diff options
author | Aldo Cortesi <aldo@corte.si> | 2017-03-14 13:02:58 +1300 |
---|---|---|
committer | GitHub <noreply@github.com> | 2017-03-14 13:02:58 +1300 |
commit | 124a6c9e5af44121208c3362215cc3ea895ffad7 (patch) | |
tree | 8c8f24f119aae9b22832bfa0e6b5c0a397133d17 /examples/complex/dns_spoofing.py | |
parent | ee65894d40f5a9f73125a8d3e73ba50540939e5b (diff) | |
parent | 1b301ad5bbe5765b608bf4f8480720065d3343c8 (diff) | |
download | mitmproxy-124a6c9e5af44121208c3362215cc3ea895ffad7.tar.gz mitmproxy-124a6c9e5af44121208c3362215cc3ea895ffad7.tar.bz2 mitmproxy-124a6c9e5af44121208c3362215cc3ea895ffad7.zip |
Merge pull request #2129 from cortesi/addonopts
Custom options for addons
Diffstat (limited to 'examples/complex/dns_spoofing.py')
-rw-r--r-- | examples/complex/dns_spoofing.py | 17 |
1 files changed, 9 insertions, 8 deletions
diff --git a/examples/complex/dns_spoofing.py b/examples/complex/dns_spoofing.py index 2fd6b699..ca2bcd35 100644 --- a/examples/complex/dns_spoofing.py +++ b/examples/complex/dns_spoofing.py @@ -1,11 +1,12 @@ """ -This script makes it possible to use mitmproxy in scenarios where IP spoofing has been used to redirect -connections to mitmproxy. The way this works is that we rely on either the TLS Server Name Indication (SNI) or the -Host header of the HTTP request. -Of course, this is not foolproof - if an HTTPS connection comes without SNI, we don't -know the actual target and cannot construct a certificate that looks valid. -Similarly, if there's no Host header or a spoofed Host header, we're out of luck as well. -Using transparent mode is the better option most of the time. +This script makes it possible to use mitmproxy in scenarios where IP spoofing +has been used to redirect connections to mitmproxy. The way this works is that +we rely on either the TLS Server Name Indication (SNI) or the Host header of the +HTTP request. Of course, this is not foolproof - if an HTTPS connection comes +without SNI, we don't know the actual target and cannot construct a certificate +that looks valid. Similarly, if there's no Host header or a spoofed Host header, +we're out of luck as well. Using transparent mode is the better option most of +the time. Usage: mitmproxy @@ -53,5 +54,5 @@ class Rerouter: flow.request.port = port -def start(): +def start(opts): return Rerouter() |