sleeyax / burp-awesome-tls

Burp extension to evade TLS fingerprinting. Bypass WAF, spoof any browser.
GNU General Public License v3.0
991 stars 66 forks source link

Awesome TLS error: create spec from client hello: FingerprintClientHello: unsupported extension 65037 #69

Closed s3nail1 closed 1 month ago

s3nail1 commented 1 month ago

Awesome TLS error: create spec from client hello: FingerprintClientHello: unsupported extension 65037

s3nail1 commented 1 month ago

Set the error message returned by hex client hello

sleeyax commented 1 month ago

Please provide more information to reproduce this issue or no one can help you.

s3nail1 commented 1 month ago

I access https://cloudflare.manfredi.io/ through Chrome and capture the Client Hello through wireshark. I copy its hex value to the Hex Client Hello of the plug-in. Then when I access it through BurpSuite, I will be shown the error message: Awesome TLS error. : create spec from client hello: FingerprintClientHello: unsupported extension 65037

sleeyax commented 1 month ago

Ah I see. Thanks for reporting.

65037 is the ECH extension. We probably just need to update UTLS to fix this issue because basic support has landed for that a while ago. In the meantime you should be able to omit the extension to still have a decent, although imperfect, TLS fingerprint.

s3nail1 commented 1 month ago

Oh, okay, thank you

sleeyax commented 1 month ago

This is resolved in https://github.com/sleeyax/burp-awesome-tls/releases/tag/v1.2.2.