aboutsummaryrefslogtreecommitdiffstats
path: root/web/src/css/app.less
blob: 046d378a16492a98f6628f6456cd74a7d217de25 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
// www.paulirish.com/2012/box-sizing-border-box-ftw/
html {
    box-sizing: border-box;
}

*, *:before, *:after {
    box-sizing: inherit;
}

@import (less) "sprites.less";
@import (less) "layout.less";
@import (less) "tabs.less";
@import (less) "header.less";
@import (less) "flowtable.less";
@import (less) "flowdetail.less";
@import (less) "flowview.less";
@import (less) "prompt.less";
@import (less) "eventlog.less";
@import (less) "footer.less";
hr> 2. **Configure DHCP and DNS** We use dnsmasq to provide DHCP and DNS in our internal network. Dnsmasq is a lightweight server designed to provide DNS (and optionally DHCP and TFTP) services to a small-scale network. - Before we get to that, we need to fix some Ubuntu quirks: **Ubuntu >12.04** runs an internal dnsmasq instance (listening on loopback only) by default <a href="https://www.stgraber.org/2012/02/24/dns-in-ubuntu-12-04/">[1]</a>. For our use case, this needs to be disabled by changing <br>`dns=dnsmasq` to `#dns=dnsmasq` in */etc/NetworkManager/NetworkManager.conf* and running `sudo restart network-manager` afterwards. - Now, dnsmasq can be be installed and configured: `sudo apt-get install dnsmasq` Replace */etc/dnsmasq.conf* with the following configuration: <pre>\# Listen for DNS requests on the internal network interface=eth1 \# Act as a DHCP server, assign IP addresses to clients dhcp-range=192.168.3.10,192.168.3.100,96h \# Broadcast gateway and dns server information dhcp-option=option:router,192.168.3.1 dhcp-option=option:dns-server,192.168.3.1 </pre> Apply changes: `sudo service dnsmasq restart` <hr> Your proxied machine's network settings should now look similar to this: <img src="@!urlTo('tutorials/transparent-dhcp/step2_proxied_vm.png')!@"/> <hr> 3. **Set up traffic redirection to mitmproxy** To redirect traffic to mitmproxy, we need to add two iptables rules: <pre class="terminal"> iptables -t nat -A PREROUTING -i eth1 -p tcp --dport 80 \ -j REDIRECT --to-port 8080 iptables -t nat -A PREROUTING -i eth1 -p tcp --dport 443 \ -j REDIRECT --to-port 8080 </pre> 4. If required, <a href="@!urlTo('ssl.html')!@">install the mitmproxy certificates on the test device</a>. 5. Finally, we can run <code>mitmproxy -T</code>. The proxied machine cannot to leak any data outside of HTTP or DNS requests.