logoalt Hacker News

CloakHQtoday at 10:30 AM4 repliesview on HN

one angle that hasn't come up here yet: ECH basically kills TLS fingerprinting as a bot detection signal

right now tools like Cloudflare Bot Management rely heavily on JA3/JA4 hashes - they fingerprint the ClientHello to identify scrapers vs real browsers. if the ClientHello is encrypted, that whole detection layer collapses. you can still do behavioral analysis and JS challenges, but the pre-HTTP layer that currently catches a huge chunk of naive bots - gone

curious how Cloudflare handles this internally given they're one of the biggest ECH adopters but also one of the biggest bot detection vendors. seems like they're eating their own lunch on this one, or they've already shifted their detection stack to not rely on it as much


Replies

jannesantoday at 10:35 AM

Cloudflare can and must decrypt the ClientHello for the sites it serves in order to actually serve the traffic. Using ECH with CF means you use their ECH domain and their keys.

jeroenhdtoday at 10:39 AM

If you control the domain you're fingerprinting clients on, you can decrypt the inner ClientHello and fingerprint on that.

If you're not in control of the domain you're fingerprinting, then ECH is working as intended.

I don't expect naive bots to implement ECH any time soon, though. If a bot can't be bothered to download curl-impersonate, they won't pass any ECH flags either.

show 1 reply
szmarczaktoday at 10:37 AM

It doesn't prevent fingerprinting, stop spreading misinformation. It only prevents your ISP from knowing what website you're connecting to.

show 3 replies
andrewmcwatterstoday at 2:57 PM

[dead]