-
Notifications
You must be signed in to change notification settings - Fork 58
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Hardcoded CA Certificate #2
Comments
This is mostly an issue with the Releases since someone could easily use their own when building themselves, but I think it might make sense to pull it out into a config file. |
Yes sure, this is going to change in the next iteration. |
I have finally released the version I was working on and this issue is now fixed. |
Really looking forward to seeing where this project goes and hopefully lending a hand where I can once you are ready for some more contributors. Burp has so many bugs and a terrible UI so I'm rooting for Broxy! |
Thanks. The user interface is definitely an important aspect, for the time being I decided to implement something that looks like Burp to see if the whole thing would actually work. As for the contribution, I have been thinking about it but I don't really know how to organize it at this time. I guess that if you have an idea on a specific component\module and how to implement it (for example how to make the UI more accessible) you might open an issue that can be discussed here on GitHub. |
The CA Cert in the coreproxy_settings.go file is static and not something that gets generated. Anyone who trusts the Cert in order to capture HTTPS traffic will be vulnerable to using unverified sites later.
Example site signed with the hardcoded CA https://proxy.lf.lc/
The text was updated successfully, but these errors were encountered: