aboutsummaryrefslogtreecommitdiffstats
path: root/docs
diff options
context:
space:
mode:
authorDavid Dworken <david@daviddworken.com>2015-11-06 21:23:10 -0500
committerDavid Dworken <david@daviddworken.com>2015-11-06 21:23:10 -0500
commit96465075f4a56a811cee28ec3da7e5c994f4fa5e (patch)
treed9559c4c6862459ccffc0e1815949983312d9aa8 /docs
parent58aeb2b843d47aad8e6b4a33f6b9ae46ffffcbfc (diff)
downloadmitmproxy-96465075f4a56a811cee28ec3da7e5c994f4fa5e.tar.gz
mitmproxy-96465075f4a56a811cee28ec3da7e5c994f4fa5e.tar.bz2
mitmproxy-96465075f4a56a811cee28ec3da7e5c994f4fa5e.zip
Added information on cert pinning (Fixes #689)
Diffstat (limited to 'docs')
-rw-r--r--docs/certinstall.rst10
1 files changed, 10 insertions, 0 deletions
diff --git a/docs/certinstall.rst b/docs/certinstall.rst
index 542c6dd2..2e041837 100644
--- a/docs/certinstall.rst
+++ b/docs/certinstall.rst
@@ -105,6 +105,16 @@ configure your testing system or browser to trust the mitmproxy CA as a
signing root authority. For security reasons, the mitmproxy CA is generated uniquely on the first
start and is not shared between mitmproxy installations on different devices.
+Some applications pin their SSL certificates in order to prevent MITM attacks.
+This means that **mitmproxy** and **mitmdump's** certificates will not be
+accepted by these applications. This is because when an application pins a
+certificate it requires that SSL traffic is encrypted with a specific
+certificate rather than any certificate that is signed by a trusted Certificate
+Authority (CA). In order to work around this, it is recommended to use the
+`Ignore Domains <http://docs.mitmproxy.org/en/stable/features/passthrough.html#ignore-domains>`_
+feature in order to prevent **mitmproxy** and **mitmdump** from intercepting
+traffic to these specific domains.
+
CA and cert files
-----------------