From 293ad567b741103b10cf9861cc381069c555e510 Mon Sep 17 00:00:00 2001 From: lu4p Date: Sat, 30 May 2020 22:16:18 +0200 Subject: [PATCH] add string obfuscation --- crypto.go | 44 +++++ main.go | 2 + sdf/main.go | 26 +++ sdf/util.go | 13 ++ strings.go | 324 +++++++++++++++++++++++++++++++++++ test/main.go | 19 ++ testdata/scripts/strings.txt | 40 +++++ 7 files changed, 468 insertions(+) create mode 100644 crypto.go create mode 100644 sdf/main.go create mode 100644 sdf/util.go create mode 100644 strings.go create mode 100644 test/main.go create mode 100644 testdata/scripts/strings.txt diff --git a/crypto.go b/crypto.go new file mode 100644 index 0000000..9640102 --- /dev/null +++ b/crypto.go @@ -0,0 +1,44 @@ +package main + +import ( + "crypto/aes" + "crypto/cipher" + "math/rand" + "time" +) + +func init() { + rand.Seed(time.Now().UnixNano()) // TODO: Use build ID as seed +} + +// genAesKey generates a 128bit AES Key +func genAesKey() []byte { + return genRandBytes(16) +} + +// genAesKey generates a 128bit nonce +func genNonce() []byte { + return genRandBytes(12) +} + +// genRandBytes return a random []byte with the length of size +func genRandBytes(size int) []byte { + buffer := make([]byte, size) + rand.Read(buffer) // error is always nil so save to ignore + return buffer +} + +// encAes encrypt data with AesKey in AES gcm mode +func encAes(data []byte, AesKey []byte) ([]byte, error) { + block, _ := aes.NewCipher(AesKey) + nonce := genNonce() + + aesgcm, err := cipher.NewGCM(block) + if err != nil { + return nil, err + } + + ciphertext := aesgcm.Seal(nil, nonce, data, nil) + encData := append(nonce, ciphertext...) + return encData, nil +} diff --git a/main.go b/main.go index 3e61be9..9d6fdfd 100644 --- a/main.go +++ b/main.go @@ -297,6 +297,8 @@ func transformCompile(args []string) ([]string, error) { files = append(files, file) } + files = obfuscateStrings(files) + info := &types.Info{ Defs: make(map[*ast.Ident]types.Object), Uses: make(map[*ast.Ident]types.Object), diff --git a/sdf/main.go b/sdf/main.go new file mode 100644 index 0000000..6669d94 --- /dev/null +++ b/sdf/main.go @@ -0,0 +1,26 @@ +package main + +import "fmt" + +const ( + cnst = "Lorem" + multiline = `First Line +Second Line` +) + +var variable = "ipsum" + +func main() { + localVar := "dolor" + + reassign := "sit" + reassign = "amet" + + fmt.Println(cnst) + fmt.Println(multiline) + fmt.Println(variable) + fmt.Println(localVar) + fmt.Println(reassign) + + fmt.Println("another literal") +} diff --git a/sdf/util.go b/sdf/util.go new file mode 100644 index 0000000..5c324a4 --- /dev/null +++ b/sdf/util.go @@ -0,0 +1,13 @@ +package main + +import "fmt" + +const ( + cnstOtherFile = "Lorem" +) + +var varOtherFile = "ipsum" + +func test() { + fmt.Println(cnstOtherFile, varOtherFile) +} diff --git a/strings.go b/strings.go new file mode 100644 index 0000000..2beabd0 --- /dev/null +++ b/strings.go @@ -0,0 +1,324 @@ +package main + +import ( + "go/ast" + "go/token" + "log" + "strconv" + + "golang.org/x/tools/go/ast/astutil" +) + +func obfuscateStrings(files []*ast.File) []*ast.File { + + rmConst := func(cursor *astutil.Cursor) bool { + node := cursor.Node() + + t, ok := node.