AWS::WAFv2::WebACL JA3Fingerprint
Available for use with Amazon CloudFront distributions and Application Load Balancers. Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information.
Note
You can use this choice only with a string match ByteMatchStatement
with the PositionalConstraint
set to
EXACTLY
.
You can obtain the JA3 fingerprint for client requests from the web ACL logs. If AWS WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see Log fields in the AWS WAF Developer Guide.
Provide the JA3 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
Syntax
To declare this entity in your AWS CloudFormation template, use the following syntax:
JSON
{ "FallbackBehavior" :
String
}
YAML
FallbackBehavior:
String
Properties
FallbackBehavior
-
The match status to assign to the web request if the request doesn't have a JA3 fingerprint.
You can specify the following fallback behaviors:
-
MATCH
- Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request. -
NO_MATCH
- Treat the web request as not matching the rule statement.
Required: Yes
Type: String
Allowed values:
MATCH | NO_MATCH
Update requires: No interruption
-