[gnutls-devel] GnuTLS | ClientHello extension permutation (#1465)
Read-only notification of GnuTLS library development activities
gnutls-devel at lists.gnutls.org
Tue Feb 28 15:27:34 CET 2023
Michael Catanzaro created an issue: https://gitlab.com/gnutls/gnutls/-/issues/1465
Chrome and NSS have begun randomizing the order of TLS extensions in the ClientHello (except the pre_shared_key extension) to make fingerprinting harder. [This blog post](https://www.fastly.com/blog/a-first-look-at-chromes-tls-clienthello-permutation-in-the-wild) explains the scheme nicely. Would be nice for GnuTLS to do the same.
--
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/-/issues/1465
You're receiving this email because of your account on gitlab.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20230228/57baae5e/attachment.html>
More information about the Gnutls-devel
mailing list