2017-08-17 08:18:05 +00:00
|
|
|
.. _tcp_proxy:
|
2015-09-06 01:20:58 +00:00
|
|
|
|
2017-08-17 08:18:05 +00:00
|
|
|
TCP Proxy / Fallback
|
|
|
|
====================
|
2015-09-06 01:20:58 +00:00
|
|
|
|
2016-11-21 21:54:47 +00:00
|
|
|
In case mitmproxy does not handle a specific protocol, you can exempt
|
2015-09-06 01:20:58 +00:00
|
|
|
hostnames from processing, so that mitmproxy acts as a generic TCP forwarder.
|
|
|
|
This feature is closely related to the :ref:`passthrough` functionality,
|
|
|
|
but differs in two important aspects:
|
|
|
|
|
|
|
|
- The raw TCP messages are printed to the event log.
|
|
|
|
- SSL connections will be intercepted.
|
|
|
|
|
|
|
|
Please note that message interception or modification are not possible yet.
|
|
|
|
If you are not interested in the raw TCP messages, you should use the ignore domains feature.
|
|
|
|
|
|
|
|
How it works
|
|
|
|
------------
|
|
|
|
|
|
|
|
================== ======================
|
2016-06-07 02:08:46 +00:00
|
|
|
command-line ``--tcp HOST``
|
2017-03-07 05:15:29 +00:00
|
|
|
mitmproxy shortcut :kbd:`O` then :kbd:`T`
|
2015-09-06 01:20:58 +00:00
|
|
|
================== ======================
|
|
|
|
|
2015-09-07 08:52:18 +00:00
|
|
|
For a detailed description how the hostname pattern works, please look at the :ref:`passthrough`
|
|
|
|
feature.
|
2015-09-06 01:20:58 +00:00
|
|
|
|
|
|
|
.. seealso::
|
|
|
|
|
|
|
|
- :ref:`passthrough`
|
2017-07-04 08:49:49 +00:00
|
|
|
- :ref:`streaming`
|