-
Notifications
You must be signed in to change notification settings - Fork 164
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Certain JA3 tokens appear to be failing #39
Comments
Good catch, thanks for the info. This Ja3 token is actually raising a stack overflow error in Golang causing the failure that appears. The library should not be raising CPU usage from just the import. I believe this may be cause by the fact that Golang isn't installed but I'll investigate this. |
Follow up: it appears that the issue lies with the |
Thanks for looking into this! As for the CPU usage, it looks like I can reliably reproduce this even on my CentOS servers where a single vCPU blasts off to 100% ( |
@Danny-Dasilva - I can confirm the CPU temp/load is resolved with the latest update, 0.0.12 shows the increase in temps and load, but 0.0.13 is completely fine, so thanks for that. I did notice that the following JA3 fingerprint is failing, but the one given in the example is now OK.
I'll run some tests to see how this update does. |
Thanks for the comment, I actually just pointed my browser to https://ja3er.com/form, which tells me that my JA3 string right now is:
Using this it fails (most likely due to what you mentioned, 11 and 11). I then tried to use this in the JA3 argument but that just fails. My current user agent is |
|
What would be the best way to say find my browser's fingerprint? It's a bit odd as sometimes it's giving:
And other times:
Basically adding the following at the end: I'm trying to see if I can successfully spoof my browser fingerprint in my JS code, but using Chrome that's giving issues at least. Firefox worked without issues. |
I was experimenting with JA3 string I found online, and some of them are still causing different types of bugs/errors. Error (same problem as in #42):
caused by:
An other error:
caused by:
Again, as I just found these online while searching for strings other than my own browsers, so is it possible that all of these are just "invalid" strings for some reason, but I can not verify this right now. |
To the point of gracefully exiting as of 0.0.14 we should be returning a message of Lines 84 to 86 in 473bed8
CycleTLS/cycletls/roundtripper.go Lines 247 to 254 in 473bed8
|
Makes sense, this CycleTLS/cycletls/roundtripper.go Line 270 in 473bed8
Just checked using wireshark and tls 1.0 is being sent on the initial handshake. Plugin link in case you want to test yourself. |
|
Closing this as I don't think there is much relevant in this to justify keeping it open. |
Actual behavior A clear and concise description of what the bug is.
I apologize if this is related to #14 - I wasn't sure.
I'm getting an error when using the following JA3 token:
The error looks like a spam similar to the following:
Expected behavior A clear and concise description of what you expected to
happen.
No error is raised and the JA3 token is parsed & spoofed successfully
To Reproduce Steps to reproduce the behavior
Additional Information
I also want to mention that in addition to the above this library seems to strain my CPU (5950X) quite a lot for some reason.
Uncommenting the
initCycleTLS()
bumps my CPU from 50c to 75c, I'm not sure if this is because of the Golang process it spawns, but it does seem excessive?mytls
library does not appear to have this issue, CPU remains the same, no additional load.Example:
The text was updated successfully, but these errors were encountered: