Crates.io | obfswire |
lib.rs | obfswire |
version | |
source | src |
created_at | 2025-01-28 14:48:25.215367+00 |
updated_at | 2025-03-26 05:16:47.373173+00 |
description | A library for obfuscating network traffic, designed to resist deep packet inspection (DPI) and active probing of network endpoints. |
homepage | |
repository | https://github.com/Brainmaker/Obfswire |
max_upload_size | |
id | 1533597 |
Cargo.toml error: | TOML parse error at line 18, column 1 | 18 | autolib = false | ^^^^^^^ unknown field `autolib`, expected one of `name`, `version`, `edition`, `authors`, `description`, `readme`, `license`, `repository`, `homepage`, `documentation`, `build`, `resolver`, `links`, `default-run`, `default_dash_run`, `rust-version`, `rust_dash_version`, `rust_version`, `license-file`, `license_dash_file`, `license_file`, `licenseFile`, `license_capital_file`, `forced-target`, `forced_dash_target`, `autobins`, `autotests`, `autoexamples`, `autobenches`, `publish`, `metadata`, `keywords`, `categories`, `exclude`, `include` |
size | 0 |
Obfswire is a network obfuscation protocol designed to counter Deep Packet Inspection (DPI) and active probing, offering privacy and anti-analysis capabilities for reliable and ordered stream transmission.
tokio
,
providing an interface similar to TcpStream
for async
application development.Obfswire establishes an obfuscated tunnel between two endpoints, aiming to make transmitted content indistinguishable from random byte streams. It also protects against active probing and non-content protocol fingerprinting, adhering to the threat model of obfs4.
Obfswire is designed with a modular architecture that separates obfuscation from other transport-layer functionalities. This ensures that obfswire focuses exclusively on obfuscation without directly implementing features like key exchange, client authentication, multiplexing, DNS resolution, or proxying. These capabilities can be integrated by upper-layer protocols, allowing for greater flexibility to meet diverse application needs.
While obfswire typically operates over reliable and ordered streams, such as TCP
connections, it is not strictly tied to TCP. Any underlying transport implementing
Rust’s Read
and Write
traits can be
used as the foundation for obfswire's obfuscation pipeline.
Obfswire is designed as a 0-RTT protocol to enable low-latency communication. It ensures data confidentiality, integrity, and endpoint authentication through pre-shared keys. While key exchange mechanisms can provide forward secrecy, they introduce additional handshake latency, which may not be suitable for latency-sensitive scenarios. Furthermore, the use of certain key exchange algorithms, such as post-quantum cryptographic methods, can significantly increase computational overhead.
To strike a balance between 0-RTT efficiency and forward secrecy, Obfswire delegates key exchange responsibilities to the application layer. Although Obfswire does not include a built-in key exchange mechanism, it offers seamless integration points for implementing such protocols within its obfuscation pipeline. This approach allows applications to negotiate shared keys while reusing Obfswire's encryption pipeline, eliminating the performance overhead of nested encryption.
Here’s a minimal, client-server echo code snippet to help you get started:
use obfswire::{Config, ObfuscatedStream, SharedKey};
use tokio::{
net::{TcpListener, TcpStream},
io::{AsyncReadExt, AsyncWriteExt}
};
#[tokio::main]
async fn main() -> std::io::Result<()> {
let message = b"Hello, world!";
// Setup a TCP listener
let listener = TcpListener::bind("127.0.0.1:8888").await?;
// Setup a client/server common configuration
let config = Config::builder_with_shared_key(SharedKey::from_entropy())
.with_default_cipher_and_tcp_padding();
let client_config = config.clone();
let client_task = tokio::spawn(async move {
// Get a TCP connection
let stream = TcpStream::connect("127.0.0.1:8888").await?;
// Setup a client stream of obfswire
let mut client_stream = ObfuscatedStream::with_config_in(client_config, stream);
// Do some I/O
client_stream.write_all(message).await?;
let mut buf = [0; 128];
client_stream.read_exact(&mut buf[..message.len()]).await?;
println!("Client received: {}", String::from_utf8_lossy(&buf[..message.len()]));
Ok::<(), std::io::Error>(())
});
// Accept a TCP connection
while let Ok((stream, _)) = listener.accept().await {
let server_config = config.clone();
// Handle client connection
tokio::spawn(async move {
// Setup server stream of obfswire
let mut server_stream = ObfuscatedStream::with_config_in(server_config, stream);
// Do some I/O
let mut buf = [0; 128];
server_stream.read_exact(&mut buf[..message.len()]).await?;
println!("Server received: {}", String::from_utf8_lossy(&buf[..message.len()]));
server_stream.write_all(&buf[..message.len()]).await?;
Ok::<(), std::io::Error>(())
});
}
client_task.await??;
Ok(())
}
For more practical examples, refer to the examples directory:
simple-client
and
simple-server
:
Demonstrate a minimal Obfswire client and server setup.kx-client
and
kx-server
:
Show how to integrate Obfswire with an application-layer key exchange protocol.tokio_stream_impl
:
Part of the library code that demonstrates how to integrate the Obfswire state
machine with asynchronous streams using tokio. This can serve as a reference for
implementing similar functionality in your own projects.This project is licensed under either of