I am trying to intercept traffic from a client device to a specific server. The client device is not proxy-aware and has a self signed certificate, so I am attempting to use mitmdump in insecure reverse-proxy mode:
.\mitmdump.exe --insecure -R https://220.127.116.11:2222 --tcp 18.104.22.168:2222 -p 2222 -v -w “C:\Path\To\Log”
(I then instruct the client to connect to the IP of the host running mitmdump)
I am getting:
Certificate Verification Error for 22.214.171.124: self signed certificate in certificate chain (errno: 19, depth: 1)
Invalid certificate, closing connection. Pass --insecure to disable validation.
It does not seem to be respecting the “–insecure” option. I have also tried adding the certificate for the target server to both the Trusted Root CA store for the local computer (this is on Windows) as well as specifying the certificate directly with “–upstream-trusted-ca” - neither had any affect, I receive the same error.
Do I have my options wrong? Is there a better way to do this?