From 5ceef16486f71e28440f80799183190543f162f0 Mon Sep 17 00:00:00 2001 From: Aldo Cortesi Date: Sun, 10 Mar 2013 17:09:40 +1300 Subject: Expand "How mitmproxy works". Clean up some un-needed sections. --- doc-src/howmitmproxy.html | 97 ++++++++++++++++++++++++++++------------------- 1 file changed, 57 insertions(+), 40 deletions(-) (limited to 'doc-src/howmitmproxy.html') diff --git a/doc-src/howmitmproxy.html b/doc-src/howmitmproxy.html index 94c895d7..a3335094 100644 --- a/doc-src/howmitmproxy.html +++ b/doc-src/howmitmproxy.html @@ -1,15 +1,11 @@ -TODO: - -- Clarify terminology: SSL vs TLS - - Mitmproxy is an enormously flexible tool. Knowing exactly how the proxying -process works will help you deploy it more creatively, and let you understand +process works will help you deploy it creatively, and allow you to understand its fundamental assumptions and how to work around them. This document explains -mitmproxy's proxy mechanism by example, starting with the simplest explicit -proxy configuration, and working up to the most complicated interaction - -transparent proxying of SSL-protected traffic in the presence of SNI. +mitmproxy's proxy mechanism in detail, starting with the simplest unencrypted +explicit proxying, and working up to the most complicated interaction - +transparent proxying of SSL-protected traffic[^ssl] in the presence of +[SNI](http://en.wikipedia.org/wiki/Server_Name_Indication).