mirror of
https://github.com/ProxymanApp/Proxyman.git
synced 2026-04-27 00:55:57 +03:00
[GH-ISSUE #672] SSL Handshake Failed & enable all SSL requests for remote devices #668
Labels
No labels
Discussion
Feature request
In Progress...
Plugins
Waiting response
Windows
Windows
bug
duplicate
enhancement
feature
good first issue
iOS
macOS 10.11
question
wontfix
✅ Done
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/Proxyman#668
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @rainb3rry on GitHub (Oct 29, 2020).
Original GitHub issue: https://github.com/ProxymanApp/Proxyman/issues/672
Originally assigned to: @NghiaTranUIT on GitHub.
Proxyman version?
2.10.0macOS Version?
10.15.6Steps to reproduce
I'm trying intercept https requests coming from my NoxPlayer android emulator, activated and truested ssl certificates on mac and emulator, added the proxy options to emulator.
I can see requests on
Remote devicestab in Proxyman app, but i gotSSL Handshake Failederror even though certificates installed on devices.The error:
Expected behavior
I just want to see and intercept all requests from my emulator smoothly.
BTW, is there any option to enable all ssl responses for emulator like in apps, I can see only

Enable only this domainbutton, i would like to enable all domains for my emulator too.@NghiaTranUIT commented on GitHub (Oct 29, 2020):
Hi @rainb3rry,
It's the first time I hear "NoxPlayer android emulator". Maybe it requires extra steps to make it works.
Can you try Android Emulator from Android Studio? If you use it, you can run our built-in script (https://docs.proxyman.io/debug-devices/android-device/automatic-script-for-android-emulator) to do all tasks automatically (includes HTTP Proxy, Install, and Trust certificates).
Btw, can you share with us what Android version are you using? Because if it's Android 11+, you have to manually trust the Certificate in the system. Read more at: https://docs.proxyman.io/troubleshooting/my-ios-devices-couldnt-connect-to-proxyman-via-proxy#2-install-and-trust-proxyman-ca-for-android-with-api-30
Regarding the Enable from app in Android Emulator, it's technically impossible since we don't know where the traffic from if it's from the physical or emulator. It's possible on macOS because we can access to iptable.
@NghiaTranUIT commented on GitHub (Oct 29, 2020):
There is one more scenario that your config in your project yet:
Please check out the Step 4 at https://docs.proxyman.io/debug-devices/android-device#android-setup-guide
@rainb3rry commented on GitHub (Oct 29, 2020):
Hey @NghiaTranUIT thanks for quick response.
My android version is 7.1.2 and I want to say I'm not working on my own android app I'm trying to intercept some apps traffic like instagram and https websites on android browser but i cannot see the requests and responses smoothly on the Proxyman app.
I see
CONNECTtext on method column in requests row on remote device tab, i would like to seePOSTorGETrequests instead ofCONNECTand this requests have 999 error code.I'm getting same issue likewise when I try to connect

https://google.com(I enabled ssl for that domain) on android browser,I can see post and get requests for mac apps perfectly but i cannot see for 192.168.2.112 remote device (Noxplayer emulator).
Btw, i see my mac name on certificate that installed android side, is that okay?

@NghiaTranUIT commented on GitHub (Oct 29, 2020):
So, if you're trying to intercept other apps (not the one you're own) from Android. It's impossible unfortunately (even though it's possible in iOS)
Because Android requires configurations in network_security_config.xml and AndroidManifest.xml in order to intercept the HTTPS Traffic.
Therefore, you see SSL Error. It's correct behavior
@rainb3rry commented on GitHub (Oct 29, 2020):
Hmm, so i cannot intercept even in browser actions (ssl websites) on android? It's was doing that on Burp Suite.
So, can I do that and ios apps on external IOS device?
Thanks.
@rainb3rry commented on GitHub (Oct 29, 2020):
I tried on IOS now and it's worked on safari browser for ssl websites but I'm getting same error on instagram app, that's because of some development settings of the instagram app?
If so, how they intercept a mobile app API structure and write an unofficial API based the mobile app API (like https://github.com/dilame/instagram-private-api)
Edit: I tried on another app and it's worked beautifully, digressive but how can I see instagram app API do you know 😂 like above repository.
Thanks for your help.
@NghiaTranUIT commented on GitHub (Oct 29, 2020):
Yay, famous iOS apps are already used SSL Pinning techniques to prevent man-in-the-middle app like Proxyman or Charles to intercept their https traffic. Therefore you couldn’t intercept it unless you are Instagram developers who have the company certificates.
You can by pass it by using a jailbreak iOS device or rooted Android device to force the app to trust Proxyman certificate. Thus, you can get HTTPs traffic 😁