We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Describe the bug The aead_id seems to be randomized between ChaCha20Poly1305 and AES-128-GCM when with chrome and edge it should ONLY be AES-128-GCM .
To Reproduce Steps to reproduce the behavior:
session := azuretls.NewSession() session.InsecureSkipVerify = true session.Browser = azuretls.Chrome session.GetClientHelloSpec = azuretls.GetLastChromeVersion
Make a request to https://tls.browserleaks.com/ with the session created.
Expected behavior I expected the aead_id to only be AES-128-GCM rather than a mix between ChaCha20Poly1305 and AES-128-GCM
Screenshots
Desktop (please complete the following information):
The text was updated successfully, but these errors were encountered:
Hello, thank you for this report! This problem will be corrected as soon as possible!
Sorry, something went wrong.
Successfully merging a pull request may close this issue.
Describe the bug
The aead_id seems to be randomized between ChaCha20Poly1305 and AES-128-GCM when with chrome and edge it should ONLY be AES-128-GCM .
To Reproduce
Steps to reproduce the behavior:
Make a request to https://tls.browserleaks.com/ with the session created.
Expected behavior
I expected the aead_id to only be AES-128-GCM rather than a mix between ChaCha20Poly1305 and AES-128-GCM
Screenshots
Desktop (please complete the following information):
The text was updated successfully, but these errors were encountered: