croc/README.md

211 lines
11 KiB
Markdown
Raw Normal View History

2018-06-28 14:09:11 +02:00
2018-07-02 00:12:46 +02:00
<p align="center">
<img
src="https://user-images.githubusercontent.com/6550035/31846899-2b8a7034-b5cf-11e7-9643-afe552226c59.png"
width="100%" border="0" alt="croc">
<br>
<a href="https://github.com/schollz/croc/releases/latest"><img src="https://img.shields.io/badge/version-3.0.0-brightgreen.svg?style=flat-square" alt="Version"></a>
<a href="https://saythanks.io/to/schollz"><img src="https://img.shields.io/badge/Say%20Thanks-!-yellow.svg?style=flat-square" alt="Go Report Card"></a>
</p>
2018-06-28 14:09:11 +02:00
2018-07-02 00:12:46 +02:00
<p align="center">Easily and securely transfer stuff from one computer to another.</p>
2018-06-28 14:09:11 +02:00
2018-07-02 00:12:46 +02:00
*croc* allows any two computers to directly and securely transfer files and folders. When sending a file, *croc* generates a random code phrase which must be shared with the recipient so they can receive the file. The code phrase encrypts all data and metadata and also serves to authorize the connection between the two computers in a intermediary relay. The relay connects the TCP ports between the two computers and does not store any information (and all information passing through it is encrypted).
2018-06-28 14:09:11 +02:00
2018-07-02 00:12:46 +02:00
I hear you asking, *Why another open-source peer-to-peer file transfer utilities?* [There](https://github.com/cowbell/sharedrop) [are](https://github.com/webtorrent/instant.io) [great](https://github.com/kern/filepizza) [tools](https://github.com/warner/magic-wormhole) [that](https://github.com/zerotier/toss) [already](https://github.com/ipfs/go-ipfs) [do](https://github.com/zerotier/toss) [this](https://github.com/nils-werner/zget). But, after review, [I found it was useful to make another](https://schollz.github.io/sending-a-file/). Namely, *croc* has no dependencies (just [download a binary and run](https://github.com/schollz/croc/releases/latest)), it works on any operating system, and its blazingly fast because it does parallel transfer over multiple TCP ports.
2018-06-28 14:09:11 +02:00
2018-07-07 15:46:40 +02:00
## Example
2018-06-28 14:09:11 +02:00
2018-07-04 15:55:51 +02:00
_These two gifs should run in sync if you force-reload (Ctl+F5)_
2018-06-28 14:09:11 +02:00
2018-07-02 00:12:46 +02:00
**Sender:**
2018-07-04 15:55:51 +02:00
![send](https://raw.githubusercontent.com/schollz/croc/master/src/testing_data/sender.gif)
2018-07-02 00:12:46 +02:00
**Receiver:**
2018-07-04 15:55:51 +02:00
![receive](https://raw.githubusercontent.com/schollz/croc/master/src/testing_data/recipient.gif)
2018-07-02 00:12:46 +02:00
2018-07-07 15:46:40 +02:00
## Install
2018-07-02 00:12:46 +02:00
2018-07-07 15:46:40 +02:00
[Download the latest release for your system](https://github.com/schollz/croc/releases/latest).
Or, you can [install Go](https://golang.org/dl/) and build from source with `go get github.com/schollz/croc`.
2018-07-02 00:12:46 +02:00
2018-07-07 15:46:40 +02:00
## Usage
2018-06-28 14:09:11 +02:00
2018-07-07 15:46:40 +02:00
The basic usage is to just do
2018-06-28 14:09:11 +02:00
2018-07-02 00:12:46 +02:00
```
2018-07-07 15:46:40 +02:00
$ croc send FILE
2018-07-02 00:12:46 +02:00
```
2018-06-28 14:09:11 +02:00
2018-07-07 15:46:40 +02:00
to send and then on the other computer you can just do
2018-06-28 14:09:11 +02:00
2018-07-07 15:46:40 +02:00
```
$ croc [code phrase]
```
2018-06-28 14:09:11 +02:00
2018-07-07 15:46:40 +02:00
to receive (you'll be prompted to enter the code phrase). Note, by default, you don't need any arguments for receiving, instead you will be prompted to enter the code phrase. This makes it possible for you to just double click the executable to run (nice for those of us that aren't computer wizards).
