-
Notifications
You must be signed in to change notification settings - Fork 907
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove JA3C/S fingerprints #2551
Labels
Comments
See for example https://suricon.net/wp-content/uploads/2024/12/SuriCon2024-Eric-Leblond_Google-killed-JA3-should-we-be-scared.pdf for an explanation why JA3C is no more useful |
The current idea is:
|
IvanNardi
added a commit
to IvanNardi/nDPI
that referenced
this issue
Dec 19, 2024
Show JA4C and JA3S information (instead of JA3C and JA3S) See ntop#2551 for context
IvanNardi
added a commit
that referenced
this issue
Jan 6, 2025
Show JA4C and JA3S information (instead of JA3C and JA3S) See #2551 for context
IvanNardi
added a commit
to IvanNardi/nDPI
that referenced
this issue
Jan 11, 2025
Removing JA3C is an big task. Let's start with a simple change having an huge impact on unit tests: remove printing of JA3C information from ndpiReader. This way, when we will delete the actual code, the unit tests diffs should be a lot simpler to look at. Note that the information if the client/server cipher is weak or obsolete is still available via flow risk See: ntop#2551
IvanNardi
added a commit
to IvanNardi/nDPI
that referenced
this issue
Jan 11, 2025
Removing JA3C is an big task. Let's start with a simple change having an huge impact on unit tests: remove printing of JA3C information from ndpiReader. This way, when we will delete the actual code, the unit tests diffs should be a lot simpler to look at. Note that the information if the client/server cipher is weak or obsolete is still available via flow risk See: ntop#2551
IvanNardi
added a commit
to IvanNardi/nDPI
that referenced
this issue
Jan 11, 2025
Removing JA3C is an big task. Let's start with a simple change having an huge impact on unit tests: remove printing of JA3C information from ndpiReader. This way, when we will delete the actual code, the unit tests diffs should be a lot simpler to look at. Note that the information if the client/server cipher is weak or obsolete is still available via flow risk See: ntop#2551
IvanNardi
added a commit
to IvanNardi/nDPI
that referenced
this issue
Jan 12, 2025
Removing JA3C is an big task. Let's start with a simple change having an huge impact on unit tests: remove printing of JA3C information from ndpiReader. This way, when we will delete the actual code, the unit tests diffs should be a lot simpler to look at. Note that the information if the client/server cipher is weak or obsolete is still available via flow risk See: ntop#2551
IvanNardi
added a commit
that referenced
this issue
Jan 12, 2025
Removing JA3C is an big task. Let's start with a simple change having an huge impact on unit tests: remove printing of JA3C information from ndpiReader. This way, when we will delete the actual code, the unit tests diffs should be a lot simpler to look at. Note that the information if the client/server cipher is weak or obsolete is still available via flow risk See: #2551
IvanNardi
added a commit
to IvanNardi/nDPI
that referenced
this issue
Jan 13, 2025
It might be usefull to be able to match traffic against a list of suspicious JA4C fingerprints Use the same code/logic/infrastructure used for JA3C (note that we are going to remove JA3C...) See: ntop#2551
IvanNardi
added a commit
to IvanNardi/nDPI
that referenced
this issue
Jan 13, 2025
It might be usefull to be able to match traffic against a list of suspicious JA4C fingerprints Use the same code/logic/infrastructure used for JA3C (note that we are going to remove JA3C...) See: ntop#2551
IvanNardi
added a commit
to IvanNardi/nDPI
that referenced
this issue
Jan 13, 2025
It might be usefull to be able to match traffic against a list of suspicious JA4C fingerprints Use the same code/logic/infrastructure used for JA3C (note that we are going to remove JA3C...) See: ntop#2551
IvanNardi
added a commit
to IvanNardi/nDPI
that referenced
this issue
Jan 13, 2025
It might be usefull to be able to match traffic against a list of suspicious JA4C fingerprints Use the same code/logic/infrastructure used for JA3C (note that we are going to remove JA3C...) See: ntop#2551
IvanNardi
added a commit
to IvanNardi/nDPI
that referenced
this issue
Jan 14, 2025
Last step of removing JA3C fingerprint Remove some duplicate tests: testing with ja4c/ja3s disabled is already performed by `disable_metadata_and_flowrisks` configuration. Close:ntop#2551
Merged
IvanNardi
added a commit
that referenced
this issue
Jan 14, 2025
Last step of removing JA3C fingerprint Remove some duplicate tests: testing with ja4c/ja3s disabled is already performed by `disable_metadata_and_flowrisks` configuration. Close:#2551
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Since we have support for the new fingerprint JA4, should we remove the oldest version?
The text was updated successfully, but these errors were encountered: