diff options
| author | kira0204 <rshtmudgal@gmail.com> | 2018-02-24 23:47:55 +0530 | 
|---|---|---|
| committer | kira0204 <rshtmudgal@gmail.com> | 2018-02-24 23:47:55 +0530 | 
| commit | f31ce49aa59558b354e6524d5370eb36f055c876 (patch) | |
| tree | eb546826683a1803e469da24982b0b2283c6e00a /docs/src | |
| parent | eee109117f956600261bc938be52040d1474a97f (diff) | |
| download | mitmproxy-f31ce49aa59558b354e6524d5370eb36f055c876.tar.gz mitmproxy-f31ce49aa59558b354e6524d5370eb36f055c876.tar.bz2 mitmproxy-f31ce49aa59558b354e6524d5370eb36f055c876.zip | |
Fixing #2913
Diffstat (limited to 'docs/src')
| -rw-r--r-- | docs/src/content/concepts-modes.md | 8 | 
1 files changed, 4 insertions, 4 deletions
| diff --git a/docs/src/content/concepts-modes.md b/docs/src/content/concepts-modes.md index 86bb7b0f..7a0b835a 100644 --- a/docs/src/content/concepts-modes.md +++ b/docs/src/content/concepts-modes.md @@ -157,20 +157,20 @@ There are various use-cases:      example.com domain and get all requests recorded in mitmproxy.  - Say you have some toy project that should get SSL support. Simply set up      mitmproxy as a reverse proxy on port 443 and you're done (`mitmdump -p 443 -    -R http://localhost:80/`). Mitmproxy auto-detects TLS traffic and intercepts +    --mode reverse:http://localhost:80/`). Mitmproxy auto-detects TLS traffic and intercepts      it dynamically. There are better tools for this specific task, but mitmproxy      is very quick and simple way to set up an SSL-speaking server.  - Want to add a non-SSL-capable compression proxy in front of your server? You -    could even spawn a mitmproxy instance that terminates SSL (`-R http://...`), +    could even spawn a mitmproxy instance that terminates SSL (`--mode reverse:http://...`),      point it to the compression proxy and let the compression proxy point to a -    SSL-initiating mitmproxy (`-R https://...`), which then points to the real +    SSL-initiating mitmproxy (`--mode reverse:https://...`), which then points to the real      server. As you see, it's a fairly flexible thing.  ### Host Header  In reverse proxy mode, mitmproxy automatically rewrites the Host header to match  the upstream server. This allows mitmproxy to easily connect to existing -endpoints on the open web (e.g. `mitmproxy -R https://example.com`). You can +endpoints on the open web (e.g. `mitmproxy --mode reverse:https://example.com`). You can  disable this behaviour with the `keep_host_header` option.  However, keep in mind that absolute URLs within the returned document or HTTP | 
