mitmproxy Changelog

What's new in mitmproxy 2.0.1

Mar 27, 2017
  • bump cryptography dependency
  • bump pyparsing dependency
  • HTTP/2: use header normalization from hyper-h2

New in mitmproxy 2.0 (Mar 27, 2017)

  • HTTP/2 is now enabled by default.
  • Add transparent proxy support for OpenBSD.
  • Check the mitmproxy CA for expiration and warn the user to regenerate it if necessary.
  • Image Content Views: Images are now parsed with Kaitai Struct (kaitai.io) instead of Pillow. This simplifies installation, reduces binary size, and allows parsing in pure Python.
  • Testing: Tremendous improvements, enforced 100% individual coverage for large parts of the codebase, increased overall coverage.
  • A myriad of other small improvements and bugfixes throughout the project.

New in mitmproxy 1.0.2 (Feb 9, 2017)

  • Fix compatibility with Python 3.5.0

New in mitmproxy 1.0.1 (Feb 9, 2017)

  • Fix compatibility with Python 3.6

New in mitmproxy 1.0 (Feb 9, 2017)

  • All mitmproxy tools are now Python 3 only! We plan to support Python 3.5 and higher.
  • Web-Based User Interface: Mitmproxy now offically has a web-based user interface called mitmweb. We consider it stable for all features currently exposed in the UI, but it still misses a lot of mitmproxy’s options.
  • Configuration: The config file format is now a single YAML file. In most cases, converting to the new format should be trivial - please see the docs for more information.
  • Console: Significant UI improvements - including sorting of flows by size, type and url, status bar improvements, much faster indentation for HTTP views, and more.
  • HTTP/2: Significant improvements, but is temporarily disabled by default due to wide-spread protocol implementation errors on some large website
  • WebSocket: The protocol implementation is now mature, and is enabled by default. Complete UI support is coming in the next release. Hooks for message interception and manipulation are available.
  • A myriad of other small improvements throughout the project.

New in mitmproxy 0.18.1 (Oct 17, 2016)

  • Python 3 Compatibility for mitmproxy and pathod (Shadab Zafar, GSoC 2016)
  • Major improvements to mitmweb (Clemens Brunner & Jason Hao, GSoC 2016)
  • Internal Core Refactor: Separation of most features into isolated Addons
  • Initial Support for WebSockets
  • Improved HTTP/2 Support
  • Reverse Proxy Mode now automatically adjusts host headers and TLS Server Name Indication
  • Improved HAR export
  • Improved export functionality for curl, python code, raw http etc.
  • Flow URLs are now truncated in the console for better visibility
  • New filters for TCP, HTTP and marked flows.
  • Mitmproxy now handles comma-separated Cookie headers
  • Merge mitmproxy and pathod documentation
  • Mitmdump now sanitizes its console output to not include control characters
  • New HTTP Message getters/setters for cookies and form contents.
  • Add ability to view only marked flows in mitmproxy
  • Improved Script Reloader (Always use polling, watch for whole directory)
  • Use tox for testing
  • Unicode support for tnetstrings
  • Add dumpfile converters for mitmproxy versions 0.11 and 0.12
  • Numerous bug fixes
  • Improved message body handling for HTTP messages:
  • .raw_content provides the message body as seen on the wire
  • .content provides the decompressed body (e.g. un-gzipped)
  • .text provides the body decompressed and decoded body

New in mitmproxy 0.17.1 (Apr 22, 2016)

  • This is a quick bugfix release for the precompiled binary distributions only, which previously failed when a filter was specified.

New in mitmproxy 0.17 (Apr 11, 2016)

  • Simplify repository and release structure. mitmproxy now comes as a single package, including netlib and pathod.
  • Rename the Python package from libmproxy to mitmproxy.
  • New option to add server certs to client chain (CVE-2016-2402, John Kozyrakis)
  • Enable HTTP/2 by default (Thomas Kriechbaumer)
  • Improved HAR extractor (Shadab Zafar)
  • Add icon for OSX and Windows binaries
  • Add content view for query parameters (Will Coster)
  • Initial work on Python 3 compatibility
  • locust.io export (Zohar Lorberbaum)
  • Fix XSS vulnerability in HTTP errors (Will Coster)
  • Numerous bugfixes and minor improvements

New in mitmproxy 0.16 (Feb 16, 2016)

  • Completely revised HTTP2 implementation based on hyper-h2 (Thomas Kriechbaumer)
  • Export flows as cURL command, Python code or raw HTTP (Shadab Zafar)
  • Fixed compatibility with the Android Emulator (Will Coster)
  • Script Reloader: Inline scripts are reloaded automatically if modified (Matthew Shao)
  • Inline script hooks for TCP mode (Michael J. Bazzinotti)
  • Add default ciphers to support iOS9 App Transport Security (Jorge Villacorta)
  • Basic Authentication for mitmweb (Guillem Anguera)
  • Exempt connections from interception based on TLS Server Name Indication (David Weinstein)
  • Provide Python Wheels for faster installation
  • Numerous bugfixes and minor improvements

New in mitmproxy 0.15 (Dec 11, 2015)

  • Support for loading and converting older dumpfile formats (0.13 and up)
  • Content views for inline script (@chrisczub)
  • Better handling of empty header values (Benjamin Lee/@bltb)
  • Fix a gnarly memory leak in mitmdump
  • A number of bugfixes and small improvements

New in mitmproxy 0.14 (Nov 6, 2015)

  • Statistics: 399 commits, 13 contributors, 79 closed issues, 37 closed PRs, 103 days
  • Docs: Greatly updated docs now hosted on ReadTheDocs! http://docs.mitmproxy.org
  • Docs: Fixed Typos, updated URLs etc. (Nick Badger, Ben Lerner, Choongwoo Han, onlywade, Jurriaan Bremer)
  • mitmdump: Colorized TTY output
  • mitmdump: Use mitmproxy's content views for human-readable output (Chris Czub)
  • mitmproxy and mitmdump: Support for displaying UTF8 contents
  • mitmproxy: add command line switch to disable mouse interaction (Timothy Elliott)
  • mitmproxy: bug fixes (Choongwoo Han, sethp-jive, FreeArtMan)
  • mitmweb: bug fixes (Colin Bendell)
  • libmproxy: Add ability to fall back to TCP passthrough for non-HTTP connections.
  • libmproxy: Avoid double-connect in case of TLS Server Name Indication. This yields a massive speedup for TLS handshakes.
  • libmproxy: Prevent unneccessary upstream connections (macmantrl)
  • Inline Scripts: New API for HTTP Headers: http://docs.mitmproxy.org/en/latest/dev/models.html#netlib.http.Headers
  • Inline Scripts: Properly handle exceptions in `done` hook
  • Inline Scripts: Allow relative imports, provide `__file__`
  • Examples: Add probabilistic TLS passthrough as an inline script
  • netlib: Refactored HTTP protocol handling code
  • netlib: ALPN support
  • netlib: fixed a bug in the optional certificate verification.
  • netlib: Initial Python 3.5 support (this is the first prerequisite for 3.x support in mitmproxy)

New in mitmproxy 0.13 (Aug 4, 2015)

  • Upstream certificate validation. See the --verify-upstream-cert, --upstream-trusted-cadir and --upstream-trusted-ca parameters. Thanks to Kyle Morton (github.com/kyle-m) for his work on this.
  • Add HTTP transparent proxy mode. This uses the host headers from HTTP traffic (rather than SNI and IP address information from the OS) to implement perform transparent proxying. Thanks to github.com/ijiro123 for this feature.
  • Add ~src and ~dst REGEX filters, allowing matching on source and destination addresses in the form of :
  • mitmproxy console: change g/G keyboard shortcuts to match less. Thanks to Jose Luis Honorato (github.com/jlhonora).
  • mitmproxy console: Flow marking and unmarking. Marked flows are not deleted when the flow list is cleared. Thanks to Jake Drahos (github.com/drahosj).
  • mitmproxy console: add marking of flows
  • Remove the certforward feature. It was added to allow exploitation of #gotofail, which is no longer a common vulnerability. Permitting this hugely increased the complexity of packaging and distributing mitmproxy.

New in mitmproxy 0.12.1 (Jun 4, 2015)

  • mitmproxy console: mouse interaction - scroll in the flow list, click on flow to view, click to switch between tabs.
  • Update our crypto defaults: SHA256, 2048 bit RSA, 4096 bit DH parameters.
  • BUGFIX: crash under some circumstances when copying to clipboard.
  • BUGFIX: occasional crash when deleting flows.

New in mitmproxy 0.11.2 (Jan 19, 2015)

  • Configuration files - mitmproxy.conf, mitmdump.conf, common.conf in the .mitmproxy directory.
  • Better handling of servers that reject connections that are not SNI.
  • Many other small bug fixes and improvements.

New in mitmproxy 0.11.1 (Jan 19, 2015)

  • Bug fixes: connection leaks some crashes

New in mitmproxy 0.11 (Jan 19, 2015)

  • Performance improvements for mitmproxy console
  • SOCKS5 proxy mode allows mitmproxy to act as a SOCKS5 proxy server
  • Data streaming for response bodies exceeding a threshold ([email protected])
  • Ignore hosts or IP addresses, forwarding both HTTP and HTTPS traffic untouched
  • Finer-grained control of traffic replay, including options to ignore contents or parameters when matching flows ([email protected])
  • Pass arguments to inline scripts
  • Configurable size limit on HTTP request and response bodies
  • Per-domain specification of interception certificates and keys (see --cert option)
  • Certificate forwarding, relaying upstream SSL certificates verbatim (see --cert-forward)
  • Search and highlighting for HTTP request and response bodies in mitmproxy console ([email protected])
  • Transparent proxy support on Windows
  • Improved error messages and logging
  • Support for FreeBSD in transparent mode, using pf ([email protected])
  • Content view mode for WBXML ([email protected])
  • Better documentation, with a new section on proxy modes
  • Generic TCP proxy mode
  • Countless bugfixes and other small improvements

New in mitmproxy 0.10 (Jan 19, 2015)

  • Support for multiple scripts and multiple script arguments
  • Easy certificate install through the in-proxy web app, which is now enabled by default
  • Forward proxy mode, that forwards proxy requests to an upstream HTTP server
  • Reverse proxy now works with SSL
  • Search within a request/response using the "/" and "n" shortcut keys
  • A view that beatifies CSS files if cssutils is available
  • Bug fix, documentation improvements, and more.

New in mitmproxy 0.9 (Mar 27, 2013)

  • Upstream certs mode is now the default.
  • Add a WSGI container that lets you host in-proxy web applications.
  • Full transparent proxy support for Linux and OSX.
  • Introduce netlib, a common codebase for mitmproxy and pathod (http://github.com/cortesi/netlib).
  • Full support for SNI.
  • Color palettes for mitmproxy, tailored for light and dark terminal backgrounds.
  • Stream flows to file as responses arrive with the "W" shortcut in mitmproxy.
  • Extend the filter language, including ~d domain match operator, ~a to match asset flows (js, images, css).
  • Follow mode in mitmproxy ("F" shortcut) to "tail" flows as they arrive.
  • --dummy-certs option to specify and preserve the dummy certificate directory.
  • Server replay from the current captured buffer.
  • Huge improvements in content views. We now have viewers for AMF, HTML, JSON, Javascript, images, XML, URL-encoded forms, as well as hexadecimal and raw views.
  • Add Set Headers, analagous to replacement hooks. Defines headers that are set on flows, based on a matching pattern.
  • A graphical editor for path components in mitmproxy.
  • A small set of standard user-agent strings, which can be used easily in the header editor.
  • Proxy authentication to limit access to mitmproxy

New in mitmproxy 0.8 (Mar 27, 2013)

  • Detailed tutorial for Android interception. Some features that land in this release have finally made reliable Android interception possible.
  • Upstream-cert mode, which uses information from the upstream server to generate interception certificates.
  • Replacement patterns that let you easily do global replacements in flows matching filter patterns. Can be specified on the command-line, or edited interactively.
  • Much more sophisticated and usable pretty printing of request bodies. Support for auto-indentation of Javascript, inspection of image EXIF data, and more.
  • Details view for flows, showing connection and SSL cert information (X keyboard shortcut).
  • Server certificates are now stored and serialized in saved traffic for later analysis. This means that the 0.8 serialization format is NOT compatible with 0.7.
  • Many other improvements, including bugfixes, and expanded scripting API, and more sophisticated certificate handling.

New in mitmproxy 0.7 (Mar 27, 2013)

  • New built-in key/value editor. This lets you interactively edit URL query strings, headers and URL-encoded form data.
  • Extend script API to allow duplication and replay of flows.
  • API for easy manipulation of URL-encoded forms and query strings.
  • Add "D" shortcut in mitmproxy to duplicate a flow.
  • Reverse proxy mode. In this mode mitmproxy acts as an HTTP server, forwarding all traffic to a specified upstream server.
  • UI improvements - use unicode characters to make GUI more compact, improve spacing and layout throughout.
  • Add support for filtering by HTTP method.
  • Add the ability to specify an HTTP body size limit.
  • Move to typed netstrings for serialization format - this makes 0.7 backwards-incompatible with serialized data from 0.6!
  • Significant improvements in speed and responsiveness of UI.
  • Many minor bugfixes and improvements.

New in mitmproxy 0.6 (Feb 11, 2012)

  • New scripting API that allows much more flexible and fine-grained rewriting of traffic. See the docs for more info.
  • Support for gzip and deflate content encodings. A new "z" keybinding in mitmproxy to let us quickly encode and decode content, plus automatic decoding for the "pretty" view mode.
  • An event log, viewable with the "v" shortcut in mitmproxy, and the "-e" command-line flag in mitmdump.
  • Huge performance improvements: mitmproxy interface, loading large numbers of flows from file.
  • A new "replace" convenience method for all flow objects, that does a universal regex-based string replacement.
  • Header management has been rewritten to maintain both case and order.
  • Improved stability for SSL interception.
  • Default expiry time on generated SSL certs has been dropped to avoid an OpenSSL overflow bug that caused certificates to expire in the distant past on some systems.
  • A "pretty" view mode for JSON and form submission data.
  • Expanded documentation and examples.
  • Countless other small improvements and bug fixes.