Anecdotally, I'm aware of similar reports where TLS fingerprinting is used as part of anti-bot efforts and various projects try to work around it, e.g. curl-impersonate <https://github.com/lwthiker/curl-impersonate>.

David Benjamin and I spoke about this at IETF 115 and felt that randomizing the order of client hello extensions (subject to the PSK coming last) was a natural solution. Compared to a fixed order, this ensures lazy middleboxes don't assume a particular extension is always in the same position and so cause breakage in a future version.

Chrome 110 releases to stable next week and has TLS Client Hello Extension Permutation <https://chromestatus.com/feature/5124606246518784> enabled by default. We have a patch <https://bugzilla.mozilla.org/show_bug.cgi?id=1789436> ready to go for this in Firefox as well, which we plan to land in the coming months.

There are still plenty of other fingerprinting vectors which this won't address of course, but it is one step along the way.

Best,
Dennis
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to