mintproxy跳坑集锦

33次阅读

共计 7829 个字符,预计需要花费 20 分钟才能阅读完成。

mitmproxy 出现 Cannot establish TLS with client 错误,及解决办法
错误详情:
<< Cannot establish TLS with client (sni: app.1hai.cn): TlsException(“SSL handshake error: Error([(‘SSL routines’, ‘ssl3_read_bytes’, ‘sslv3 alert certificate unknown’)],)”,)
这个错误可以理解为 mitmproxy 缺少 https 的证书问题,解析 ssl 协议出错。
解决办法: 把 tls_passthrough.py 中的代码整合进我们的监听代码即可。
mitmproxy -s tls_passthrough.py
tls_passthrough.py 脚本在 github 上直接可以下载。下载地址:tls_passthrough.py 下载地址
下面是 tls_passthrough.py 的全部内容

“””
This inline script allows conditional TLS Interception based
on a user-defined strategy.
Example:
> mitmdump -s tls_passthrough.py
1. curl –proxy http://localhost:8080 https://example.com –insecure
// works – we’ll also see the contents in mitmproxy
2. curl –proxy http://localhost:8080 https://example.com –insecure
// still works – we’ll also see the contents in mitmproxy
3. curl –proxy http://localhost:8080 https://example.com
// fails with a certificate error, which we will also see in mitmproxy
4. curl –proxy http://localhost:8080 https://example.com
// works again, but mitmproxy does not intercept and we do *not* see the contents
Authors: Maximilian Hils, Matthew Tuusberg
“””
import collections
import random

from enum import Enum

import mitmproxy
from mitmproxy import ctx
from mitmproxy.exceptions import TlsProtocolException
from mitmproxy.proxy.protocol import TlsLayer, RawTCPLayer

class InterceptionResult(Enum):
success = True
failure = False
skipped = None

class _TlsStrategy:
“””
Abstract base class for interception strategies.
“””

def __init__(self):
# A server_address -> interception results mapping
self.history = collections.defaultdict(lambda: collections.deque(maxlen=500))

def should_intercept(self, server_address):
“””
Returns:
True, if we should attempt to intercept the connection.
False, if we want to employ pass-through instead.
“””
raise NotImplementedError()

def record_success(self, server_address):
self.history[server_address].append(InterceptionResult.success)

def record_failure(self, server_address):
self.history[server_address].append(InterceptionResult.failure)

def record_skipped(self, server_address):
self.history[server_address].append(InterceptionResult.skipped)

class ConservativeStrategy(_TlsStrategy):
“””
Conservative Interception Strategy – only intercept if there haven’t been any failed attempts
in the history.
“””

def should_intercept(self, server_address):
if InterceptionResult.failure in self.history[server_address]:
return False
return True

class ProbabilisticStrategy(_TlsStrategy):
“””
Fixed probability that we intercept a given connection.
“””

def __init__(self, p):
self.p = p
super(ProbabilisticStrategy, self).__init__()

def should_intercept(self, server_address):
return random.uniform(0, 1) < self.p

class TlsFeedback(TlsLayer):
“””
Monkey-patch _establish_tls_with_client to get feedback if TLS could be established
successfully on the client connection (which may fail due to cert pinning).
“””

def _establish_tls_with_client(self):
server_address = self.server_conn.address

try:
super(TlsFeedback, self)._establish_tls_with_client()
except TlsProtocolException as e:
tls_strategy.record_failure(server_address)
raise e
else:
tls_strategy.record_success(server_address)

# inline script hooks below.

tls_strategy = None

def load(l):
l.add_option(
“tlsstrat”, int, 0, “TLS passthrough strategy (0-100)”,
)

def configure(updated):
global tls_strategy
if ctx.options.tlsstrat > 0:
tls_strategy = ProbabilisticStrategy(float(ctx.options.tlsstrat) / 100.0)
else:
tls_strategy = ConservativeStrategy()

def next_layer(next_layer):
“””
This hook does the actual magic – if the next layer is planned to be a TLS layer,
we check if we want to enter pass-through mode instead.
“””
if isinstance(next_layer, TlsLayer) and next_layer._client_tls:
server_address = next_layer.server_conn.address

if tls_strategy.should_intercept(server_address):
# We try to intercept.
# Monkey-Patch the layer to get feedback from the TLSLayer if interception worked.
next_layer.__class__ = TlsFeedback
else:
# We don’t intercept – reply with a pass-through layer and add a “skipped” entry.
mitmproxy.ctx.log(“TLS passthrough for %s” % repr(next_layer.server_conn.address), “info”)
next_layer_replacement = RawTCPLayer(next_layer.ctx, ignore=True)
next_layer.reply.send(next_layer_replacement)
tls_strategy.record_skipped(server_address)
整合示例
import sys
import collections
import random
from enum import Enum
import requests
import logging
import json

