mirror of
https://github.com/ProxymanApp/Proxyman.git
synced 2026-04-26 08:35:53 +03:00
[GH-ISSUE #1749] SSL handshake failed after trusting the certificate #1742
Labels
No labels
Discussion
Feature request
In Progress...
Plugins
Waiting response
Windows
Windows
bug
duplicate
enhancement
feature
good first issue
iOS
macOS 10.11
question
wontfix
✅ Done
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/Proxyman#1742
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Depisdrul on GitHub (Aug 22, 2023).
Original GitHub issue: https://github.com/ProxymanApp/Proxyman/issues/1749
Description
Steps to Reproduce
Current Behavior
Cannot intercept any response from my test App (debug version, with the correct setup) but also not even the simple troubleshooting steps of checking the google endpoint

Expected Behavior
I can see the responses of Google and my app in debug version
Environment
Phone: Galaxy A13, Android 13
Computer: Proxyman Version 4.9.1 (49001), Mac OS 13.4.1 (c) ARM64
@NghiaTranUIT commented on GitHub (Aug 22, 2023):
You have to follow all steps from the Setup Guide, especially step 5.
@NghiaTranUIT commented on GitHub (Aug 22, 2023):
it means that you can only intercept your app, because you have to edit the network.xml file.
If you'd like to intercept entire Android, you have to follow this guide to install the certificate into the System Android: https://docs.mitmproxy.org/stable/howto-install-system-trusted-ca-android/
It's quite tricky to do it.
@Depisdrul commented on GitHub (Aug 22, 2023):
This was already done, that is why I opened an issue. Is it still not working despite us following the guidelines
I actually have no need to intercept the whole system, but your guide advised you try to do this to check that your setup was correct. In case you are not supposed to be able to do this, I suggest updating the material with an explaination
@NghiaTranUIT commented on GitHub (Aug 22, 2023):
I guess you're using Google Chrome on Android Emulator. Unfortunately, it doesn't work with Google Chrome. Android only allows developers to intercept HTTPS from your own app, which is also defined in the
network.xmlfile.To intercept traffic from Google Chrome app, you should follow the guide in my previous comment, to install the certificate to the System.
@Depisdrul commented on GitHub (Aug 23, 2023):
I am not using any emulators, as described in the issue 😄 I am using my own app on a real Android device
@NghiaTranUIT commented on GitHub (Aug 23, 2023):
Ah, I mean: Android devices or Android emulators are the same. You need to install the certificate to the System CA, in order to decrypt HTTPS traffic from Google Chrome.
@Depisdrul commented on GitHub (Aug 23, 2023):
Thanks! However, don't need to decrypt traffic from Google Chrome, as I explained earlier, I need to decrypt to test a custom App (for which the developer has followed the setup steps)
The Google issue was that the Proxyman guide suggested trying to read the response from google to check if the setup was already completed. If it is impossible to do so with the basic setup on Android, maybe it should be indicated in the comment
Is the "install the certificate to the System CA" the step from the initial guide instructing you to open
http://proxy.man.sslpage to download and install the CA certificate on Android?@Depisdrul commented on GitHub (Sep 12, 2023):
@NghiaTranUIT Any update on this?
@NghiaTranUIT commented on GitHub (Sep 13, 2023):
Is it your app and do you have the source code?
Step 5 requires adding the
network_security_config.xmlinto your source code, in order to decrypt the HTTPS traffic from your own app. If you debug apps from the Google Store, you can't finish the setup 5 -> Can't decrypt HTTPS traffic.@NghiaTranUIT commented on GitHub (Sep 13, 2023):
If you want to decrypt HTTPS traffic from an app on Google Play, you also don't have a source code. It's trickier. You have to install the Proxyman CA Certificate into the system (Not User) by following this Docs: https://docs.mitmproxy.org/stable/howto-install-system-trusted-ca-android/
@Depisdrul commented on GitHub (Sep 13, 2023):
I have installed the App from an apk file that was provided by the developer himself with the debugging setup, as described by your guide. Also, I followed the steps to setup the computer with proxyman and the phone with the App (as described by your guide). In short, we followed the instructions by the book, so I don't see why after following the procedure I still cannon see the requests from the App
@Depisdrul commented on GitHub (Oct 19, 2023):
@NghiaTranUIT Any news on this?
@NghiaTranUIT commented on GitHub (Oct 19, 2023):
Sorry, it's really difficult to tell what's wrong. Here are some I suspect:
res/xml/network_security_config.xmlandAndroidManifest.xmlYour turn:
@NghiaTranUIT commented on GitHub (Oct 19, 2023):
It's better to request your Dev teammate to try it on his devices, with his setup -> To verify it's working on his side first.
Then, ship the APK file to your side.
@sriadimanav commented on GitHub (Nov 10, 2023):
UPDATE: tried this tool
https://github.com/shroudedcode/apk-mitm
after that it worked
NOTE: my app is built using react native, which uses Android OkHttp library for network calls link
so my question is @NghiaTranUIT, what this tools is doing extra that it is working
@sriadimanav commented on GitHub (Nov 10, 2023):
UPDATE: How to ignore SSL for react native
https://medium.com/@rushitjivani/how-to-ignore-ssl-for-react-native-android-ios-4942e10ea667
@cyb-jenkins commented on GitHub (Oct 22, 2024):
Hi, Please try these steps :
-In Proxyman go to Certificates tab and do Reset of all Proxyman certificates.
-Once reset is done , again in same tab Install certificate on windows/Mac.
Now try to intercept traffic.