mirror of
https://github.com/ProxymanApp/Proxyman.git
synced 2026-04-27 00:55:57 +03:00
[GH-ISSUE #1835] SSL Pinning is globally not working properly on Proxyman #1826
Labels
No labels
Discussion
Feature request
In Progress...
Plugins
Waiting response
Windows
Windows
bug
duplicate
enhancement
feature
good first issue
iOS
macOS 10.11
question
wontfix
✅ Done
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/Proxyman#1826
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @novitae on GitHub (Oct 31, 2023).
Original GitHub issue: https://github.com/ProxymanApp/Proxyman/issues/1835
Description
Few times in the past I've reported in the issues of this app that some requests from my jailbroken iPhone, with all the ssl bypass setup done, are mysteriously not being read on Proxyman, having the SSL error. And few weeks ago I switched to burp suite. And on burp suite I've not had once an issue with the requests that are failing to be decrypted on Proxyman.
Steps to Reproduce
The best step to reproduce to be sure is the Madrid identity lookup of FaceTime on iPhones. I guess that you won't have the appropriate stuff at disposition to test it yourself, but I'm writing it anyway.
palera1n -fYou can follow more precisely on the gist I made here https://gist.github.com/novitae/2f04999039a6012813fb122d35a4c044
*query.ess.apple.com. This request is to check if the phone or email is connected to FaceTime, and so, callable.Current Behavior
Not decrypted.
Expected Behavior
Should've been read.
Environment
@NghiaTranUIT commented on GitHub (Nov 1, 2023):
Thanks for opening the ticket but I'm not sure how to reproduce it since I don't have any jailbreak iPhone 7.
Can you get me the error log in the Help menu -> Advance -> Enable Debug Mode -> and copy me the SSL Error in the Terminal App?
One thing difference between Burp and Proxyman is:
=> Can you switch to HTTP/1.1 from Burp to confirm that you can decrypt HTTPS data?
@novitae commented on GitHub (Nov 1, 2023):
Mmmmh well I didn't tested before submitting this issue, but now it seems it is working. You probably did a fix that I didn't know of since my configuration is the same as before.
@novitae commented on GitHub (Dec 5, 2023):
@NghiaTranUIT I finally found an example of app that has this issue, and not on burp. Im going to put all the screenshots, and do my best to assist you to find a solution !
So the traffic of application of


Kick(the streaming platform) on iOS is not decrypted in Proxyman, but is in Burp. Here is my Proxyman trying to pass the traffic in it (the SSL proxying is activated, it is just disabled forgateway.apple.com, it's normal, but otherwise it's a*).And here is Burp's interface with the same requests (simply opening the app Kick):

My iPhone has both certificates installed and trusted, and as root. It is jailbroken, but I've disabled SSL Kill switch on the iPhone for the test, so the request should be as on a regular iPhone. iPhone 7, iOS 15.5.