mitmproxy fails with GOST ciphers — "no shared cipher" #7900
stmeup544-a11y
started this conversation in
General
Replies: 2 comments
-
|
active |
Beta Was this translation helpful? Give feedback.
0 replies
-
|
You may need to adjust https://docs.mitmproxy.org/stable/concepts/options/#ciphers_client. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
I'm trying to intercept traffic from an application that uses both standard and non-standard TLS algorithms. In some cases the
ClientHelloincludes the following cipher suites:These are Russian GOST algorithms. I added the GOST engine implementation to OpenSSL and performed the following tests.
First, I generated a key, CSR and self-signed certificate and started an OpenSSL s_server:
In a second terminal I connected with
openssl s_client:This works: I can generate keys/certs, run the server and connect to it using OpenSSL.
Also I checked available ciphers:
Then I installed mitmproxy and rebuilt the Python
cryptographypackage pointing it to my OpenSSL:However, when I try to intercept the application's traffic, mitmproxy reports:
I also tried to connect to mitmproxy with
openssl s_client:That fails with the same error. Mitmproxy does not send a
ServerHello, it just closes the connection.Do I understand correctly that mitmproxy is unable to generate and present a valid certificate for this request (using GOST algorithms), and therefore closes the connection? Is there any way to make mitmproxy work with these algorithms?
Mitmproxy version: 12.1.2
OpenSSL version: 3.0.13
cryptography package version: 45.0.7
OS: Ubuntu DISTRIB_RELEASE=24.04
Beta Was this translation helpful? Give feedback.
All reactions