obfuscated-openssh | first step in the obfuscation protocol | Cryptography library
kandi X-RAY | obfuscated-openssh Summary
kandi X-RAY | obfuscated-openssh Summary
The first step in the obfuscation protocol is that the client connects to a port running the protocol and sends a seed message which is used to derive the keys for obfuscating the handshake. #define OBFUSCATE_MAGIC_VALUE 0x0BF5CA7E #define OBFUSCATE_SEED_LENGTH 16 #define OBFUSCATE_MAX_PADDING 8192. [ 16 byte random seed ][ magic ][ plength ][ .. plength bytes of random padding ... ] |||___________________________| | | Plaintext Encrypted with key derived from seed. To create the seed message the client first generates 16 pseudo random bytes from which the handshake obfuscation keys will be derived. The client also runs the key derivation algorithm (described below) to initialize the obfuscation cipher. The 'magic' field and the 'plength' field are 32 bit unsigned values transfered in network byte order (MSB first). The magic field must contain the constant OBFUSCATE_MAGIC_VALUE and the 'plength' field must contain a randomly selected value between 0 and OBFUSCATE_MAX_PADDING. Then 'plength' bytes of pseudo randomly generated data is appended after the length field. The purpose of the padding is to prevent a trivial traffic analysis attack which allows the protocol to be identified my merely observing the size of the first message. Upon receiving the seed message from the client, the server must extract the seed bytes and perform the key derivation algorithm (described below) before decrypting the rest of the message. Then the server must verify that the magic value is correct and also that the padding length is below OBFUSCATE_MAX_PADDING. If these checks fail the server will continue reading and discarding all data until the client closes the connection without sending anything in response.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of obfuscated-openssh
obfuscated-openssh Key Features
obfuscated-openssh Examples and Code Snippets
Community Discussions
Trending Discussions on obfuscated-openssh
QUESTION
I want to use a docker container to create the ssh tunnel since there are issues compiling Obfuscated OpenSSH on Mac where as it is simple on Ubuntu.
Here is the docker file I'm using
...ANSWER
Answered 2017-Aug-03 at 14:21The issue is that you are creating a localhost tunnel inside the container. To use that tunnel you need to be inside the docker container.
When you use -p 127.0.0.1:6969:6969
in docker run command. It says that port 6969
from the container will receive all traffic from your machine. But the container would receive the same from the IP assigned to the docker container. Which would be something like 172.2.0.2
.
You ssh tunnel inside the container is only listening to 127.0.0.1
and not 172.2.0.2
, so it will receive no such traffic. So change your Dockefile line
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install obfuscated-openssh
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page