mirror of
https://github.com/Grasscutters/mitmproxy.git
synced 2024-11-27 02:24:18 +00:00
Removes all of the platform specific certificate installation instructions.
This commit is contained in:
parent
40c242c3f6
commit
968d94d471
@ -31,13 +31,6 @@
|
|||||||
<li class="nav-header">Installing Certificates</li>
|
<li class="nav-header">Installing Certificates</li>
|
||||||
$!nav("ssl.html", this, state)!$
|
$!nav("ssl.html", this, state)!$
|
||||||
$!nav("certinstall/webapp.html", this, state)!$
|
$!nav("certinstall/webapp.html", this, state)!$
|
||||||
$!nav("certinstall/android.html", this, state)!$
|
|
||||||
$!nav("certinstall/firefox.html", this, state)!$
|
|
||||||
$!nav("certinstall/ios.html", this, state)!$
|
|
||||||
$!nav("certinstall/ios-simulator.html", this, state)!$
|
|
||||||
$!nav("certinstall/java.html", this, state)!$
|
|
||||||
$!nav("certinstall/osx.html", this, state)!$
|
|
||||||
$!nav("certinstall/windows7.html", this, state)!$
|
|
||||||
|
|
||||||
<li class="nav-header">Transparent Proxying</li>
|
<li class="nav-header">Transparent Proxying</li>
|
||||||
$!nav("transparent.html", this, state)!$
|
$!nav("transparent.html", this, state)!$
|
||||||
|
Binary file not shown.
Before Width: | Height: | Size: 56 KiB |
Binary file not shown.
Before Width: | Height: | Size: 74 KiB |
Binary file not shown.
Before Width: | Height: | Size: 46 KiB |
Binary file not shown.
Before Width: | Height: | Size: 22 KiB |
@ -1,53 +0,0 @@
|
|||||||
The proxy situation on Android is [an
|
|
||||||
embarrasment](http://code.google.com/p/android/issues/detail?id=1273). It's
|
|
||||||
scarcely credible, but Android didn't have a global proxy setting at all until
|
|
||||||
quite recently, and it's still not supported on many common Android versions.
|
|
||||||
In the meantime the app ecosystem has grown used to life without this basic
|
|
||||||
necessity, and many apps merrily ignore it even if it's there. This situation
|
|
||||||
is improving, but in many circumstances using [transparent
|
|
||||||
mode](@!urlTo("transparent.html")!@) is mandatory for testing Android apps.
|
|
||||||
|
|
||||||
We used both an Asus Transformer Prime TF201 (Android 4.0.3) and a Nexus 4
|
|
||||||
(Android 4.4.4) in the examples below - your device may differ, but the broad
|
|
||||||
process should be similar. On **emulated devices**, there are some [additional
|
|
||||||
quirks](https://github.com/mitmproxy/mitmproxy/issues/204#issuecomment-32837093)
|
|
||||||
to consider.
|
|
||||||
|
|
||||||
|
|
||||||
## Getting the certificate onto the device
|
|
||||||
|
|
||||||
The easiest way to get the certificate to the device is to use [the web
|
|
||||||
app](@!urlTo("webapp.html")!@). In the rare cases where the web app doesn't
|
|
||||||
work, you will need to get the __mitmproxy-ca-cert.cer__ file into the
|
|
||||||
__/sdcard__ folder on the device (/sdcard/Download on older devices). This can
|
|
||||||
be accomplished in a number of ways:
|
|
||||||
|
|
||||||
- If you have the Android Developer Tools installed, you can use [__adb
|
|
||||||
push__](http://developer.android.com/tools/help/adb.html).
|
|
||||||
- Using a file transfer program like wget (installed on the Android device) to
|
|
||||||
copy the file over.
|
|
||||||
- Transfer the file using external media like an SD Card.
|
|
||||||
|
|
||||||
Once we have the certificate on the local disk, we need to import it into the
|
|
||||||
list of trusted CAs. Go to Settings -> Security -> Credential Storage,
|
|
||||||
and select "Install from storage":
|
|
||||||
|
|
||||||
<img src="android-settingssecuritymenu.png"/>
|
|
||||||
|
|
||||||
The certificate in /sdcard is automatically located and offered for
|
|
||||||
installation. Installing the cert will delete the download file from the local
|
|
||||||
disk.
|
|
||||||
|
|
||||||
|
|
||||||
## Installing the certificate
|
|
||||||
|
|
||||||
You should now see something like this (you may have to explicitly name the
|
|
||||||
certificate):
|
|
||||||
|
|
||||||
<img src="android-settingssecurityinstallca.png"/>
|
|
||||||
|
|
||||||
Click OK, and you should then see the certificate listed in the Trusted
|
|
||||||
Credentials store:
|
|
||||||
|
|
||||||
<img src="android-settingssecurityuserinstalledca.png"/>
|
|
||||||
|
|
@ -1,31 +0,0 @@
|
|||||||
## Get the certificate to the browser
|
|
||||||
|
|
||||||
The easiest way to get the certificate to the browser is to use [the web
|
|
||||||
app](@!urlTo("webapp.html")!@). If this fails, do the following:
|
|
||||||
|
|
||||||
|
|
||||||
<ol class="tlist">
|
|
||||||
<li> If needed, copy the ~/.mitmproxy/mitmproxy-ca-cert.pem file to the target. </li>
|
|
||||||
|
|
||||||
<li>Open preferences, click on "Advanced", then select"Certificates":
|
|
||||||
<img src="@!urlTo('firefox3.jpg')!@"/>
|
|
||||||
</li>
|
|
||||||
|
|
||||||
<li> Click "View Certificates", "Import", and select the certificate file:
|
|
||||||
<img src="@!urlTo('firefox3-import.jpg')!@"/>
|
|
||||||
</li>
|
|
||||||
|
|
||||||
</ol>
|
|
||||||
|
|
||||||
|
|
||||||
## Installing the certificate
|
|
||||||
|
|
||||||
<ol class="tlist">
|
|
||||||
<li>Tick "Trust this CA to identify web sites", and click "Ok":
|
|
||||||
<img src="@!urlTo('firefox3-trust.jpg')!@"/>
|
|
||||||
</li>
|
|
||||||
|
|
||||||
<li> You should now see the mitmproxy certificate listed in the Authorities
|
|
||||||
tab.</li>
|
|
||||||
</ol>
|
|
||||||
|
|
@ -2,12 +2,5 @@ from countershape import Page
|
|||||||
|
|
||||||
pages = [
|
pages = [
|
||||||
Page("webapp.html", "Using the Web App"),
|
Page("webapp.html", "Using the Web App"),
|
||||||
Page("firefox.html", "Firefox"),
|
|
||||||
Page("osx.html", "OSX"),
|
|
||||||
Page("windows7.html", "Windows 7"),
|
|
||||||
Page("ios.html", "IOS"),
|
|
||||||
Page("ios-simulator.html", "IOS Simulator"),
|
|
||||||
Page("android.html", "Android"),
|
|
||||||
Page("java.html", "Java"),
|
|
||||||
Page("mitm.it-error.html", "Error: No proxy configured"),
|
Page("mitm.it-error.html", "Error: No proxy configured"),
|
||||||
]
|
]
|
||||||
|
@ -1,23 +0,0 @@
|
|||||||
|
|
||||||
How to install the __mitmproxy__ certificate authority in the IOS simulator:
|
|
||||||
|
|
||||||
<ol class="tlist">
|
|
||||||
|
|
||||||
<li> First, check out the <a
|
|
||||||
href="https://github.com/ADVTOOLS/ADVTrustStore">ADVTrustStore</a> tool
|
|
||||||
from github.</li>
|
|
||||||
|
|
||||||
<li> Now, run the following command:
|
|
||||||
|
|
||||||
<pre class="terminal">./iosCertTrustManager.py -a ~/.mitmproxy/mitmproxy-ca-cert.pem</pre>
|
|
||||||
|
|
||||||
</li>
|
|
||||||
|
|
||||||
</ol>
|
|
||||||
|
|
||||||
|
|
||||||
Note that although the IOS simulator has its own certificate store, it shares
|
|
||||||
the proxy settings of the host operating system. You will therefore to have
|
|
||||||
configure your OSX host's proxy settings to use the mitmproxy instance you want
|
|
||||||
to test with.
|
|
||||||
|
|
@ -1,27 +0,0 @@
|
|||||||
|
|
||||||
## Getting the certificate onto the device
|
|
||||||
|
|
||||||
The easiest way to get the certificate to the device is to use [the web
|
|
||||||
app](@!urlTo("webapp.html")!@). In the rare cases where the web app doesn't
|
|
||||||
work, you will need to get the __mitmproxy-ca-cert.pem__ file to the device to
|
|
||||||
install it. The easiest way to accomplish this is to set up the Mail app on the
|
|
||||||
device, and to email it over as an attachment. Open the email, tap on the
|
|
||||||
attachment, then proceed with the install.
|
|
||||||
|
|
||||||
|
|
||||||
## Installing the certificate
|
|
||||||
|
|
||||||
<ol class="tlist">
|
|
||||||
<li>You will be prompted to install a profile. Click "Install":
|
|
||||||
|
|
||||||
<img src="@!urlTo('ios-profile.png')!@"/></li>
|
|
||||||
|
|
||||||
<li>Accept the warning by clicking "Install" again:
|
|
||||||
|
|
||||||
<img src="@!urlTo('ios-warning.png')!@"/></li>
|
|
||||||
|
|
||||||
<li>The certificate should now be trusted:
|
|
||||||
|
|
||||||
<img src="@!urlTo('ios-installed.png')!@"/></li>
|
|
||||||
|
|
||||||
</ol>
|
|
@ -1,13 +0,0 @@
|
|||||||
|
|
||||||
You can add the mitmproxy certificates to the Java trust store using
|
|
||||||
[keytool](http://docs.oracle.com/javase/6/docs/technotes/tools/solaris/keytool.html).
|
|
||||||
On OSX, the required command looks like this:
|
|
||||||
|
|
||||||
<pre class="terminal">
|
|
||||||
sudo keytool -importcert -alias mitmproxy -storepass "password" \
|
|
||||||
-keystore /System/Library/Java/Support/CoreDeploy.bundle/Contents/Home/lib/security/cacerts \
|
|
||||||
-trustcacerts -file ~/.mitmproxy/mitmproxy-ca-cert.pem
|
|
||||||
</pre>
|
|
||||||
|
|
||||||
Note that your store password will (hopefully) be different from the one above.
|
|
||||||
|
|
@ -1,16 +0,0 @@
|
|||||||
|
|
||||||
How to install the __mitmproxy__ certificate authority in OSX:
|
|
||||||
|
|
||||||
<ol class="tlist">
|
|
||||||
|
|
||||||
<li>Open Finder, and double-click on the mitmproxy-ca-cert.pem file.</li>
|
|
||||||
|
|
||||||
<li>You will be prompted to add the certificate. Click "Always Trust":
|
|
||||||
|
|
||||||
<img src="@!urlTo('osx-addcert-alwaystrust.png')!@"/>
|
|
||||||
</li>
|
|
||||||
|
|
||||||
<li> You may be prompted for your password. You should now see the
|
|
||||||
mitmproxy cert listed under "Certificates".</li>
|
|
||||||
</ol>
|
|
||||||
|
|
@ -1,35 +0,0 @@
|
|||||||
|
|
||||||
How to install the __mitmproxy__ certificate authority in Windows 7:
|
|
||||||
|
|
||||||
<ol class="tlist">
|
|
||||||
|
|
||||||
<li> The easiest way to get the certificate to the device is to use <a
|
|
||||||
href="@!urlTo("webapp.html")!@">the web app</a>. If this fails for some
|
|
||||||
reason, simply copy the ~/.mitmproxy/mitmproxy-ca-cert.p12 file to the
|
|
||||||
target system and double-click it. </li>
|
|
||||||
|
|
||||||
<li>
|
|
||||||
You should see a certificate import wizard:
|
|
||||||
|
|
||||||
<img src="@!urlTo('win7-wizard.png')!@"/>
|
|
||||||
</li>
|
|
||||||
|
|
||||||
<li>
|
|
||||||
Click "Next" until you're prompted for the certificate store:
|
|
||||||
|
|
||||||
<img src="@!urlTo('win7-certstore.png')!@"/>
|
|
||||||
|
|
||||||
</li>
|
|
||||||
|
|
||||||
|
|
||||||
<li>
|
|
||||||
<p>Select "Place all certificates in the following store", and select "Trusted Root Certification Authorities":</p>
|
|
||||||
|
|
||||||
<img src="@!urlTo('win7-certstore-trustedroot.png')!@"/>
|
|
||||||
|
|
||||||
</li>
|
|
||||||
|
|
||||||
<li> Click "Next" and "Finish". </li>
|
|
||||||
|
|
||||||
</ol>
|
|
||||||
|
|
@ -87,13 +87,5 @@ You can use your own certificate authority by passing the <kbd>--confdir</kbd> o
|
|||||||
mitmproxy will then look for <samp>mitmproxy-ca.pem</samp> in the specified directory. If no such file exists,
|
mitmproxy will then look for <samp>mitmproxy-ca.pem</samp> in the specified directory. If no such file exists,
|
||||||
it will be generated automatically.
|
it will be generated automatically.
|
||||||
|
|
||||||
Installing the mitmproxy CA
|
|
||||||
---------------------------
|
|
||||||
|
|
||||||
* [Firefox](@!urlTo("certinstall/firefox.html")!@)
|
|
||||||
* [OSX](@!urlTo("certinstall/osx.html")!@)
|
|
||||||
* [Windows 7](@!urlTo("certinstall/windows7.html")!@)
|
|
||||||
* [iPhone/iPad](@!urlTo("certinstall/ios.html")!@)
|
|
||||||
* [IOS Simulator](@!urlTo("certinstall/ios-simulator.html")!@)
|
|
||||||
* [Android](@!urlTo("certinstall/android.html")!@)
|
|
||||||
|
|
||||||
|
@ -2,9 +2,8 @@
|
|||||||
## The setup
|
## The setup
|
||||||
|
|
||||||
In this tutorial, I'm going to show you how simple it is to creatively
|
In this tutorial, I'm going to show you how simple it is to creatively
|
||||||
interfere with Apple Game Center traffic using mitmproxy. To set things up, I
|
interfere with Apple Game Center traffic using mitmproxy. To set things up,
|
||||||
registered my mitmproxy CA certificate with my iPhone - there's a [step by step
|
you must install the [mitmproxy root certificate](@!urlTo("certinstall/webapp.html")!@) elsewhere in this manual. I then
|
||||||
set of instructions](@!urlTo("certinstall/ios.html")!@) elsewhere in this manual. I then
|
|
||||||
started mitmproxy on my desktop, and configured the iPhone to use it as a
|
started mitmproxy on my desktop, and configured the iPhone to use it as a
|
||||||
proxy.
|
proxy.
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user