TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Show HN: TLS client configuration test (TLS Client Hello Mirror)

1 pointsby nervuriover 1 year ago
Hi folks,<p>I wrote a server which presents your browser&#x27;s TLS Client Hello message in multiple formats. It can be used directly or in CI tests to check for TLS privacy pitfalls (session resumption, fingerprinting, system time exposure) and security shortcomings (deprecated TLS versions, weak cipher suites, missing features, etc). It supports HTTPS and Gemini, is written in Go and is free&#x2F;libre software.<p>My main motivation for making this was my interest in the privacy pitfalls of TLS, primarily session resumption (session identifiers can be used much like tracking cookies) and TLS fingerprinting. Also, I wanted there to be an online service that provided the full Client Hello message as JSON.<p>I hope some of you will find it useful. The code is available here:<p><a href="https:&#x2F;&#x2F;tildegit.org&#x2F;nervuri&#x2F;client-hello-mirror" rel="nofollow noreferrer">https:&#x2F;&#x2F;tildegit.org&#x2F;nervuri&#x2F;client-hello-mirror</a><p>Its development led to some unexpected places, such as finding a CVE-worthy flaw in Go&#x27;s TLS library and thinking up a new version of JA3. I posted the development story here:<p><a href="https:&#x2F;&#x2F;nervuri.net&#x2F;client-hello-mirror" rel="nofollow noreferrer">https:&#x2F;&#x2F;nervuri.net&#x2F;client-hello-mirror</a>

no comments

no comments