▲ | VladVladikoff a day ago | ||||||||||||||||||||||||||||||||||
Wait a sec… if the TLS handshakes look different, would it be possible to have an nginx level filter for traffic that claims to be a web browser (eg chrome user agent), yet really is a python/php script? Because this would account for the vast majority of malicious bot traffic, and I would love to just block it. | |||||||||||||||||||||||||||||||||||
▲ | aaron42net a day ago | parent | next [-] | ||||||||||||||||||||||||||||||||||
Cloudflare uses JA3 and now JA4 TLS fingerprints, which are hashes of various TLS handshake parameters. https://github.com/FoxIO-LLC/ja4/blob/main/technical_details... has more details on how that works, and they do offer an Nginx module: https://github.com/FoxIO-LLC/ja4-nginx-module | |||||||||||||||||||||||||||||||||||
▲ | gruez a day ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||
That's basically what security vendors like cloudflare does, except with even more fingerprinting, like a javascript challenge that checks the js interpreter/DOM. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
▲ | jrochkind1 a day ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||
Well, I think that's what OP is meant to avoid you doing, exactly. | |||||||||||||||||||||||||||||||||||
▲ | immibis a day ago | parent | prev [-] | ||||||||||||||||||||||||||||||||||
Yes, and sites are doing this and it absolutely sucks because it's not reliable and blocks everyone who isn't using the latest Chrome on the latest Windows. Please don't whitelist TLS fingerprints unless you're actually under attack right now. | |||||||||||||||||||||||||||||||||||
|