Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | First draft of "How mitmproxy works", a complete guide to the mechanics of ↵ | Aldo Cortesi | 2013-01-03 | 2 | -19/+0 |
| | | | | the proxy process | ||||
* | Use PyOpenSSL and PyASN1 for certificate parsing. | Aldo Cortesi | 2012-03-01 | 2 | -20/+9 |
| | | | | | Yes, these are two more major dependencies for mitmproxy, but if we're going to do all the cool things I want to do with SSL certs, there is no other way. | ||||
* | Better certificate parsing. | Aldo Cortesi | 2012-02-27 | 2 | -1/+25 |
| | |||||
* | Add upstream certificate lookup. | Aldo Cortesi | 2012-02-27 | 1 | -0/+13 |
This initiates a connection to the server to obtain certificate information to generate interception certificates. At the moment, the information used is the Common Name, and the list of Subject Alternative Names. |