Describe the bug
InsecureSkipVerify doesnt really work on self-signed certificates
To Reproduce
Steps to reproduce the behavior:
package main
import (
"fmt"
"log"
"github.com/Noooste/azuretls-client"
)
func main() {
session := azuretls.NewSession()
session.InsecureSkipVerify = true
session.Browser = azuretls.Firefox // Automatic JA3 + HTTP/2 fingerprinting
err := session.SetProxy("socks4://104.37.135.145:4145")
if err != nil {
log.Fatal("FATAL ERROR:", err)
}
response, err := session.Do(&azuretls.Request{
Method: "GET",
Url: "https://expired.badssl.com/",
InsecureSkipVerify: true,
})
// tls "github.com/Noooste/utls"
// https://tls.peet.ws/api/all
if err != nil {
log.Fatal("REQ FAILED", err)
}
fmt.Println(response.Header["Content-Encoding"])
fmt.Println(response.StatusCode, string(response.Body))
}
Expected behavior
When using InsecureSkipVerify it is expected to work even if the desired URL has invalid certificate
What happens:
2025/09/21 15:54:02 Request error: failed to handshake: tls: invalid server key share
Describe the bug
InsecureSkipVerify doesnt really work on self-signed certificates
To Reproduce
Steps to reproduce the behavior:
Expected behavior
When using InsecureSkipVerify it is expected to work even if the desired URL has invalid certificate
What happens:
2025/09/21 15:54:02 Request error: failed to handshake: tls: invalid server key share