Giter Club home page Giter Club logo

proxhttpsproxymii's People

Contributors

mhavrlent avatar wheever avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar

proxhttpsproxymii's Issues

Certificates need updating

Reading https://www.prxbx.com/forums/showthread.php?tid=2191 I found there is updated package https://www.prxbx.com/forums/attachment.php?aid=1029 which among other changes also has the most recent cacert.pem files required for application to work properly. It is equal to the one that can be fetched with https://raw.githubusercontent.com/curl/curl/master/lib/mk-ca-bundle.pl which still needs http://cacerts.thawte.com/ThawteRSACA2018.crt at it is still not part of the package
Would You add those the repo for easier package deployment?

No Privoxy config in README.md

user.filter

CLIENT-HEADER-TAGGER: tagger4https
s@^.*Tagged:.*ProxHTTPSProxyMII.*FrontProxy.*$@$0@i

user.action

{ +client-header-tagger{tagger4https} }
/

{+forward-override{forward 127.0.0.1:8081}}
TAG:.*?ProxHTTPSProxyMII

SNI implementation

Hi there, your script works flawlessly on https sites. Kudos to you.
However, SNI is not implemented yet so it leads to many certificates error now. I'm curious if you will implement SNI eventually?
Thanks in advance!

Certificate revocation check

I used the Heinoganda build of ProxHTTPSProxyMII 1.5, and tested at https://revoked.badssl.com/ however the proxy loaded the site without any errors. When the proxy is disabled the web browser displays a warning message and blocks the site.

Please consider adding revocation checks to reduce the security impact of this proxy.

ProxHTTPSProxyMII transparent interception/ set socket option IP_TRANSPARENT

Does ProxHTTPSProxyMII support transparent proxy interception? If not, could this be added?

I've setup iptables using TPROXY like one would with Squid but ProxHTTPSProxyMII does not see traffic.

iptables-save -c shows that traffic is indeed intercepted and apparently sent to the port ProxHTTPSProxyMII is listening on (8079) but the console does not show it and the browser times out.

[825:80665] -A PREROUTING -p tcp -m socket -j DIVERT
[280:16800] -A PREROUTING -p tcp -m tcp --dport 443 -j TPROXY --on-port 8079 --on-ip 0.0.0.0 --tproxy-mark 0x1/0x1
[825:80665] -A DIVERT -j MARK --set-xmark 0x1/0xffffffff
[825:80665] -A DIVERT -j ACCEPT

Configuring the browser to talk HTTPS to ProxHTTPSProxyMII directly works as expected with Privoxy in the middle.

From: https://www.kernel.org/doc/Documentation/networking/tproxy.txt

Because of certain restrictions in the IPv4 routing output code you'll have to
modify your application to allow it to send datagrams _from_ non-local IP
addresses. All you have to do is enable the (SOL_IP, IP_TRANSPARENT) socket
option before calling bind:

fd = socket(AF_INET, SOCK_STREAM, 0);
/* - 8< -*/
int value = 1;
setsockopt(fd, SOL_IP, IP_TRANSPARENT, &value, sizeof(value));
/* - 8< -*/
name.sin_family = AF_INET;
name.sin_port = htons(0xCAFE);
name.sin_addr.s_addr = htonl(0xDEADBEEF);
bind(fd, &name, sizeof(name));

A trivial patch for netcat is available here:
http://people.netfilter.org/hidden/tproxy/netcat-ip_transparent-support.patch

Please see http://wiki.squid-cache.org/Features/Tproxy4
Here's a discussion about achieving it with Python via UDP tho - http://www.unknownerror.org/opensource/suin/iptables/q/stackoverflow/10038727/python-iptables-capturing-all-udp-packets-and-their-original-destination
Another example - https://github.com/micolous/tollgate/blob/master/tollgate/captive_landing/tproxy.py

Reduce RAM Usage

It would be nice if the RAM usage could be reduced to 20-30 MB.

Error with it and Yahoo, etc. on latest Firefox beta

Firefox 50 (Beta 4) shows [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:600) when trying to view Yahoo.com, etc. with the latest version of it and Proxomitron properly configured. How do I fix it?

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.