(*ast.GenDecl) + if !ok { + return true + } + + if t.Tok == token.CONST { + t.Tok = token.VAR + } + + return true + } + + var ( + key = genAesKey() + fset = token.NewFileSet() + addedToPkg bool // we only want to inject the code and imports once + ) + + obfusStrings := func(cursor *astutil.Cursor) bool { + node := cursor.Node() + + v, ok := node.(*ast.File) + if ok && !addedToPkg { + v.Decls = append(v.Decls, funcStmt()) + v.Decls = append(v.Decls, keyStmt(key)) + astutil.AddImport(fset, v, "crypto/aes") // TODO: this panics if file has no existing imports + astutil.AddImport(fset, v, "crypto/cipher") + + addedToPkg = true + + return true + } + + if !(cursor.Name() == "Values" || cursor.Name() == "Rhs") { + return true // we don't want to obfuscate literals in Print Functions etc. + } + + lit, ok := node.(*ast.BasicLit) + if !ok { + return true + } + + if lit.Kind != token.STRING { + return true // we only want to obfuscate strings for now + } + + value := lit.Value + + ciphertext, err := encAes([]byte(value), key) + if err != nil { + log.Println("Could not encrypt string:", err) + return true + } + + cursor.Replace(ciphertextStmt(ciphertext)) + + return true + } + + for _, file := range files { + file = astutil.Apply(file, rmConst, obfusStrings).(*ast.File) + } + + return files +} + +// ast definitions for injection +var ( + aesCipherStmt = &ast.AssignStmt{ + Lhs: []ast.Expr{ + &ast.Ident{ + Name: "block", + }, + &ast.Ident{ + Name: "_", + }, + }, + Tok: token.DEFINE, + Rhs: []ast.Expr{ + &ast.CallExpr{ + Fun: &ast.SelectorExpr{ + X: &ast.Ident{ + Name: "aes", + }, + Sel: &ast.Ident{ + Name: "NewCipher", + }, + }, + Args: []ast.Expr{ + &ast.Ident{ + Name: "garbleKey", + }, + }, + }, + }, + } + + aesGcmCipherStmt = &ast.AssignStmt{ + Lhs: []ast.Expr{ + &ast.Ident{ + Name: "aesgcm", + }, + &ast.Ident{ + Name: "_", + }, + }, + Tok: token.DEFINE, + Rhs: []ast.Expr{ + &ast.CallExpr{ + Fun: &ast.SelectorExpr{ + X: &ast.Ident{ + Name: "cipher", + }, + Sel: &ast.Ident{ + Name: "NewGCM", + }, + }, + Args: []ast.Expr{ + &ast.Ident{ + Name: "block", + }, + }, + }, + }, + } + + plaintextStmt = &ast.AssignStmt{ + Lhs: []ast.Expr{ + &ast.Ident{ + Name: "plaintext", + }, + &ast.Ident{ + Name: "_", + }, + }, + Tok: token.DEFINE, + Rhs: []ast.Expr{ + &ast.CallExpr{ + Fun: &ast.SelectorExpr{ + X: &ast.Ident{ + Name: "aesgcm", + }, + Sel: &ast.Ident{ + Name: "Open", + }, + }, + Args: []ast.Expr{ + &ast.Ident{ + Name: "nil", + }, + &ast.SliceExpr{ + X: &ast.Ident{ + Name: "ciphertext", + }, + High: &ast.BasicLit{ + Kind: token.INT, + Value: "12", + }, + Slice3: false, + }, + &ast.SliceExpr{ + X: &ast.Ident{ + Name: "ciphertext", + }, + Low: &ast.BasicLit{ + Kind: token.INT, + Value: "12", + }, + Slice3: false, + }, + &ast.Ident{ + Name: "nil", + }, + }, + }, + }, + } + + returnStmt = &ast.ReturnStmt{ + Results: []ast.Expr{ + &ast.CallExpr{ + Fun: &ast.Ident{ + Name: "string", + }, + Args: []ast.Expr{ + &ast.Ident{ + Name: "plaintext", + }, + }, + }, + }, + } +) + +func funcStmt() *ast.FuncDecl { + stmts := []ast.Stmt{ + aesCipherStmt, + aesGcmCipherStmt, + plaintextStmt, + returnStmt, + } + + return &ast.FuncDecl{ + Name: &ast.Ident{ + Name: "garbleDecrypt", + }, + Type: &ast.FuncType{ + Params: &ast.FieldList{ + List: []*ast.Field{ + { + Names: []*ast.Ident{ + { + Name: "ciphertext", + }, + }, + Type: &ast.ArrayType{ + Elt: &ast.Ident{ + Name: "byte", + }, + }, + }, + }, + }, + Results: &ast.FieldList{ + List: []*ast.Field{ + { + Type: &ast.Ident{ + Name: "string", + }, + }, + }, + }, + }, + Body: &ast.BlockStmt{ + List: stmts, + }, + } + +} + +func ciphertextStmt(ciphertext []byte) *ast.CallExpr { + ciphertextLit := byteToByteLit(ciphertext) + return &ast.CallExpr{ + Fun: &ast.Ident{ + Name: "garbleDecrypt", + }, + Args: []ast.Expr{ + &ast.CompositeLit{ + Type: &ast.ArrayType{ + Elt: &ast.Ident{ + Name: "byte", + }, + }, + Elts: ciphertextLit, + }, + }, + } +} + +func byteToByteLit(buffer []byte) []ast.Expr { + + var bufferInt []int + var result []ast.Expr + + for _, c := range buffer { + bufferInt = append(bufferInt, int(c)) + } + + for _, x := range bufferInt { + + result = append(result, &ast.BasicLit{ + Kind: token.INT, + Value: strconv.Itoa(x), + }) + } + + return result +} + +func keyStmt(key []byte) (decl *ast.GenDecl) { + keyLit := byteToByteLit(key) + + decl = &ast.GenDecl{ + Tok: token.VAR, + Specs: []ast.Spec{ + &ast.ValueSpec{ + Names: []*ast.Ident{ + { + Name: "garbleKey", + }, + }, + Values: []ast.Expr{ + &ast.CompositeLit{ + Type: &ast.ArrayType{ + Elt: &ast.Ident{ + Name: "byte", + }, + }, + Elts: keyLit, + Incomplete: false, + }, + }, + }, + }, + } + + return +} diff --git a/test/main.go b/test/main.go new file mode 100644 index 0000000..f3a49bd --- /dev/null +++ b/test/main.go @@ -0,0 +1,19 @@ +package main + +import ( + "crypto/aes" + "crypto/cipher" +) + +var key []byte = []byte{1, 2, 3} + +func main() { + decryptName([]byte{1, 2, 3}) +} + +func decryptName(ciphertext []byte) string { + block, _ := aes.NewCipher(key) + aesgcm, _ := cipher.NewGCM(block) + plaintext, _ := aesgcm.Open(nil, ciphertext[:12], ciphertext[12:], nil) + return string(plaintext) +} diff --git a/testdata/scripts/strings.txt b/testdata/scripts/strings.txt new file mode 100644 index 0000000..ddbf163 --- /dev/null +++ b/testdata/scripts/strings.txt @@ -0,0 +1,40 @@ +garble build main.go +exec ./main +cmp stdout main.stdout + +! binsubstr main$exe 'Lorem' 'ipsum' 'dolor' 'sit' 'amet' 'First' 'Second' 'Line' + +-- main.go -- +package main + +import "fmt" + +const ( + cnst = "Lorem" + multiline = `First Line +Second Line` +) + +var variable = "ipsum" + +func main() { + localVar := "dolor" + + reassign := "sit" + reassign = "amet" + + fmt.Println(cnst) + fmt.Println(multiline) + fmt.Println(variable) + fmt.Println(localVar) + fmt.Println(reassign) +} + + +-- main.stdout -- +Lorem +First Line +Second Line +ipsum +dolor +amet \ No newline at end of file