Skip to content

Commit ff681e9

Browse files
committed
Rename the package, to begin expanding functionality
1 parent d9e6a4c commit ff681e9

File tree

2 files changed

+8
-8
lines changed

2 files changed

+8
-8
lines changed

README.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
1-
# Read-TLS-Fingerprint [![Build Status](https://github.com/httptoolkit/read-tls-fingerprint/workflows/CI/badge.svg)](https://github.com/httptoolkit/read-tls-fingerprint/actions) [![Available on NPM](https://img.shields.io/npm/v/read-tls-fingerprint.svg)](https://npmjs.com/package/read-tls-fingerprint)
1+
# Read-TLS-Client-Hello [![Build Status](https://github.com/httptoolkit/read-tls-client-hello/workflows/CI/badge.svg)](https://github.com/httptoolkit/read-tls-client-hello/actions) [![Available on NPM](https://img.shields.io/npm/v/read-tls-client-hello.svg)](https://npmjs.com/package/read-tls-client-hello)
22

33
> _Part of [HTTP Toolkit](https://httptoolkit.tech): powerful tools for building, testing & debugging HTTP(S)_
44
5-
A pure-JS module to read TLS fingerprints from an incoming socket connection. Tiny, with zero runtime dependencies.
5+
A pure-JS module to read TLS client hello data and calculate TLS fingerprints from an incoming socket connection. Tiny, with zero runtime dependencies.
66

7-
Using this, you can recognize certain TLS clients - e.g. specific browser, cURL, or even the specific versions of a specific programming language a client is using - regardless of the content of the request they send.
7+
Using this, you can analyze incoming TLS connections before you start a full handshake, and using their fingerprints you can recognize certain TLS clients - e.g. specific browser, cURL, or even the specific versions of a specific programming language a client is using - regardless of the content of the request they send.
88

9-
See https://httptoolkit.com/blog/tls-fingerprinting-node-js/#how-does-tls-fingerprinting-work for more background on how TLS fingerprinting works.
9+
See https://httptoolkit.com/blog/tls-client-helloing-node-js/#how-does-tls-client-helloing-work for more background on how TLS fingerprinting works.
1010

11-
Be aware that this is _not_ a 100% reliable test. Most clients can modify their TLS fingerprint with a bit of work (though few do). In many cases, it's even possible to mimic another arbitrary fingerprint on demand (e.g. using libraries like [CycleTLS](https://www.npmjs.com/package/cycletls)). Most of the time though, for clients that aren't actively messing with you, the fingerprint will tell you what kind of client is making the connection.
11+
Be aware that fingerprinting is _not_ a 100% reliable test. Most clients can modify their TLS fingerprint with a bit of work (though few do). In many cases, it's even possible to mimic another arbitrary fingerprint on demand (e.g. using libraries like [CycleTLS](https://www.npmjs.com/package/cycletls)). Most of the time though, for clients that aren't actively messing with you, the fingerprint will tell you what kind of client is making the connection.
1212

1313
## Docs
1414

package.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
2-
"name": "read-tls-fingerprint",
2+
"name": "read-tls-client-hello",
33
"version": "1.0.0",
44
"author": "Tim Perry <[email protected]>",
55
"description": "A pure-JS module to read TLS fingerprints from an incoming socket connection",
@@ -28,12 +28,12 @@
2828
"licenses": [
2929
{
3030
"type": "Apache-2.0",
31-
"url": "http://github.com/httptoolkit/read-tls-fingerprint/raw/main/LICENSE"
31+
"url": "http://github.com/httptoolkit/read-tls-client-hello/raw/main/LICENSE"
3232
}
3333
],
3434
"repository": {
3535
"type": "git",
36-
"url": "http://github.com/httptoolkit/read-tls-fingerprint.git"
36+
"url": "http://github.com/httptoolkit/read-tls-client-hello.git"
3737
},
3838
"dependencies": {
3939
"@types/node": "*"

0 commit comments

Comments
 (0)