Index | Thread | Search

From:
Kirill A. Korinsky <kirill@korins.ky>
Subject:
Re: mitmproxy and debug message in console
To:
LWS <mediomen27@gmail.com>
Cc:
Theo Buehler <tb@theobuehler.org>, ports@openbsd.org
Date:
Tue, 06 May 2025 08:58:47 +0200

Download raw body.

Thread
  • Kirill A. Korinsky:

    mitmproxy and debug message in console

  • On Tue, 06 May 2025 01:27:11 +0200,
    LWS <mediomen27@gmail.com> wrote:
    > 
    > So it is an openbsd decision although it is not clear to me if it is a
    > security
    > design decision or rather a standards adherence decision, since it seems to
    > me
    > that the software that implements this feature does it outside the
    > standards.
    > My idea was to pass my traffic to mitmproxy and then forward it to
    > suricata..
    > but it seems that mitmproxy does not support pcap. So I thought of
    > exporting the key
    > and then using wireshark to decrypt the traffic and then pass it to
    > suricata.
    > But this path is also not viable.
    > 
    
    I use mitmproxy to investigate traffic from my phone. I just installed its
    certificate on phone and use WG server to connect to it.
    
    -- 
    wbr, Kirill
    
    
  • Kirill A. Korinsky:

    mitmproxy and debug message in console