mirror of
https://github.com/snail007/goproxy.git
synced 2026-04-26 16:05:55 +03:00
[GH-ISSUE #586] TLS Fingerprint #473
Labels
No labels
TODO
bug
duplicate
enhancement
good first issue
help wanted
helpful
invalid
need-confirm
pull-request
question
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/goproxy#473
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @GunGunGun on GitHub (Oct 5, 2025).
Original GitHub issue: https://github.com/snail007/goproxy/issues/586
Currently TLS Fingerprint is widely implemented on most serverside, which makes using MITM proxy ways harder than before, do we have any counter measure for this problem, currently uTLS is being used to bypass them, pretty much perfect solution without any downside.
@snail007 commented on GitHub (Oct 8, 2025):
The TLS handshake is between the client and the target server. Goproxy is just a pure forwarding at the TCP level and does not analyze or modify TLS communication. The TLS fingerprint you mentioned is also determined by the client.