TLS Client Hello Mirror
This service presents your browser's TLS Client Hello message in multiple formats. It can be used directly or in CI tests to check for TLS privacy pitfalls (session resumption, fingerprinting, system time exposure) and security shortcomings (deprecated TLS versions, weak cipher suites, missing features, etc).
API endpoints
Connection
- TLS version: TLS 1.3
- Cipher suite: TLS_AES_128_GCM_SHA256
- TLS session resumed: false
If you haven't already, refresh the page to check if your browser supports session resumption.
Supported features
- Signed certificate timestamps: true
- OCSP stapling: true
Supported TLS/SSL versions
- TLS 1.3
- TLS 1.2
Cipher suites
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (not recommended)
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (not recommended)
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (not recommended)
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (not recommended)
Extensions
- server_name
- ec_point_formats
- renegotiation_info
- extended_master_secret
- signed_certificate_timestamp
- status_request
- supported_groups
- signature_algorithms
- signature_algorithms_cert
- supported_versions
- key_share
Supported groups
- x25519
- secp256r1
- secp384r1
- secp521r1
Signature algorithms
- rsa_pss_rsae_sha256
- ecdsa_secp256r1_sha256
- ed25519
- rsa_pss_rsae_sha384
- rsa_pss_rsae_sha512
- rsa_pkcs1_sha256
- rsa_pkcs1_sha384
- rsa_pkcs1_sha512
- ecdsa_secp384r1_sha384
- ecdsa_secp521r1_sha512
- rsa_pkcs1_sha1 (not recommended)
- ecdsa_sha1 (not recommended)
TLS fingerprint
- JA3: 771,49195-49199-49196-49200-52393-52392-49161-49171-49162-49172-4865-4866-4867,0-11-65281-23-18-5-10-13-50-43-51,29-23-24-25,0
- JA3 MD5: 6aa3e70ad597aeef07e78d50366922c1
- NJA3v1: 769,771,49195-49199-49196-49200-52393-52392-49161-49171-49162-49172-4865-4866-4867,5-10-11-13-18-23-43-50-51-65281,29-23-24-25,0,772-771,2052-1027-2055-2053-2054-1025-1281-1537-1283-1539-513-515,,
- NJA3v1 SHA256/128: a102cadf3cc848ec2e624e3a93beec69
Parameters in the Client Hello message differ between clients, enabling servers and on-path observers to detect what browser you are likely using (down to its version, or a range of versions) by deriving its fingerprint from said parameters. Worse, if you change any TLS-related settings, your TLS fingerprint becomes specific to a much smaller group of users, possibly even to you alone.
JA3 is a simple and popular type of TLS fingerprint. NJA3 is a similar style of fingerprint which aims to improve the robustness and accuracy of JA3.
TLS Fingerprinting with JA3 and JA3S
_____________________