diff options
author | Maximilian Hils <git@maximilianhils.com> | 2014-10-18 18:29:35 +0200 |
---|---|---|
committer | Maximilian Hils <git@maximilianhils.com> | 2014-10-18 18:29:35 +0200 |
commit | e1148584380058f264b7aa7e9493115e4e8f2bbe (patch) | |
tree | d90acc5576e36808a1dea9907fe0b92130c45292 /doc-src/features/passthrough.html | |
parent | 52b29d49264e1397db6c65ee773479391b3fd37a (diff) | |
download | mitmproxy-e1148584380058f264b7aa7e9493115e4e8f2bbe.tar.gz mitmproxy-e1148584380058f264b7aa7e9493115e4e8f2bbe.tar.bz2 mitmproxy-e1148584380058f264b7aa7e9493115e4e8f2bbe.zip |
add generic tcp proxying, fix #374
Diffstat (limited to 'doc-src/features/passthrough.html')
-rw-r--r-- | doc-src/features/passthrough.html | 12 |
1 files changed, 8 insertions, 4 deletions
diff --git a/doc-src/features/passthrough.html b/doc-src/features/passthrough.html index 039d6b58..7c830639 100644 --- a/doc-src/features/passthrough.html +++ b/doc-src/features/passthrough.html @@ -1,13 +1,12 @@ -There are a couple of reasons why you may want to exempt some traffic from mitmproxy's interception mechanism: +There are two main reasons why you may want to exempt some traffic from mitmproxy's interception mechanism: - **Certificate pinning:** Some traffic is is protected using [certificate pinning](https://security.stackexchange.com/questions/29988/what-is-certificate-pinning) and mitmproxy's interception leads to errors. For example, Windows Update or the Apple App Store fail to work if mitmproxy is active. -- **Non-HTTP traffic:** WebSockets or other non-http protocols are not supported by mitmproxy yet. You can exempt the - domain from processing, which would otherwise fail. - **Convenience:** You really don't care about some parts of the traffic and just want them to go away. -If you want to ignore traffic from mitmproxy's processing because of large response bodies, check out the +If you want to peek into (SSL-protected) non-HTTP connections, check out the [tcp proxy](@!urlTo("tcpproxy.html")!@) feature. +If you want to ignore traffic from mitmproxy's processing because of large response bodies, take a look at the [response streaming](@!urlTo("responsestreaming.html")!@) feature. ## How it works @@ -74,4 +73,9 @@ Here are some other examples for ignore patterns: --ignore 17\.178\.\d+\.\d+:443 </pre> +### See Also + +- [TCP Proxy](@!urlTo("tcpproxy.html")!@) +- [Response Streaming](@!urlTo("responsestreaming.html")!@) + [^explicithttp]: This stems from an limitation of explicit HTTP proxying: A single connection can be re-used for multiple target domains - a <code>GET http://example.com/</code> request may be followed by a <code>GET http://evil.com/</code> request on the same connection. If we start to ignore the connection after the first request, we would miss the relevant second one.
\ No newline at end of file |