# ██████ ██████ ██████ ██ ██ ███████ ███████
# ██ ██ ██ ██ ██ ██ ██ ██ ██ ██
██████ ██████ ██ ██ ███ █████ █████
# ██ ██ ██ ██ ██ ██ ██ ██ ██
# ██ ██ ██ ██████ ██ ██ ███████ ███████Easily test various proxy configurations:
- uses mitmproxy under the hood
- uses two proxies, one acting as an SSL terminating reverse proxy
- Starts a proxy which listens on two ports, both
httpandhttps:8080for the web traffic- one for the API traffic
-a, --auth <username:password> Proxy Proxy authentication
-b, --basename <basename> Proxy basename [when listening on https://] defaults to proxy.foo
-i, --intercept Enable SSL Interception
-h, --help Show this helpdocker run \
-v "$(pwd)/certs/:/home/mitmproxy/.mitmproxy" \
--rm -it \
-p 8000:8000 \
-p 8443:8443 \
-p 8080:8080 \
drorwolmer/proxee
# Add Proxy Authentication
docker run --rm -it -p 8080:8080 drorwolmer/proxee --auth admin:123456
# Enable SSL Interception
# - Browse http://localhost:8000 to get the certificates
# - Install them according to https://docs.mitmproxy.org/stable/concepts-certificates/
docker run --rm -it -p 8000:8000 -p 8080:8080 drorwolmer/proxee --interceptthe root CA file is mitmproxy-ca-cert.pem
docker run --rm -it -p 8000:8000 -p 8080:8080 drorwolmer/proxee --intercept
# - Browse http://localhost:8000 to get the certificates
# - Install them according to https://docs.mitmproxy.org/stable/concepts-certificates- Create a DNS record (or edit
/etc/hosts) for the proxy server - Install the root certificate on the client
- The proxy will present its certificate with the subject that was requested (
proxy.fooin the below example)
docker run \
--rm \
-v "$(pwd)/certs/:/home/mitmproxy/.mitmproxy" \
-it \
-p 8000:8000 \
-p 8443:8443 \
drorwolmer/proxee \
--intercept --basename proxy.foo