Open Aron148814 opened 5 months ago
I don't have an iOS device to test this myself at the moment so I would happily accept a PR for this feature!
I fixed It by modifying some code in h2_bundle In oohttp also the same for WINDOW_UPDATE Frame.
Can you submit a pr to my fork?
Yea I will do It in couple of days and this Is what I added in the transport.go file.
I'll look forward to you PR, I can't comment on a screenshot.
Do you know anything about the Priority flag In the HEADERS Frame? Because I get priority flag on real device (no burp) and It only happens on the site "tls.peet.ws/api/all" not on browserleaks or browserscan. Its not that important because it doesn't change the HTTP/2 Fingerprint but Its still weird.
@Aron148814 have you figured it out by now? I would still be happy to accept a PR for your changes if you can.
@sleeyax Yeah sorry Im kinda been busy this last month but I will try this month for sure.
Any news @Aron148814 ?
@sleeyax You didn't saw my pull request on your forked oohttp repository?
O.o
No... My bad let me check and review in a moment.
Upon reflection, it appears this issue will soon become obsolete. I appreciate your contributions, but in the forthcoming version 2 of Awesome TLS, we will transition away from oohttp
. Instead, we will integrate a different library, better suited for customizing network fingerprints specifically and maintained more diligently. Consequently, it is likely that this issue will be resolved automatically upon the release of the next version.
Will there be support for iOS? Because iOS devices only use MaxConcurrentStreams and InitialWindowSize.