←back to thread

545 points mmh0000 | 2 comments | | HN request time: 0.613s | source
Show context
VladVladikoff ◴[] No.43573068[source]

Wait a sec… if the TLS handshakes look different, would it be possible to have an nginx level filter for traffic that claims to be a web browser (eg chrome user agent), yet really is a python/php script? Because this would account for the vast majority of malicious bot traffic, and I would love to just block it.

replies(4): >>43573098 #>>43573360 #>>43574581 #>>43574731 #
1. aaron42net ◴[] No.43573360[source]

Cloudflare uses JA3 and now JA4 TLS fingerprints, which are hashes of various TLS handshake parameters. https://github.com/FoxIO-LLC/ja4/blob/main/technical_details... has more details on how that works, and they do offer an Nginx module: https://github.com/FoxIO-LLC/ja4-nginx-module

replies(1): >>43616591 #
2. VladVladikoff ◴[] No.43616591[source]

Thank you for sharing this, it is exactly what I was looking for!