aboutsummaryrefslogtreecommitdiffstats
path: root/libmproxy/proxy/server.py
diff options
context:
space:
mode:
authoriroiro123 <user1@cygwin>2015-06-21 00:51:56 +0900
committeriroiro123 <user1@cygwin>2015-06-21 00:51:56 +0900
commitfd903673299c050b7b4137aabf6b9265df3d6233 (patch)
tree8fed9804822066a6251fd6f1e3b1d9e4bf2c81f6 /libmproxy/proxy/server.py
parent378aa783243cf23d84a39d02dde5420beadc188b (diff)
downloadmitmproxy-fd903673299c050b7b4137aabf6b9265df3d6233.tar.gz
mitmproxy-fd903673299c050b7b4137aabf6b9265df3d6233.tar.bz2
mitmproxy-fd903673299c050b7b4137aabf6b9265df3d6233.zip
SSL Spoof mode
Diffstat (limited to 'libmproxy/proxy/server.py')
-rw-r--r--libmproxy/proxy/server.py19
1 files changed, 19 insertions, 0 deletions
diff --git a/libmproxy/proxy/server.py b/libmproxy/proxy/server.py
index e1587df1..df890f7c 100644
--- a/libmproxy/proxy/server.py
+++ b/libmproxy/proxy/server.py
@@ -117,6 +117,20 @@ class ConnectionHandler:
self.server_conn.address(),
"info")
self.conntype = "tcp"
+
+ elif not self.server_conn and self.config.mode == "sslspoof":
+ port = self.config.mode.sslport
+ self.set_server_address(("-", port))
+ self.establish_ssl(client=True)
+ host = self.client_conn.connection.get_servername()
+ if host is None:
+ raise ProxyError(
+ 400,
+ "Invalid request: No host information"
+ )
+ self.set_server_address((host, port))
+ self.establish_server_connection()
+ self.establish_ssl(server=True, sni=host)
# Delegate handling to the protocol handler
protocol_handler(
@@ -308,6 +322,9 @@ class ConnectionHandler:
host = upstream_cert.cn.decode("utf8").encode("idna")
if self.server_conn.sni:
sans.append(self.server_conn.sni)
+ # for ssl spoof mode
+ if hasattr(self.client_conn, "sni"):
+ sans.append(self.client_conn.sni)
ret = self.config.certstore.get_cert(host, sans)
if not ret:
@@ -325,6 +342,8 @@ class ConnectionHandler:
if not sn:
return
sni = sn.decode("utf8").encode("idna")
+ # for ssl spoof mode
+ self.client_conn.sni = sni
if sni != self.server_conn.sni:
self.log("SNI received: %s" % sni, "debug")