Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support TLS ClientHello randomization #286

Open
ehsandeep opened this issue Jun 17, 2023 · 2 comments
Open

Support TLS ClientHello randomization #286

ehsandeep opened this issue Jun 17, 2023 · 2 comments
Labels
Type: Enhancement Most issues will probably ask for additions or changes.

Comments

@ehsandeep
Copy link
Member

Please describe your feature request:

   -tlsi, -tls-impersonate  enable experimental client hello (ja3) tls randomization

See below for the implementation

Describe the use case of this feature:

To avoid detection/blocking from Cloudflare and Akamai based on JA3 fingerprint.

@ehsandeep ehsandeep added the Type: Enhancement Most issues will probably ask for additions or changes. label Jun 17, 2023
@Mzack9999
Copy link
Member

tlsx requires more investigation as ClientHello randomization might conflict with a lot of custom tls settings provided via CLI. Ideally we should only randomize the parts not set via CLI by the user

@APT-ZERO
Copy link

Why only randomization? why not to support the browsers supported by utls and having option to select a random browser and a random version of it?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Type: Enhancement Most issues will probably ask for additions or changes.
Projects
None yet
Development

No branches or pull requests

3 participants