JA3 Fingerprint Plugin¶
Description¶
The JA3 fingerprint plugin calculates JA3 fingerprints for incoming SSL traffic. “JA3” is a method for creating SSL/TLS client fingerprints by concatenating values in the TLS Client Hello and hashing the result using MD5 to produce a 32 character fingerprint. A particular instance of malware tends to use the same encryption code/client, which makes it an effective way to detect malicious clients even when superficial details are modified. More info about JA3 is available here.
The calculated JA3 fingerprints are then appended to upstream request in the field X-JA3-Sig
(to be processed at upstream). If multiple duplicates exist for the field name, it will append to the last
occurrence; if none exists, it will add such a field to the headers. The signatures can also be logged locally.
Plugin Configuration¶
ja3_fingerprint
can be used as a global/remap plugin and is configured via plugin.config
or remap.config
.
- --ja3raw¶
This option cause the plugin to append the field
X-JA3-Raw
to proxy request. The field value is the raw JA3 fingerprint.By default this is not enabled.
- --ja3log¶
This option enables logging to the file
ja3_fingerprint.log
in the standard logging directory. The format is[time] [client IP] [JA3 string] [JA3 hash]
By default this is not enabled.
- --modify-incoming¶
As described above, typically, the
X-JA3-Sig
header is added to the request as it is sent upstream so that any upstream hosts can make use of it. The--modify-incoming
option instructs the plugin to add theX-JA3-Sig
header field earlier on the incoming request so that other plugins can make use of it while processing the request. To be precise,--modify-incoming
adds theX-JA3-Sig
header field in theTS_HTTP_READ_REQUEST_HDR_HOOK
hook rather than the defaultTS_HTTP_SEND_REQUEST_HDR_HOOK
hook.This option is only useful when the plugin is configured as a global plugin. By default this is not enabled.
- --preserve¶
There may be situations in a network where there are multiple proxies handling the same requests. In these situations, each proxy may be configured to add ja* header fields. By default, Traffic Server will append the
;
separated signature values to the already existing header fields characteristic of the client-side connection for the given proxy in the chain. However, it may be that only the signatures for the proxy closest to the client are interesting for fingerprinting and no other signatures are desired to be appended to the fields. In these situations, this option causes the plugin to inspect the request to see whether the ja header field already exists, and, if so, no further signatures are added to the field value.By default this is not enabled.
Requirement¶
This requires OpenSSL 1.0.1, 1.0.2, or OpenSSL 1.1.1 or later. OpenSSL 1.1.0 will not work due to API changes with regard to opaque structures.
There is a potential issue with very old TLS clients which can cause a crash in the plugin. This is due to a bug in OpenSSL which should be fixed in a future release.