[gnutls-devel] GnuTLS | ClientHello extension permutation (#1465)

Read-only notification of GnuTLS library development activities gnutls-devel at lists.gnutls.org
Tue Feb 28 15:27:34 CET 2023

Michael Catanzaro created an issue: https://gitlab.com/gnutls/gnutls/-/issues/1465

Chrome and NSS have begun randomizing the order of TLS extensions in the ClientHello (except the pre_shared_key extension) to make fingerprinting harder. [This blog post](https://www.fastly.com/blog/a-first-look-at-chromes-tls-clienthello-permutation-in-the-wild) explains the scheme nicely. Would be nice for GnuTLS to do the same.

Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/-/issues/1465
You're receiving this email because of your account on gitlab.com.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20230228/57baae5e/attachment.html>

More information about the Gnutls-devel mailing list