| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
| |
|
|
|
|
|
| |
This is on by default, which means we avoid compressed content unless the -z
flag is specified.
|
| |
|
|
|
|
| |
Make it match the behaviour of vim and mutt more closely
|
| |
|
|\ |
|
| |\
| | |
| | | |
cert-wait-time argument type specification fix.
|
| |/
| |
| |
| | |
proxy.py .
|
|/ |
|
|
|
|
|
| |
This fixes a bug that caused a traceback when de-serialized requests were
replayed. Also adds unit tests for the problem.
|
|
|
|
| |
Also make "m" keyboard shortcut available globally.
|
| |
|
|
|
|
|
| |
Also rename the display modes ("pretty" instead of "indent"), and expand the
built-in documentation.
|
|
|
|
|
|
| |
- Update CHANGELOG and CONTRIBUTORS
- Bump version
- Include Apple Gamecenter highscore setting tutorial in docs
|
|
|
|
|
|
|
|
|
| |
Since OpenSSL doesn't let us set certificate start times in the past, the
client and proxy machine time must be synchronized, or the client might reject
the certificate. We can bodgy over small discrepancies by waiting a few seconds
after a new certificate is generated (i.e. the first time an SSL domain is contacted).
Make this a configurable option, and turn it off by default.
|
|
|
|
|
|
|
|
|
|
| |
Two different strategies here:
- Use a simple heuristic to detect if we're looking at XML data when indent
mode is used. On non-XML data we can hang even on small documents.
- Only view partial data for large bodies. At the moment the cutoff is
100k. I might finetune this later.
|
| |
|
| |
|
|
|
|
| |
This lets us revert to the original request, even after replaying an edit.
|
|\
| |
| | |
Fix urwid version parsing error when it's something like 0.9.10-pre
|
|/ |
|
|
|
|
|
|
|
|
|
|
|
|
| |
- The OpenSSL x509 has no way to explicitly set the notBefore value on
certificates.
- If two systems have the same configured time, it's possible to return a
certificate before the validity start time has arrived.
- We "solve" this by waiting for one second when a certificate is first
generated before returning the cert. The alternative is to rewrite pretty much
all of our certificate generation, a thought too horrible to contemplate.
|
|\ |
|
| |
| |
| |
| |
| |
| |
| | |
loaded.
You can now use mitmdump to preview how these options work, by running mitmdump
against a set of saved flows, and viewing the output.
|
| |
| |
| |
| |
| |
| | |
This option reads a set of flows from a file. I've also regularized the
mitmdump and mitmproxy command-line signatures by removing mitmproxy's old way
of specifying flow loads through naked arguments.
|
| |
| |
| |
| |
| | |
We now simulate the normal connection flow when we load flows. That means
that we can run scripts, hooks, sticky cookies, etc.
|
|/
|
|
|
|
| |
This is to clarify that mitmproxy can be distributed with OpenSSL. It's unclear
whether this is really needed, but I've had at least one request for this, and
there's a precendent in other Open Source projects.
|
| |
|
|
|
|
| |
This is useful when you just want to inspect or process dumps.
|
|
|
|
|
| |
It's verbatim from the blog post at the moment - I might edit it a bit before
pushing it to mitmproxy.org.
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
| |
This allows us to replay an HTTP Authorization header, in the same way as we
replay cookies using stickycookies. This lets us conveniently get at HTTP Basic
Auth protected resources through the proxy, but is not enough to do the same
for HTTP Digest auth. We'll put that on the todo list.
|
|
|
|
| |
It matches user expectations much better to have new flows appended to the bottom.
|
|
|
|
| |
CONTRIBUTORS file.
|
| |
|
| |
|
| |
|
|
|
|
| |
Add screenshots and an explanation of interception.
|
|
|
|
|
|
| |
- Add IOS screenshots.
- Add drop-shadows to screenshots that need them.
- Optimise PNGs for size.
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
We now create three different files in the .mitmproxy directory when a dummy CA
is made:
mitmproxy-ca.pem - the CA, including private key
mitmproxy-ca-cert.p12 - A pkcs12 version of the certificate, for distribution to Windows.
mitmproxy-ca-cert.pem - A PEM version of the certificate, for distribution to everyone else.
|
|
|
|
|
|
| |
For some reason Satan's Operating System doesn't join up the certification path
if the key identifiers are set to hash. This took a few hours of trial and
error to figure out.
|
| |
|