniHandler.extractSNIWithResumptionSupport(renegChunk, this.settings.enableTlsDebugLogging);
1056
870
 
1057
871
  // Skip if no SNI was found
1058
872
  if (!newSNI) return;
@@ -1644,7 +1458,7 @@ export class PortProxy {
1644
1458
  connectionRecord.hasReceivedInitialData = true;
1645
1459
 
1646
1460
  // Check if this looks like a TLS handshake
1647
- if (isTlsHandshake(chunk)) {
1461
+ if (SniHandler.isTlsHandshake(chunk)) {
1648
1462
  connectionRecord.isTLS = true;
1649
1463
 
1650
1464
  // Forward directly to NetworkProxy without SNI processing
@@ -1706,7 +1520,7 @@ export class PortProxy {
1706
1520
  this.updateActivity(connectionRecord);
1707
1521
 
1708
1522
  // Check for TLS handshake if this is the first chunk
1709
- if (!connectionRecord.isTLS && isTlsHandshake(chunk)) {
1523
+ if (!connectionRecord.isTLS && SniHandler.isTlsHandshake(chunk)) {
1710
1524
  connectionRecord.isTLS = true;
1711
1525
 
1712
1526
  if (this.settings.enableTlsDebugLogging) {
@@ -1714,7 +1528,7 @@ export class PortProxy {
1714
1528
  `[${connectionId}] TLS handshake detected from ${remoteIP}, ${chunk.length} bytes`
1715
1529
  );
1716
1530
  // Try to extract SNI and log detailed debug info
1717
- extractSNI(chunk, true);
1531
+ SniHandler.extractSNIWithResumptionSupport(chunk, true);
1718
1532
  }
1719
1533
  }
1720
1534
  });
@@ -1743,7 +1557,7 @@ export class PortProxy {
1743
1557
  connectionRecord.hasReceivedInitialData = true;
1744
1558
 
1745
1559
  // Check if this looks like a TLS handshake
1746
- const isTlsHandshakeDetected = initialChunk && isTlsHandshake(initialChunk);
1560
+ const isTlsHandshakeDetected = initialChunk && SniHandler.isTlsHandshake(initialChunk);
1747
1561
  if (isTlsHandshakeDetected) {
1748
1562
  connectionRecord.isTLS = true;
1749
1563
 
@@ -1912,7 +1726,7 @@ export class PortProxy {
1912
1726
  // Try to extract SNI
1913
1727
  let serverName = '';
1914
1728
 
1915
- if (isTlsHandshake(chunk)) {
1729
+ if (SniHandler.isTlsHandshake(chunk)) {
1916
1730
  connectionRecord.isTLS = true;
1917
1731
 
1918
1732
  if (this.settings.enableTlsDebugLogging) {
@@ -1921,7 +1735,7 @@ export class PortProxy {
1921
1735
  );
1922
1736
  }
1923
1737
 
1924
- serverName = extractSNI(chunk, this.settings.enableTlsDebugLogging) || '';
1738
+ serverName = SniHandler.extractSNIWithResumptionSupport(chunk, this.settings.enableTlsDebugLogging) || '';
1925
1739
  }
1926
1740
 
1927
1741
  // Lock the connection to the negotiated SNI.