Explorar el Código

passthru non-blocked connections when security level is basic

tags/v1.0.4
Jonathan Cobb hace 4 años
padre
commit
cf0be8b27a
Se han modificado 1 ficheros con 6 adiciones y 0 borrados
  1. +6
    -0
      bubble-server/src/main/resources/packer/roles/mitmproxy/files/bubble_conn_check.py

+ 6
- 0
bubble-server/src/main/resources/packer/roles/mitmproxy/files/bubble_conn_check.py Ver fichero

@@ -265,6 +265,12 @@ def next_layer(next_layer):
else:
next_layer.__class__ = TlsBlock

elif security_level['level'] == SEC_BASIC:
bubble_log('next_layer: check='+repr(check)+' but security_level='+repr(security_level)+', enabling passthru for server=' + server_addr+', fqdns='+str(fqdns))
bubble_activity_log(client_addr, server_addr, 'tls_passthru', fqdns)
next_layer_replacement = RawTCPLayer(next_layer.ctx, ignore=True)
next_layer.reply.send(next_layer_replacement)

else:
bubble_log('next_layer: disabling passthru (with TlsFeedback) for client_addr='+client_addr+', server_addr='+server_addr+', fqdns='+str(fqdns))
bubble_activity_log(client_addr, server_addr, 'tls_intercept', fqdns)


Cargando…
Cancelar
Guardar