CDN-JA4 request header. The same signal is also used internally to strengthen DDoS mitigation, bot detection, and other security protections.
What is JA4?
JA4 is a modern TLS fingerprinting method that improves on earlier techniques such as JA3. While JA3 fingerprints TLS clients based on the raw TLS handshake values, JA4 introduces normalization and better handling of modern TLS features to produce more consistent and reliable fingerprints. The fingerprint is derived from the ClientHello message sent during the TLS handshake. This message advertises the cryptographic capabilities of the client and varies depending on the TLS library, operating system, and application making the connection. Key characteristics used in the fingerprint include:- TLS protocol version
- Cipher suites
- TLS extensions
- Supported elliptic curves
- Signature algorithms
- Application Layer Protocol Negotiation (ALPN)
How a JA4 fingerprint is formed
During the TLS handshake, the client sends a ClientHello message containing a structured list of supported cryptographic features. JA4 processes and normalizes this data to generate a compact fingerprint string that represents the TLS client implementation. The fingerprint incorporates multiple normalized components of the handshake, including:- TLS version
- Cipher suite ordering
- TLS extension set
- Supported elliptic curves
- Signature algorithm preferences
- ALPN protocol negotiation
Accessing the JA4 fingerprint
bunny.net forwards the computed JA4 fingerprint to your origin server via the following request header:- Identify automated traffic
- Detect suspicious clients
- Correlate requests across sessions
- Implement custom security or rate-limiting logic
Security and DDoS mitigation
JA4 fingerprints are also used internally by bunny.net as part of our security infrastructure. Because TLS fingerprints are significantly harder to spoof than IP addresses or User-Agent headers, they provide an additional signal for identifying malicious clients and coordinated bot activity. This signal contributes to multiple protection mechanisms, including:- DDoS mitigation
- Bot detection
- Abuse prevention
- Traffic anomaly detection
Best practices
When using JA4 fingerprints in your own systems:- Treat JA4 as one signal among many, not a unique identifier.
- Combine it with IP reputation, request patterns, and behavioral analysis.
- Monitor for unusual spikes or changes in fingerprint distribution.