mirror of
https://github.com/ProxymanApp/Proxyman.git
synced 2026-04-27 17:15:49 +03:00
[GH-ISSUE #1905] DNS spoofing with custom certificate doesn't work unless connecting before #1896
Labels
No labels
Discussion
Feature request
In Progress...
Plugins
Waiting response
Windows
Windows
bug
duplicate
enhancement
feature
good first issue
iOS
macOS 10.11
question
wontfix
✅ Done
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/Proxyman#1896
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @nihaals on GitHub (Jan 13, 2024).
Original GitHub issue: https://github.com/ProxymanApp/Proxyman/issues/1905
Originally assigned to: @NghiaTranUIT on GitHub.
Description
When using DNS spoofing to map a HTTPS request to another IP with a certificate that is not normally trusted, Proxyman gives "Could not resolve the host name. Double check the domain or change DNS Setting might fix it.", even if the certificate is trusted. Disabling the spoof, sending a request to the host and then enabling the spoof again works.
Steps to Reproduce
tls internal) forexample.comexample.compointing to the IP of the HTTPS serverexample.comopenssl genrsa -out root_ca_key.pem 2048andopenssl req -x509 -sha256 -new -nodes -key root_ca_key.pem -days 365 -out root_ca_cert.pemCurrent Behavior
The request fails and requires disabling, connecting and re-enabling.
Expected Behavior
The request just works (like it does outside of Proxyman).
Environment
@nihaals commented on GitHub (Feb 1, 2024):
Unsure why as there hasn't been a new update but this all of a sudden works fine now.
@NghiaTranUIT commented on GitHub (Feb 2, 2024):
@nihaals Thanks for letting me know. If you're using v4.16.0, it's the latest version.