Note that no server_name extension is sent. The ciphersuite list is defined [https://github.com/goagent/goagent/blob/6287469afd3b84fb1a4dda69a33d26108e7246a6/local/proxy.py#L802 here], but it doesn't seem to be used unless the [https://github.com/goagent/goagent/blob/6287469afd3b84fb1a4dda69a33d26108e7246a6/local/proxy.py#L871 obfuscate option is set]. If obfuscate is set, it randomly throws out half the ciphers in expectation. Weird stuff: TLSv1.1 (most everything else is either TLSv1.0 or TLSv1.2), large list of supported elliptic curves.
{{{
Secure Sockets Layer
TLSv1.1 Record Layer: Handshake Protocol: Client Hello
Content Type: Handshake (22)
Version: TLS 1.0 (0x0301)
Length: 204
Handshake Protocol: Client Hello
Handshake Type: Client Hello (1)
Length: 200
Version: TLS 1.1 (0x0302)
Random
gmt_unix_time: Feb 28, 2014 14:53:49.000000000 PST
With attachment:Don-t-prohibit-name-lookups-with-socks_remote_dns-tr.patch:ticket:11183. Seems to differ from Iceweasel only in the "SessionTicket TLS" extension (see #4099).
{{{
Secure Sockets Layer
SSL Record Layer: Handshake Protocol: Client Hello
== [https://gitweb.torproject.org/user/dcf/tor-browser-bundle.git/tag/74106067ae570daedfa9252903d97e32eae4becf Tor Browser 3.5.2.1-meek-4]
Uses a separate browser instance to run the extension as suggested in comment:12:ticket:11183. It matches Iceweasel 24. The only difference is in the client randomness.
== [https://blog.torproject.org/blog/tor-browser-364-and-40-alpha-1-are-released Tor Browser 4.0-alpha-1] with `security.tls.version.max=1` (2014-08-15)
Limiting SSL version to TLSv1.0.
{{{
Secure Sockets Layer
SSL Record Layer: Handshake Protocol: Client Hello
== [https://blog.torproject.org/blog/tor-browser-60a5-released Tor Browser 6.0a5] (based on Firefox 45 ESR) with meek-client on Debian stretch/sid (2016-05-20)
{{{
Secure Sockets Layer
TLSv1.2 Record Layer: Handshake Protocol: Client Hello
Content Type: Handshake (22)
Version: TLS 1.0 (0x0301)
Length: 187
Handshake Protocol: Client Hello
Handshake Type: Client Hello (1)
Length: 183
Version: TLS 1.2 (0x0303)
Random
GMT Unix Time: Mar 10, 2094 14:10:31.000000000 PST
Random Bytes: 77ef56686f7f9a68867ade6d9c036db5832e2a7ed5aacab2...