I have a custom HTTP server that talks direct cleartext HTTP/2. I want to wrap it in TLS in such a way that a Web browser could communicate with this server in HTTP/2 terms. This means, for example, that when my server sends a
PUSH_PROMISE, the Web browser must receive that
Can I do this with mitmproxy?
I tried using mitmproxy in TCP proxy mode, as explained in https://discourse.mitmproxy.org/t/intercepting-tcp-connections-with-tls-1-2-and-custom-certificates/307/4
So, I start up my server on port 8081, and start mitmproxy like this:
mitmdump --http2 --tcp localhost:8081 --reverse http://localhost:8081
Then I open https://localhost:8080/ in my Web browser. After clicking through certificate errors, it works — except it’s HTTP/1.1 instead of HTTP/2. With Wireshark, I can see that the browser’s TLS client hello has ALPN for
http/1.1, but mitmproxy responds with ALPN for
http/1.1. As a result, my server on port 8081 receives cleartext HTTP/1.1 instead of the desired cleartext HTTP/2.