From a9f6d53562b8020b87a8feaba2ac1d16d0d869ee Mon Sep 17 00:00:00 2001 From: Aldo Cortesi Date: Mon, 18 May 2015 12:05:29 +1200 Subject: certificate docs: reorg, wording, tweaks --- doc-src/transparent/linux.html | 4 ++-- doc-src/transparent/osx.html | 5 +---- 2 files changed, 3 insertions(+), 6 deletions(-) (limited to 'doc-src/transparent') diff --git a/doc-src/transparent/linux.html b/doc-src/transparent/linux.html index 7c01931d..d4b490c7 100644 --- a/doc-src/transparent/linux.html +++ b/doc-src/transparent/linux.html @@ -3,7 +3,7 @@ achieve transparent mode.
    -
  1. Install the mitmproxy +
  2. Install the mitmproxy certificates on the test device.
  3. Enable IP forwarding: @@ -31,7 +31,7 @@ achieve transparent mode.
    iptables -t nat -A PREROUTING -i eth0 -p tcp --dport 80 -j REDIRECT --to-port 8080
     iptables -t nat -A PREROUTING -i eth0 -p tcp --dport 443 -j REDIRECT --to-port 8080
    - +
  4. Fire up mitmproxy. You probably want a command like this: diff --git a/doc-src/transparent/osx.html b/doc-src/transparent/osx.html index c1ae823d..c8eb6c4e 100644 --- a/doc-src/transparent/osx.html +++ b/doc-src/transparent/osx.html @@ -7,7 +7,7 @@ OSX.
      -
    1. Install the mitmproxy +
    2. Install the mitmproxy certificates on the test device.
    3. Enable IP forwarding: @@ -76,6 +76,3 @@ want to intercept your OSX traffic, you should use an external host to run mitmproxy. None the less, pf is flexible to cater for a range of creative possibilities, like intercepting traffic emanating from VMs. See the **pf.conf** man page for more. - - - -- cgit v1.2.3