Open corford opened 1 year ago
@Equidem could you please take a look at the header orders and incorrect headers present together? That points to some issue in the generation code or the way we process the fingerprints we collect. Since we work with correct fingerprints, we should not get incorrect results.
The TLS is a bit tricky because Node.js does not allow the same level of configuration, but we can try to look again at this as well.
I guess @Equidem won't recognize his own code, I have basically rewritten the whole thing since it was forged in the ancient flames 😄
This is likely related to apify/got-scraping#65 (mentioning the same problems) and will be partially solved by #149, which introduces an automatic way of updating the header orders. As far as I can see, the only incorrect header is sec-fetch-site
, which does not identify the user - it says in what context the request was made (think CORS - same-site
, cross-site
...) Since got-scraping cannot execute client-side JS, the only valid value here is none
(user initiated request). This is not a problem with the collected data, but with our methodology - which is easy to fix in got-scraping
.
even arc or opera don't pass this check
I found some antibot detection based on http header orders. https://my.f5.com/manage/s/article/K13527565
Edge Chromium don't pass the check also.. 🙄
Describe the bug
Multiple header and TLS tests fail when visiting: https://botcheck.luminati.io/
To Reproduce
3.2.13
2.1.17
3.3.0
focal
Headers present on request (when emulating Chrome 110 Windows):
Response from botcheck:
Headers present on request (when emulating Firefox 110 Windows):
Response from botcheck:
Expected behaviour
All tests should pass (which is the case if you visit https://botcheck.luminati.io/ using a real Chrome 110 or Firefox 110 browser on Windows).
System information:
Additional context
Add any other context about the problem here.