Go to file
Zack Scholl 80c129b411 default to https ws 2018-07-07 10:08:16 -07:00
src check meta data for decryption flag 2018-07-07 10:08:16 -07:00
.gitignore Added a git ignore 2017-10-20 14:44:19 +01:00
.travis.yml update travis 2018-07-07 10:08:11 -07:00
LICENSE Create LICENSE 2017-10-18 11:50:06 -06:00
README.md update readme 2018-07-07 10:08:15 -07:00
main.go default to https ws 2018-07-07 10:08:16 -07:00

README.md

croc
Version Go Report Card

Easily and securely transfer stuff from one computer to another.

croc allows any two computers to directly and securely transfer files and folders. When sending a file, croc generates a random code phrase which must be shared with the recipient so they can receive the file. The code phrase encrypts all data and metadata and also serves to authorize the connection between the two computers in a intermediary relay. The relay connects the TCP ports between the two computers and does not store any information (and all information passing through it is encrypted).

New version released June 24th, 2018 - please upgrade if you are using the public relay.

I hear you asking, Why another open-source peer-to-peer file transfer utilities? There are great tools that already do this. But, after review, I found it was useful to make another. Namely, croc has no dependencies (just download a binary and run), it works on any operating system, and its blazingly fast because it does parallel transfer over multiple TCP ports.

Example

These two gifs should run in sync if you force-reload (Ctl+F5)

Sender:

send

Receiver:

receive

Sender:

$ croc -send some-file-or-folder
Sending 4.4 MB file named 'some-file-or-folder'
Code is: cement-galaxy-alpha

Your public key: ecad-bakery-cup-unlit-roam-fetid-arulo-updike
Recipient public key: bike-cokery-casina-donut-field-farrow-mega-shine
ok? (y/n): y

Sending (->[1]63982)..
  89% |███████████████████████████████████     | [12s:1s]
File sent (2.6 MB/s)

Receiver:

$ croc
Enter receive code: cement-galaxy-alpha
Receiving file (4.4 MB) into: some-file-or-folder

Your public key: bike-cokery-casina-donut-field-farrow-mega-shine
Recipient public key: ecad-bakery-cup-unlit-roam-fetid-arulo-updike
ok? (y/n): y

Receiving (<-[1]63975)..
  97% |██████████████████████████████████████  | [13s:0s]
Received file written to some-file-or-folder (2.6 MB/s)

Note, by default, you don't need any arguments for receiving! This makes it possible for you to just double click the executable to run (nice for those of us that aren't computer wizards).

Using croc in pipes

You can easily use croc in pipes when you need to send data through stdin or get data from stdout.

Sender:

$ cat some_file_or_folder | croc

In this case croc will automatically use the stdin data and send and assign a filename like "croc-stdin-123456789".

Receiver:

$ croc --code code-phrase --yes --stdout | more

Here the reciever specified the code (--code) so it will not be prompted, and also specified --yes so the file will be automatically accepted. The output goes to stdout when flagged with --stdout.

Install

Download the latest release for your system.

Or, you can install Go and build from source with go get github.com/schollz/croc.

How does it work?

Protocol

croc is similar to magic-wormhole in spirit. Like magic-wormhole, croc generates a code phrase for you to share with your friend which allows secure end-to-end transferring of files and folders through a intermediary relay that connects the TCP ports between the two computers. The standard relay is on a public IP address (default ws://croc3.schollz.com), but before transmitting the file the two instances of croc send out UDP broadcasts to determine if they are both on the local network, and use a local relay instead of the cloud relay in the case that they are both local.

Run your own relay

croc relies on a TCP relay to staple the parallel incoming and outgoing connections. The relay temporarily stores connection information and the encrypted meta information. The default uses a public relay at, cowyo.com, which has a 30-day uptime of 99.989% (click here to check the current status of the public relay).

You can also run your own relay, it is very easy. On your server, your-server.com, just run

$ croc -relay

Now, when you use croc to send and receive you should add -server your-server.com to use your relay server. Make sure to open up TCP ports 27001-27009.

Contribute

I am awed by all the great contributions made! If you feel like contributing, in any way, by all means you can send an Issue, a PR, ask a question, or tweet me (@yakczar).

Protocol

  1. Sender requests new channel and receives empty channel from Relay, or obtains the channel they request (or an error if it is already occupied).
  2. Sender generates u using PAKE from secret pw.
  3. Sender sends u to Relay and the type of curve being used. Returns error if channel is already occupied by sender, otherwise it uses it.
  4. Sender communicates channel + secret pw to Recipient (human interaction).
  5. Recipient connects to channel and receives UUID.
  6. Recipient requests u from Relay using the channel. Returns error if it doesn't exist yet.
  7. Recipient generates v, session key k_B, and hashed session key H(k_B) using PAKE from secret pw.
  8. Recipient sends v, H(H(k_B)) to Relay.
  9. Sender requests v, H(H(k_B)) from Relay.
  10. Sender uses v to generate its session key k_A and H(k_A), and checks H(H(k_A))==H(H(k_B)). Sender aborts here if it is incorrect.
  11. Sender gives the Relay authentication H(k_A).
  12. Recipient requests H(k_A) from relay and checks against its own. If it doesn't match, then bail.
  13. Sender connects to Relay tcp ports and identifies itself using channel+UUID.
  14. Sender encrypts data with k.
  15. Recipient connects to Relay tcp ports and identifies itself using channel+UUID.
  16. Relay realizes it has both recipient and sender for the same channel so it staples their connections. Sets stapled to true.
  17. Sender asks Relay whether connections are stapled.
  18. Sender sends data over TCP.
  19. Recipient closes relay when finished. Anyone participating in the channel can close the relay at any time. Any of the routes except the first ones will return errors if stuff doesn't exist.

Conditions of state

The websocket implementation means that each client and relay follows their specific state machine conditions.

Sender

Initialize

  • Requests to join.

Does X not exist?

  • Generates X from pw.
  • Update relay with X.

Is Y and Bcrypt(k_B) available?

  • Use v to generate its session key k_A.
  • Check that Bcrypt(k_B) comes from k_A. Abort here if it is incorrect.
  • Encrypts data using k_A.
  • Connect to TCP ports of Relay.
  • Update relay with Bcrypt(k_A).

Are ports stapled?

  • Send data over TCP

Recipient

Initialize

  • Request to join

Is X available?

  • Generate v, session key k_B, and hashed session key H(k_B) using PAKE from secret pw.
  • Send the Relay Bcrypt(k_B)

Is Bcrypt(k_A) available?

  • Verify that Bcrypt(k_A) comes from k_B
  • Connect to TCP ports of Relay and listen.
  • Once file is received, Send close signal to Relay.

Relay

Is there a listener for sender and recipient?

  • Staple connections.
  • Send out to all parties that connections are stapled.

License

MIT

Acknowledgements

Thanks...