Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

What about certificate pinning? #3

Open
mosburgerr opened this issue Oct 26, 2018 · 2 comments
Open

What about certificate pinning? #3

mosburgerr opened this issue Oct 26, 2018 · 2 comments

Comments

@mosburgerr
Copy link

I've been using mitm type transparent proxying on my home network for some time and it seems that an increasing number of apps use certificate pinning to prevent any decrypting and inspection of SSL/TLS traffic. Particularly any iOS (and probably Android) apps from Google fail to various degrees when using a transparent proxy, but many others like the Facebook app seem to be affected too. In most cases, if the app can see that it is going through a transparent proxy, it either fails silently, or gives an obtuse error message. Will your mitmproxy setup address this? I'd be keen to know if it's avoidable because in my case I've had to disable https decrypt and scan on the proxy for google apps and others just to make them work (which of course means I don't know what data is being sent out).

@drstuggels
Copy link

I just used the --allow-hosts option to only capture the hosts I care about. Couldn't find any way to bypass ssl/certificate pinning.

@drstuggels
Copy link

It would be great if there existed a big list of hosts/domains/ips that use certificate pinning so that we could ignore them with the --ignore-hosts option.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants