status_request

TLS Extension Code: 5

Extension Details

Extension Name
status_request
Extension Code (Decimal)
5
Extension Code (Hex)
0x0005
RFC Reference

What is status_request?

The Certificate Status Request extension, also known as OCSP Stapling, allows the client to request that the server provide a time-stamped OCSP response during the TLS handshake. This eliminates the need for the client to contact the OCSP responder directly, improving privacy and performance. The server "staples" the OCSP response to the certificate chain, reducing latency and preventing OCSP responder overload. OCSP Stapling is particularly important for mobile and high-traffic websites. Defined in RFC 6066.

Role in JA3 Fingerprinting

How This Extension Affects Fingerprinting

The status_request extension is part of the TLS Client Hello packet that JA3 analyzes to create a unique fingerprint of your browser or HTTP client.

JA3 Construction: JA3 concatenates TLS parameters including extensions in a specific format:
TLS_VERSION,CIPHERS,EXTENSIONS,CURVES,POINT_FORMATS

Different browsers and HTTP clients support different sets of TLS extensions, making this a key differentiator in fingerprinting. The presence, absence, or order of extensions like status_request can reveal:

  • Browser type and version (Chrome, Firefox, Safari, Edge)
  • Operating system (Windows, macOS, Linux, Android, iOS)
  • HTTP library (curl, Python requests, Go http.Client, Node.js)
  • Bot detection - automated tools often have distinctive extension sets

Test Your TLS Configuration

See if your browser or HTTP client includes the status_request extension in its TLS handshake:

The JA3 tool will show all TLS extensions your client advertises, including status_request.

Browser & Client Support

Modern Browser Support:

  • Chrome/Edge: Full support for status_request
  • Firefox: Full support for status_request
  • Safari: Full support for status_request

HTTP Client Libraries:

  • curl: Support varies by OpenSSL/LibreSSL version
  • Python requests: Limited TLS extension control
  • curl_cffi: Can mimic browser TLS configurations
  • Scrapfly API: Automatically matches real browser TLS fingerprints

Technical References