Steps to reproduce the problem:
- Use Upstream mode (not sure if it only happens there)
- Make a regex to ignore
- Connect to said address.
I have tried many regex permutations, like
sandbox.itunes.com:\d and many many many others.
Same thing for
My latest tries for that were
http:\/\/app-adforce\.jp/ad.+ and various combinations.
I’m not sure if my assumptions about the checked string are wrong or my regexes are incorrect…
I looked at the code and it seems to check against base_url:port? Like in the last example, it’d be
app-adforce.jp:80? Making a regex with this assumption doesn’t seem to work, so maybe the fact that it’s Upstream mode has something to do with it (although it’s more likely that I’m just wrong).
Full command (although probably irrelevant)
"../mitmproxy/mitmweb.exe" -v -U http://localhost:8888 --ignore .*app-adforce\.jp[^\s]* --ignore .*\.?apple\.com:?[^\s]* --ignore .*s3-us-west-1\.amazonaws\.com:443.* --ignore ocsp.apple.com.* --ignore .*apple.com.* --ignore http://app-adforce\.jp:80
I think some of those work, but I haven’t tested it. Just
--ignore .* definitely works (blocks everything).
Edit: I’d also like to escape
http://ocsp.apple.com/ocsp03-wwdr01/ME4wTKADAgEAMEUwQzBBMAkGBSsOAwIaBQAEFADrDMz0cWy6RiOj1S%2BY1D32MKkdBBSIJxcJqbYYYIvs67r2R1nFUlSjtwIISCB2VPs6tfI%3D and the above doesn’t work for that either.
Mitmproxy version: 2.0.2 (release version) Precompiled Binary Python version: 3.5.3 Platform: Windows-10-10.0.14393 SSL version: OpenSSL 1.0.2j 26 Sep 2016 Windows version: 10 10.0.14393 Multiprocessor Free