Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Error code: sec_error_unknown_critical_extension #455

Closed
shitsecurity opened this issue Jan 21, 2015 · 3 comments
Closed

Error code: sec_error_unknown_critical_extension #455

shitsecurity opened this issue Jan 21, 2015 · 3 comments

Comments

@shitsecurity
Copy link

CA cert added with all permissions as described (http://mitmproxy.org/doc/certinstall/webapp.html) to iceweasel on debian wheezy w/ mitmdump 0.11.3.

$ mitmdump -w /tmp/dump -p 8080
127.0.0.1:38250: clientconnect
127.0.0.1:38250: NetLibSSLError([('SSL routines', 'SSL3_READ_BYTES', 'sslv3 alert bad certificate')],)
127.0.0.1:38250: clientdisconnect

HTTP mitm works as designated.

@mhils
Copy link
Member

mhils commented Jan 29, 2015

Did you use an old version of mitmproxy before? If so, please remove the CA&certs in ~/.mitmproxy and restart mitmproxy.

Cheers,
Max

@shitsecurity
Copy link
Author

That seems to fix it, thanks!
Any plans on adding certificate (re)generation on updates or an explicit error message for these sort of scenarios? Or maybe improving the documentation, I don't believe this quirk is mentioned anywhere.

@mhils
Copy link
Member

mhils commented Jan 30, 2015

Any plans on adding certificate (re)generation on updates or an explicit error message for these sort of scenarios? Or maybe improving the documentation, I don't believe this quirk is mentioned anywhere.

This is not a general issue with upgrading mitmproxy. Old versions generated certs with a netscape extension, for which Iceweasel 31 removed support (see https://github.com/mitmproxy/netlib/issues/39).
Feel free to submit a pull request, I'd be happy to merge that in. If you google mitmproxy sec_error_unknown_critical_extension, it's the first hit, so that is our current workaround.

Cheers,
Max

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants