@support said in BrowserAutomationStudio 22.3.0 has been released:
@gudolik This issue is reproducible only on website that you working on and only with some types of proxies.
Please use MassTunneler, or project, which was sent to you by skype. Project uses Dante socks server with default settings.
I can't fix see an issue because I can't see any meaningful description or a way to reproduce it.
I can send you a huge list on websites which is not working again you did not check what write? Its existing issue on CURL, it is happening even without proxy,cURL has historically been flakey with SSL certificates. Dante socks works some time but mostly returns SSL read: error:00000000:lib(0):func(0):reason(0), errno 10054
@support said in BrowserAutomationStudio 22.3.0 has been released:
@gudolik If I'm not right, please attach curl command line, which works correct.
Cookies is active short term. And like in documentation says you should add --insecure or -k to bypass this TLS/SSL error on request , i did give 2 example screenshots to show you up.
But here you can try
curl "https://www.abercrombie.com/api/ecomm/a-uk/session?rememberMe=true" -H "authority: www.abercrombie.com" -H "accept: application/json, text/javascript, */*; q=0.01" -H "origin: https://www.abercrombie.com" -H "x-requested-with: XMLHttpRequest" -H "user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.79 Safari/537.36" -H "content-type: application/json" -H "sec-fetch-site: same-origin" -H "sec-fetch-mode: cors" -H "referer: https://www.abercrombie.com/shop/AccountRouterView?storeId=19658^&isUserLogin=true^&catalogId=11556^&langId=-1" -H "accept-encoding: gzip, deflate, br" -H "accept-language: bg,en-US;q=0.9,en;q=0.8,tr;q=0.7" -H "cookie: uPref=^%^7B^%^22brnd^%^22^%^3A^%^22anf^%^22^%^7D; languageFix=fr; af-minicart-19159=undefined; _abck=5B5D0628A29EA57DF00C024FC86C2994~0~YAAQlUISAknpKttuAQAAeGbG5wPQXNvcbqSs0bk0N0vxdo++Lj4Jsj7DJEdkuGs1cD2UIImCYduhkyqrkcS3vYeKe3nodzCxbcz7RI0v7Oiv80pjpsKvNS4677B98my2ZcVlnQY2v+GZ7bWkbtqT2P/ZaGLOoZX8sk26vgbqxFavjpr56Ul2EWQB0HQyeEHVlY+l1TrWvP7mAcT/OliRMwPezq22IE7QDvfynmbBvBFoa5eaVvFXbaFCeWpvEQVVOVWOxoFrNrurYbSHkbQL6GLLnWPfS3sdN15iCS1ZT+JTNzGr6iFvmlmwBLlxW4von/sNRKT9IZVF5osR~-1~-1~-1; userType=G; geoLocation=GB:EN:; af-minicart-19658=undefined; bm_sz=272DD01613470A0763EDBD7D9D68766A~YAAQRY9lX3xBlw9vAQAAS2DhHQbxKFM24LDYbvsgjeJYWAke56HvufxLyCYk62yT9rEwvmpxnJzS1kEBetVeKoabSLug9svhcfL9UI5H/HIdUtiz1VfIb3bg1nbnner+Aq6ZNjruKbZU/J3AOPzDEGI0GvMEfr3tuVgLxYvGtSvayKofspLTGjDP58gds7nNstl5Vuo=; dtCookie==3=srv=3=sn=32180D71BE32994E0486C8CD92C61D4D=perc=100000=ol=0=mul=1; ANF_AUTHENTICATION=1576754307426; ANFSession=196581576754307431; xSeg=c=BL-0; cf659858fe44f7b954e9749467f78c3b=d5d5f8e557026efa65ef5af46a57fbd4; ak_bmsc=304891A0859A25AF1FC27254CC91F5F15F658F45F2430000835CFB5DAB02F156~plnhWn9aLE+Zz3g1GhlKTSRoTC3im82msrbGk0+X074IgryNEnOct5pMhTJ7lXI3AlAevr1AcuwsFZ7s6G+bs5x+1HwpiCXiu63w/2kcywTexkL0lir39fg3Ci31XAUhM2FZvCM5WbmCmR8foHYpr4nsIoXukHJWep+o3xuZwYi6VvvmfegslHkzUUt2JFwuveEgK9uY63pu4k+g3xJZkA2A143q/aNwlUI36+zkPId44=; JSESSIONID=0000dwxNlAKdADzvwOp_j_zIfoh:-1; WC_SESSION_ESTABLISHED=true; WC_PERSISTENT=tbowUVANpp^%^2Bs08sO^%^2BEBWNUS^%^2B3WdBAmnuC4IFmPavx8s^%^3D^%^3B2019-12-19+06^%^3A18^%^3A30.805_1534516807021-281112_19159_892236114^%^2C-2^%^2CEUR^%^2C2019-12-14+22^%^3A11^%^3A36.951_19658_-1002^%^2C-1^%^2CGBP^%^2C2019-12-19+06^%^3A18^%^3A30.805_19658; WC_AUTHENTICATION_-1002=-1002^%^2CJdh5JVzqovGDGuZIS9A0yAc11LCiDPi1CWNOoTX^%^2B9xo^%^3D; WC_ACTIVEPOINTER=-1^%^2C19658; WC_USERACTIVITY_-1002=-1002^%^2C19658^%^2C0^%^2Cnull^%^2Cnull^%^2Cnull^%^2Cnull^%^2Cnull^%^2Cnull^%^2Cnull^%^2C412054666^%^2Cver_null^%^2CvoqoVPEf5GCGlnbS3B1YlIxidyfmkF6r2qpemC4LuQ137Zf9Bz2wHMB6^%^2BewsXfWQVG5uWvfw3Uji5HrwHZ^%^2FFHXVKGs3lFLM^%^2B3HEXavPEOAwkpUR9DVFq8w3Wrw81rLknPWzRdpp7yVH8sMWlD76UOGutGb33^%^2FrhiAUhUH4XFJB3lmXI263RMoFSsAigAftWXN0^%^2BganppH0tCi^%^2F5o88i2s45A9Wa1tl5ZxRRyU6nsZAs^%^3D; WC_ACTIVITYDATA_-1002=G^%^2C-1^%^2CGBP^%^2C11557^%^2C19470^%^2C-2000^%^2C1534516807021-281112^%^2C-1^%^2CGBP^%^2CEB3wyMIcfZaE1I2xmi2ycaYpzsiKLO3SnN61mOr^%^2BX5ejud6TJYRFxCY8WvNNh09DCEYr^%^2BjKe1J9PdQR0S6mgREb8WBlBACajb4goa0xmodv0OyY5TiE^%^2BLnvwjOvRkgDmgOLAOlnVEczqNpUJJzL6JMoSAGvUyIZQmfivbzhnojx3y9ZSofFzu6BTHWU4kR10KWCkF9AyqI2x3wQx^%^2BkPua1UqwW1UsOx9bM4XrPLLFL0^%^3D; bm_mi=ADD5C6D97E500A613468BE44CC2B7AE7~EREkhm6/w1HtxTVPucuVsv4y13UKhLaud5O8aAu4Lzh2RyB0pRwcyvre2bjh0Y9EmR2bxhaJNV5UxYtrt0FWdvgPk3XlKKyC8D6Ai9vlcoIbg2Oiz8Tumdxe+4QSi32E7KFb9T3N0Obc6LM2j4vACSM9khl3W3TeYBMDoqldWC+jHZ/Zw1fNNdSe9911hL+Jn2vrhy/lvjHcd9DhCxffyAW4afTc5hBZ7Gvi50jsqv6NPqNCWLelt27fKgvDIokL; bm_sv=D4A614967CDC1059E4F4B509EBA5E170~+pYGwgwOPVIogHp5mZsgYniVgM1hzuCK4575W8SyEtwMcGzPLrWhBwM50f+EiU53XgFZN3EIZQ/nO60PTMC0+2Eut/Lbkym0a6QnsryLGybvjxw0w639IDY3I4NaJxvZg+b97QEDwGCVWre8BxYlUCcUVLHRtK+nJ3aj8rqc79E=" --data-binary "^{^\^"logonId^\^":^\^"daeba^@abv.bg^\^",^\^"password^\^":^\^"dsadsa^\^"^}" --compressed
If cookies do not expire before u get ur hands on it. Would give same error without proxy
https://gyazo.com/8ffcf7cbbe26197fc122745162b28904
and if you add -k or --insecure like in the documentation says , must work
https://gyazo.com/9799aa19de384c060e94941314fa824b
libcurl performs peer SSL certificate verification by default. This is done by using a CA certificate store that the SSL library can use to make sure the peer's server certificate is valid.
If you communicate with HTTPS, FTPS or other TLS-using servers using certificates that are signed by CAs present in the store, you can be sure that the remote server really is the one it claims to be.
If the remote server uses a self-signed certificate, if you don't install a CA cert store, if the server uses a certificate signed by a CA that isn't included in the store you use or if the remote host is an impostor impersonating your favorite site, and you want to transfer files from this server, do one of the following:
Tell libcurl to not verify the peer. With libcurl you disable this with curl_easy_setopt(curl, CURLOPT_SSL_VERIFYPEER, FALSE);
With the curl command line tool, you disable this with -k/--insecure.
adding
CURLOPT_SSL_VERIFYHOST, 0
CURLOPT_SSL_VERIFYPEER, 0
is few seconds job, won't change anything for others or broke anything just will fix http proxy issue
@support said in BrowserAutomationStudio 22.3.0 has been released:
@gudolik Or any httpclient that works correctly with that website and that proxies.
Additional info i used https://github.com/csharp-leaf/Leaf.xNet this lib in C# for test and works good with these proxy and this website but its works because is not Curl doe :)