aboutsummaryrefslogtreecommitdiffstats
path: root/examples/complex/dns_spoofing.py
diff options
context:
space:
mode:
authorAldo Cortesi <aldo@corte.si>2017-03-14 13:02:58 +1300
committerGitHub <noreply@github.com>2017-03-14 13:02:58 +1300
commit124a6c9e5af44121208c3362215cc3ea895ffad7 (patch)
tree8c8f24f119aae9b22832bfa0e6b5c0a397133d17 /examples/complex/dns_spoofing.py
parentee65894d40f5a9f73125a8d3e73ba50540939e5b (diff)
parent1b301ad5bbe5765b608bf4f8480720065d3343c8 (diff)
downloadmitmproxy-124a6c9e5af44121208c3362215cc3ea895ffad7.tar.gz
mitmproxy-124a6c9e5af44121208c3362215cc3ea895ffad7.tar.bz2
mitmproxy-124a6c9e5af44121208c3362215cc3ea895ffad7.zip
Merge pull request #2129 from cortesi/addonopts
Custom options for addons
Diffstat (limited to 'examples/complex/dns_spoofing.py')
-rw-r--r--examples/complex/dns_spoofing.py17
1 files changed, 9 insertions, 8 deletions
diff --git a/examples/complex/dns_spoofing.py b/examples/complex/dns_spoofing.py
index 2fd6b699..ca2bcd35 100644
--- a/examples/complex/dns_spoofing.py
+++ b/examples/complex/dns_spoofing.py
@@ -1,11 +1,12 @@
"""
-This script makes it possible to use mitmproxy in scenarios where IP spoofing has been used to redirect
-connections to mitmproxy. The way this works is that we rely on either the TLS Server Name Indication (SNI) or the
-Host header of the HTTP request.
-Of course, this is not foolproof - if an HTTPS connection comes without SNI, we don't
-know the actual target and cannot construct a certificate that looks valid.
-Similarly, if there's no Host header or a spoofed Host header, we're out of luck as well.
-Using transparent mode is the better option most of the time.
+This script makes it possible to use mitmproxy in scenarios where IP spoofing
+has been used to redirect connections to mitmproxy. The way this works is that
+we rely on either the TLS Server Name Indication (SNI) or the Host header of the
+HTTP request. Of course, this is not foolproof - if an HTTPS connection comes
+without SNI, we don't know the actual target and cannot construct a certificate
+that looks valid. Similarly, if there's no Host header or a spoofed Host header,
+we're out of luck as well. Using transparent mode is the better option most of
+the time.
Usage:
mitmproxy
@@ -53,5 +54,5 @@ class Rerouter:
flow.request.port = port
-def start():
+def start(opts):
return Rerouter()