2018-06-28 14:09:11 +02:00
2018-07-07 15:46:40 +02:00
### Custom code phrase
You can send with your own code phrase (must be more than 4 characters).
2018-06-28 14:09:11 +02:00
2018-07-02 00:12:46 +02:00
```
2018-07-07 15:46:40 +02:00
$ croc send --code [code phrase] [filename]
2018-07-02 00:12:46 +02:00
```
2018-06-28 14:09:11 +02:00
2018-07-07 15:46:40 +02:00
### Use locally
2018-06-28 14:09:11 +02:00
2018-07-07 15:46:40 +02:00
*croc* automatically will attempt to start a local connection on your LAN to transfer the file much faster. It uses [peer discovery](https://github.com/schollz/peerdiscovery), basically broadcasting a message on the local subnet to see if another *croc* user wants to receive the file. *croc* will utilize the first incoming connection from either the local network or the public relay and follow through with PAKE.
You can change this behavior by forcing *croc* to use only local connections (`--local`) or force to use the public relay only (`--no-local`):
2018-06-28 14:09:11 +02:00
2018-07-02 00:12:46 +02:00
```
2018-07-07 15:46:40 +02:00
$ croc --local/--no-local send [filename]
2018-07-02 00:12:46 +02:00
```
2018-06-28 14:09:11 +02:00
2018-07-07 15:46:40 +02:00
### Using pipes - stdin and stdout
2018-06-28 14:09:11 +02:00
2018-07-07 15:46:40 +02:00
You can easily use *croc* in pipes when you need to send data through stdin or get data from stdout. To send you can just use pipes:
2018-06-28 14:09:11 +02:00
2018-07-07 15:46:40 +02:00
```
$ cat [filename] | croc send
```
2018-06-28 14:09:11 +02:00
2018-07-07 15:46:40 +02:00
In this case *croc* will automatically use the stdin data and send and assign a filename like "croc-stdin-123456789". To receive to stdout at you can always just use the `-yes` and `-stdout` flags which will automatically approve the transfer and pipe it out to stdout.
2018-06-28 14:09:11 +02:00
2018-07-07 15:46:40 +02:00
```
$ croc -yes -stdout [code phrase] > out
```
2018-06-28 14:09:11 +02:00
2018-07-07 15:46:40 +02:00
All of the other text printed to the console is going to `stderr` so it will not interfere with the message going to stdout.
2018-06-28 14:09:11 +02:00
2018-07-07 15:46:40 +02:00
### Self-host relay
2018-06-28 15:38:07 +02:00
2018-07-07 15:46:40 +02:00
The relay is needed to staple the parallel incoming and outgoing connections. The relay temporarily stores connection information and the encrypted meta information. The default uses a public relay at, `wss://croc3.schollz.com`. You can also run your own relay, it is very easy, just run:
2018-06-28 14:09:11 +02:00
2018-07-07 15:46:40 +02:00
```
$ croc relay
```
2018-06-28 14:09:11 +02:00
2018-07-07 15:46:40 +02:00
Make sure to open up TCP ports (see `croc relay --help` for which ports to open). You can also define your own ports with `-tcp` and `-port`. Relays can also be customized to which elliptic curve they will use (default is siec).
2018-06-28 14:09:11 +02:00
2018-07-07 15:46:40 +02:00
You can send files using your relay by entering `-relay` to change the relay that you are using if you want to custom host your own.
2018-06-28 14:09:11 +02:00
2018-07-02 00:12:46 +02:00
```
2018-07-07 15:46:40 +02:00
$ croc -relay "ws://myrelay.example.com" send [filename]
2018-07-02 00:12:46 +02:00
```
2018-06-28 14:09:11 +02:00
2017-10-17 17:21:47 +02:00
2018-06-28 14:09:11 +02:00
2018-07-07 15:46:40 +02:00
## How does it work?
*croc* is similar to [magic-wormhole](https://github.com/warner/magic-wormhole#design) in spirit and design. Like *magic-wormhole*, *croc* generates a code phrase for you to share with your friend which allows secure end-to-end transferring of files and folders through a intermediary relay that connects the TCP ports between the two computers. Also like *magic-wormhole*, security is enabled by performing password-authenticated key exchange (PAKE) with the weak code phrase to generate a session key on both machines without passing any private information between the two. The session key is then verified and used to encrypt the content and meta-data with AES-256. If at any point the PAKE fails, an error will be reported and the file will not be transferred. More details on the PAKE transfer can be found at [github.com/schollz/pake](https://github.com/schollz/pake) and below in the [protocol](#protocol).
The intermediary relay uses websockets to have bidirectional communication with potential senders and recipients. Only one sender and one recipient is allowed in a channel at once. The relay helps to deliver the PAKE information, and once both parties agree, it will staple the connections between the sender and recipient and pipe all incoming TCP data from the sender to the recipient.
2018-06-28 14:09:11 +02:00
2018-07-07 15:46:40 +02:00
When sending a file with *croc*, a local relay is initiated which will try to discover local peers for connection. If a recipient is found locally, then the local connections are used and the public relay is never used. This way, *croc* can be used without a public internet connection (i.e. to transfer files over LAN).
2018-06-28 15:38:07 +02:00
2018-07-07 15:46:40 +02:00
## Protocol
2018-07-03 16:10:15 +02:00
This is an outline of the protocol used here. The basic PAKE protocol is from [Dan Boneh and Victor Shoup's crypto book](https://crypto.stanford.edu/%7Edabo/cryptobook/BonehShoup_0_4.pdf) (pg 789, "PAKE2 protocol).
![Basic PAKE](https://camo.githubusercontent.com/b85a5f63469a2f986ce4d280862b46b00ff6605c/68747470733a2f2f692e696d6775722e636f6d2f73376f515756502e706e67)
2018-05-05 23:10:49 +02:00
2018-07-02 00:12:46 +02:00
1. **Sender** requests new channel and receives empty channel from **Relay**, or obtains the channel they request (or an error if it is already occupied).
2. **Sender** generates *u* using PAKE from secret *pw*.
3. **Sender** sends *u* to **Relay** and the type of curve being used. Returns error if channel is already occupied by sender, otherwise it uses it.
4. **Sender** communicates channel + secret *pw* to **Recipient** (human interaction).
5. **Recipient** connects to channel and receives UUID.
6. **Recipient** requests *u* from **Relay** using the channel. Returns error if it doesn't exist yet.
7. **Recipient** generates *v*, session key *k_B*, and hashed session key *H(k_B)* using PAKE from secret *pw*.
8. **Recipient** sends *v*, *H(H(k_B))* to **Relay**.
9. **Sender** requests *v*, *H(H(k_B))* from **Relay**.
10. **Sender** uses *v* to generate its session key *k_A* and *H(k_A)*, and checks *H(H(k_A))*==*H(H(k_B))*. **Sender** aborts here if it is incorrect.
11. **Sender** gives the **Relay** authentication *H(k_A)*.
12. **Recipient** requests *H(k_A)* from relay and checks against its own. If it doesn't match, then bail.
13. **Sender** connects to **Relay** tcp ports and identifies itself using channel+UUID.
14. **Sender** encrypts data with *k*.
15. **Recipient** connects to **Relay** tcp ports and identifies itself using channel+UUID.
16. **Relay** realizes it has both recipient and sender for the same channel so it staples their connections. Sets *stapled* to `true`.
17. **Sender** asks **Relay** whether connections are stapled.
18. **Sender** sends data over TCP.
19. **Recipient** closes relay when finished. Anyone participating in the channel can close the relay at any time. Any of the routes except the first ones will return errors if stuff doesn't exist.
2018-06-29 01:53:20 +02:00
2018-07-02 00:12:46 +02:00
### Conditions of state
2018-06-29 01:53:20 +02:00
2018-07-02 00:12:46 +02:00
The websocket implementation means that each client and relay follows their specific state machine conditions.
#### Sender
2018-06-29 01:53:20 +02:00
*Initialize*
- Requests to join.
*Does X not exist?*
2018-06-29 01:53:20 +02:00
- Generates X from pw.
- Update relay with X.
2018-06-29 01:53:20 +02:00
2018-06-29 16:35:25 +02:00
*Is Y and Bcrypt(k_B) available?*
2018-06-29 01:53:20 +02:00
2018-07-02 00:12:46 +02:00
- Use *v* to generate its session key *k_A*.
2018-06-29 16:35:25 +02:00
- Check that Bcrypt(k_B) comes from k_A. Abort here if it is incorrect.
2018-06-29 01:53:20 +02:00
- Encrypts data using *k_A*.
- Connect to TCP ports of Relay.
- Update relay with *Bcrypt(k_A)*.
2018-06-29 01:53:20 +02:00
*Are ports stapled?*
- Send data over TCP
2018-07-02 00:12:46 +02:00
#### Recipient
2018-06-29 01:53:20 +02:00
*Initialize*
- Request to join
*Is X available?*
2018-07-02 00:12:46 +02:00
- Generate *v*, session key *k_B*, and hashed session key *H(k_B)* using PAKE from secret *pw*.
2018-06-29 16:35:25 +02:00
- Send the Relay *Bcrypt(k_B)*
2018-06-29 01:53:20 +02:00
2018-06-29 16:35:25 +02:00
*Is Bcrypt(k_A) available?*
2018-06-29 01:53:20 +02:00
2018-06-29 16:35:25 +02:00
- Verify that *Bcrypt(k_A)* comes from k_B
2018-06-29 01:53:20 +02:00
- Connect to TCP ports of Relay and listen.
- Once file is received, Send close signal to Relay.
2018-07-02 00:12:46 +02:00
#### Relay
2018-06-29 01:53:20 +02:00
*Is there a listener for sender and recipient?*
- Staple connections.
2018-07-02 00:12:46 +02:00
- Send out to all parties that connections are stapled.
2018-07-07 15:46:40 +02:00
## License
2018-07-02 00:12:46 +02:00
MIT
2018-07-07 15:46:40 +02:00
## Acknowledgements
I am awed by all the [great contributions](#acknowledgements) made! If you feel like contributing, in any way, by all means you can send an Issue, a PR, ask a question, or tweet me ([@yakczar](http://ctt.ec/Rq054)).
2018-07-02 00:12:46 +02:00
Thanks...
- ...[@warner](https://github.com/warner) for the [idea](https://github.com/warner/magic-wormhole).
- ...[@tscholl2](https://github.com/tscholl2) for the [encryption gists](https://gist.github.com/tscholl2/dc7dc15dc132ea70a98e8542fefffa28).
- ...[@skorokithakis](https://github.com/skorokithakis) for [code on proxying two connections](https://www.stavros.io/posts/proxying-two-connections-go/).
- ...for making pull requests [@Girbons](https://github.com/Girbons), [@techtide](https://github.com/techtide), [@heymatthew](https://github.com/heymatthew), [@Lunsford94](https://github.com/Lunsford94), [@lummie](https://github.com/lummie), [@jesuiscamille](https://github.com/jesuiscamille), [@threefjord](https://github.com/threefjord), [@marcossegovia](https://github.com/marcossegovia), [@csleong98](https://github.com/csleong98), [@afotescu](https://github.com/afotescu), [@callmefever](https://github.com/callmefever), [@El-JojA](https://github.com/El-JojA), [@anatolyyyyyy](https://github.com/anatolyyyyyy), [@goggle](https://github.com/goggle), [@smileboywtu](https://github.com/smileboywtu)!