SSL/TLS Client Test
This page displays your web browser's SSL/TLS capabilities, including supported TLS protocols, cipher suites, extensions, and key exchange groups. It highlights any weak or insecure options and generates a TLS fingerprint in JA3 format. Additionally, it tests how your browser handles insecure mixed content requests.
JavaScript Disabled. You can see the full TLS ClientHello and your fingerprints using this endpoint: https://tls.browserleaks.com/.
Your Web Browser | |
HTTP User-Agent | Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com) |
Protocol Support | |
TLS 1.3 | |
TLS 1.2 | |
TLS 1.1 | |
TLS 1.0 |
Mixed Content Test | |
Active Content | |
Passive Content |
TLS Fingerprint | |
JA4 |
|
JA4_r | |
JA4_o | |
JA4_ro | |
JA3 Hash | |
JA3 Fingerprint | |
JA3n Hash | |
JA3n Fingerprint |
Handshake |
|
TLS Protocol | TLS 1.3 [HTTP/2] |
Cipher Suite | 0x1302 TLS_AES_256_GCM_SHA384 Recommended TLS 1.3 |
Key Exchange | 0x001d X25519 |
Supported Cipher Suites (in order as received) | |
Cipher Suites | 0x1302 TLS_AES_256_GCM_SHA384 Recommended TLS 1.3 |
0x1301 TLS_AES_128_GCM_SHA256 Recommended TLS 1.3 | |
0x1303 TLS_CHACHA20_POLY1305_SHA256 Recommended TLS 1.3 | |
0xc02c TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Recommended TLS 1.2 | |
0xc02b TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Recommended TLS 1.2 | |
0xcca9 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Recommended TLS 1.2 | |
0xc030 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Recommended TLS 1.2 | |
0xc02f TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Recommended TLS 1.2 | |
0xcca8 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Recommended TLS 1.2 | |
0x00ff TLS_EMPTY_RENEGOTIATION_INFO_SCSV EXTENSION |
Supported TLS Extensions (in order as received) | |
TLS Extensions |