import mitmproxy
from mitmproxy import ctx,http
from mitmproxy.exceptions import TlsProtocolException
from mitmproxy.proxy.protocol import TlsLayer, RawTCPLayer

from MongoTool import MongoTool
class Listener:

def __init__(self):
#self.logger =logging.getLogger(‘listener’)
#self.logger.setLevel(logging.INFO)
#logger_handler=logging.FileHandler(‘D:/log/shop_detail_listener.log’)
#formatter =logging.Formatter(‘%(asctime)s – %(name)s – %(levelname)s – %(message)s’)
#logger_handler.setFormatter(formatter)
#self.logger.addHandler(logger_handler)
self.mongo_client=MongoTool()

def request(self,flow:http.HTTPFlow):
url =flow.request.url

if ‘base/storeList.do’ in url:
try:
ctx.log.info(‘flow request:’ + url)
print(‘intercept shenzhou shop detail request,%s’ % (url))
except Exception as e:
ctx.log.error(‘mitmproxy intercept http error:’ + repr(e))

def response(self,flow):
response=flow.response
response_text=response.text
log_info = ctx.log.info
if ‘storeList’ in response_text:
self.insert_mongo(response_text)

pass

def insert_mongo(self,item):
shop_item_json=json.loads(item)
if shop_item_json[‘msg’] not in ‘ 成功 ’:
pass
for shop in shop_item_json[‘result’][‘storeList’]:
print(shop)
self.mongo_client.insert_item(shop,’shenzhou_shop’)

addons=[
Listener()
]

class InterceptionResult(Enum):
success = True
failure = False
skipped = None

class _TlsStrategy:
“””
Abstract base class for interception strategies.
“””

def __init__(self):
# A server_address -> interception results mapping
self.history = collections.defaultdict(lambda: collections.deque(maxlen=500))

def should_intercept(self, server_address):
“””
Returns:
True, if we should attempt to intercept the connection.
False, if we want to employ pass-through instead.
“””
raise NotImplementedError()

def record_success(self, server_address):
self.history[server_address].append(InterceptionResult.success)

def record_failure(self, server_address):
self.history[server_address].append(InterceptionResult.failure)

def record_skipped(self, server_address):
self.history[server_address].append(InterceptionResult.skipped)

class ConservativeStrategy(_TlsStrategy):
“””
Conservative Interception Strategy – only intercept if there haven’t been any failed attempts
in the history.
“””

def should_intercept(self, server_address):
if InterceptionResult.failure in self.history[server_address]:
return False
return True

class ProbabilisticStrategy(_TlsStrategy):
“””
Fixed probability that we intercept a given connection.
“””

def __init__(self, p):
self.p = p
super(ProbabilisticStrategy, self).__init__()

def should_intercept(self, server_address):
return random.uniform(0, 1) < self.p

class TlsFeedback(TlsLayer):
“””
Monkey-patch _establish_tls_with_client to get feedback if TLS could be established
successfully on the client connection (which may fail due to cert pinning).
“””

def _establish_tls_with_client(self):
server_address = self.server_conn.address

try:
super(TlsFeedback, self)._establish_tls_with_client()
except TlsProtocolException as e:
tls_strategy.record_failure(server_address)
raise e
else:
tls_strategy.record_success(server_address)

# inline script hooks below.

tls_strategy = None

def load(l):
l.add_option(
“tlsstrat”, int, 0, “TLS passthrough strategy (0-100)”,
)

def configure(updated):

global tls_strategy
if ctx.options.tlsstrat > 0:
tls_strategy = ProbabilisticStrategy(float(ctx.options.tlsstrat) / 100.0)
else:
tls_strategy = ConservativeStrategy()

def next_layer(next_layer):
“””
This hook does the actual magic – if the next layer is planned to be a TLS layer,
we check if we want to enter pass-through mode instead.
“””
if isinstance(next_layer, TlsLayer) and next_layer._client_tls:
server_address = next_layer.server_conn.address

if tls_strategy.should_intercept(server_address):
# We try to intercept.
# Monkey-Patch the layer to get feedback from the TLSLayer if interception worked.
next_layer.__class__ = TlsFeedback
else:
# We don’t intercept – reply with a pass-through layer and add a “skipped” entry.
mitmproxy.ctx.log(“TLS passthrough for %s” % repr(next_layer.server_conn.address), “info”)
next_layer_replacement = RawTCPLayer(next_layer.ctx, ignore=True)
next_layer.reply.send(next_layer_replacement)
tls_strategy.record_skipped(server_address)

正文完
 0