Go to file
Zack Scholl 2081b4e17e remove croc gen 2018-07-07 10:08:18 -07:00
src use to/from slash 2018-07-07 10:08:18 -07:00
.gitignore Added a git ignore 2017-10-20 14:44:19 +01:00
.travis.yml update travis 2018-07-07 10:08:11 -07:00
LICENSE Create LICENSE 2017-10-18 11:50:06 -06:00
README.md update readme 2018-07-07 10:08:17 -07:00
goreleaser.yml add goreleaser 2018-07-07 10:08:16 -07:00
main.go remove croc gen 2018-07-07 10:08:18 -07:00

README.md

croc
Version Go Report Card

Easily and securely transfer stuff from one computer to another.

croc allows any two computers to directly and securely transfer files and folders. When sending a file, croc generates a random code phrase which must be shared with the recipient so they can receive the file. The code phrase encrypts all data and metadata and also serves to authorize the connection between the two computers in a intermediary relay. The relay connects the TCP ports between the two computers and does not store any information (and all information passing through it is encrypted).

I hear you asking, Why another open-source peer-to-peer file transfer utilities? There are great tools that already do this. But, after review, I found it was useful to make another. Namely, croc has no dependencies (just download a binary and run), it works on any operating system, and its blazingly fast because it does parallel transfer over multiple TCP ports.

Example

These two gifs should run in sync if you force-reload (Ctl+F5)

Sender:

send

Receiver:

receive

Sender:

$ croc send some-file-or-folder
Sending 1.1 MB file named 'some-file-or-folder'
Code is: fidel-parent-insect
On the other computer please run

croc fidel-parent-insect

Sending (->[1]63982)..
  89% |███████████████████████████████████     | [12s:1s]
Transfer complete.

Receiver:

$ croc
Enter receive code: fidel-parent-insect
Receiving file (1.1 MB) into: some-file-or-folder
ok? (y/N): y

Receiving (<-[1]63975)..
  97% |██████████████████████████████████████  | [13s:0s]
Received file written to some-file-or-folder

Note, by default, you don't need any arguments for receiving! This makes it possible for you to just double click the executable to run (nice for those of us that aren't computer wizards).

Using croc in pipes

You can easily use croc in pipes when you need to send data through stdin or get data from stdout.

Sender:

$ cat some_file_or_folder | croc send

In this case croc will automatically use the stdin data and send and assign a filename like "croc-stdin-123456789".

Receiver:

$ croc --code code-phrase --yes --stdout receive

Here the receiver specified the code (--code) so it will not be prompted, and also specified --yes so the file will be automatically accepted. The output goes to stdout when flagged with --stdout.

Install

Download the latest release for your system.

Or, you can install Go and build from source with go get github.com/schollz/croc.

How does it work?

croc is similar to magic-wormhole in spirit and design. Like magic-wormhole, croc generates a code phrase for you to share with your friend which allows secure end-to-end transferring of files and folders through a intermediary relay that connects the TCP ports between the two computers. Also like magic-wormhole, security is enabled by performing password-authenticated key exchange (PAKE) with the weak code phrase to generate a session key on both machines without passing any private information between the two. The session key is then verified and used to encrypt the content with AES-256. If at any point the PAKE fails, an error will be reported and the file will not be transferred. More details on the PAKE transfer can be found at github.com/schollz/pake.

Relay

croc relies on a TCP relay to staple the parallel incoming and outgoing connections. The relay temporarily stores connection information and the encrypted meta information. The default uses a public relay at, wss://croc3.schollz.com. You can also run your own relay, it is very easy. On your server, your-server.com, just run

$ croc relay

Now, when you use croc to send and receive you should add -server your-server.com to use your relay server. Make sure to open up TCP ports (see croc relay --help for which ports to open).

Contribute

I am awed by all the great contributions made! If you feel like contributing, in any way, by all means you can send an Issue, a PR, ask a question, or tweet me (@yakczar).

Protocol

This is an outline of the protocol used here. The basic PAKE protocol is from Dan Boneh and Victor Shoup's crypto book (pg 789, "PAKE2 protocol).

Basic PAKE

  1. Sender requests new channel and receives empty channel from Relay, or obtains the channel they request (or an error if it is already occupied).
  2. Sender generates u using PAKE from secret pw.
  3. Sender sends u to Relay and the type of curve being used. Returns error if channel is already occupied by sender, otherwise it uses it.
  4. Sender communicates channel + secret pw to Recipient (human interaction).
  5. Recipient connects to channel and receives UUID.
  6. Recipient requests u from Relay using the channel. Returns error if it doesn't exist yet.
  7. Recipient generates v, session key k_B, and hashed session key H(k_B) using PAKE from secret pw.
  8. Recipient sends v, H(H(k_B)) to Relay.
  9. Sender requests v, H(H(k_B)) from Relay.
  10. Sender uses v to generate its session key k_A and H(k_A), and checks H(H(k_A))==H(H(k_B)). Sender aborts here if it is incorrect.
  11. Sender gives the Relay authentication H(k_A).
  12. Recipient requests H(k_A) from relay and checks against its own. If it doesn't match, then bail.
  13. Sender connects to Relay tcp ports and identifies itself using channel+UUID.
  14. Sender encrypts data with k.
  15. Recipient connects to Relay tcp ports and identifies itself using channel+UUID.
  16. Relay realizes it has both recipient and sender for the same channel so it staples their connections. Sets stapled to true.
  17. Sender asks Relay whether connections are stapled.
  18. Sender sends data over TCP.
  19. Recipient closes relay when finished. Anyone participating in the channel can close the relay at any time. Any of the routes except the first ones will return errors if stuff doesn't exist.

Conditions of state

The websocket implementation means that each client and relay follows their specific state machine conditions.

Sender

Initialize

  • Requests to join.

Does X not exist?

  • Generates X from pw.
  • Update relay with X.

Is Y and Bcrypt(k_B) available?

  • Use v to generate its session key k_A.
  • Check that Bcrypt(k_B) comes from k_A. Abort here if it is incorrect.
  • Encrypts data using k_A.
  • Connect to TCP ports of Relay.
  • Update relay with Bcrypt(k_A).

Are ports stapled?

  • Send data over TCP

Recipient

Initialize

  • Request to join

Is X available?

  • Generate v, session key k_B, and hashed session key H(k_B) using PAKE from secret pw.
  • Send the Relay Bcrypt(k_B)

Is Bcrypt(k_A) available?

  • Verify that Bcrypt(k_A) comes from k_B
  • Connect to TCP ports of Relay and listen.
  • Once file is received, Send close signal to Relay.

Relay

Is there a listener for sender and recipient?

  • Staple connections.
  • Send out to all parties that connections are stapled.

License

MIT

Acknowledgements

Thanks...