Skip to content

InsecureSkipVerify doesnt work, at least with proxy usage. #399

@plzcloseyoureyes

Description

@plzcloseyoureyes

Describe the bug
InsecureSkipVerify doesnt really work on self-signed certificates

To Reproduce
Steps to reproduce the behavior:

package main

import (
	"fmt"
	"log"

	"github.com/Noooste/azuretls-client"
)

func main() {
	session := azuretls.NewSession()
	session.InsecureSkipVerify = true
	session.Browser = azuretls.Firefox // Automatic JA3 + HTTP/2 fingerprinting

	err := session.SetProxy("socks4://104.37.135.145:4145")
	if err != nil {
		log.Fatal("FATAL ERROR:", err)
	}

	response, err := session.Do(&azuretls.Request{
		Method:             "GET",
		Url:                "https://expired.badssl.com/",
		InsecureSkipVerify: true,
	})
	// tls "github.com/Noooste/utls"
	// https://tls.peet.ws/api/all
	if err != nil {
		log.Fatal("REQ FAILED", err)
	}
	fmt.Println(response.Header["Content-Encoding"])
	fmt.Println(response.StatusCode, string(response.Body))
}

Expected behavior
When using InsecureSkipVerify it is expected to work even if the desired URL has invalid certificate

What happens:

2025/09/21 15:54:02 Request error: failed to handshake: tls: invalid server key share

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions