Skip to content

Issue: TLS Proxy Handshake Weaknesses (Lack of PQC, Overkill Cipher Suite, and Legacy TLS Support) #2308

@yahhlif

Description

@yahhlif

When Reqable’s HTTPS recording/MITM is active, the TLS handshake performed by the proxy engine is less optimized and less secure compared to a direct browser connection. Specifically:

Key Exchange: It lacks Post-Quantum Cryptography (PQC) support (falling back to x25519 instead of X25519MLKEM786).

Cipher Suite: It uses AES_256_GCM_SHA384 which is overkill/resource-heavy compared to the browser's default AES_128_GCM_SHA256.

Legacy Protocols: It still enables TLS 1.0, which is deprecated and considered weak.

Steps to reproduce the behavior:

Open Reqable and start to Record and Ensure HTTPS recording/intercepting is ON.

Open a browser (Chrome/Edge) and navigate to https://browserleaks.com/tls.

Observe the "Protocol Support", "Cipher Suite", and "Key Exchange" sections.

Turn off Reqable and refresh the page to see the difference.

Expected behavior The Reqable proxy engine should ideally mirror modern browser TLS capabilities:

Support for hybrid PQC key exchange (X25519MLKEM786).

Use TLS_AES_128_GCM_SHA256 by default for better performance/standardization.

Disable TLS 1.0 and TLS 1.1 by default to follow modern security best practices.

Information

Platform: Android & Windows

OS: Android 10 / Windows 11

Arch: x86-64 (Windows) / ARM64 (Android)

App Version: 3.0.31

Image

Image

Metadata

Metadata

Assignees

Labels

bugSomething isn't working

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions