sudo ln -s /usr/bin/basename /bin/basename sudo ln -s bin/bash /usr/bin/bash sudo ln -s /usr/bin/rpm /bin/rpm sudo ln -s /usr/bin/awk /bin/awk sudo ln -s /usr/lib/x86_64-linux-gnu /usr/lib64 sudo ln -s /usr/lib/x86_64-linux-gnu/libstdc++.so.6 /lib64/libstdc++.so.6 sudo ln -s /lib/x86_64-linux-gnu/libgcc_s.so.1 /lib64/libgcc_s.so.1 sudo ln -s /usr/lib/i386-linux-gnu/libpthread_nonshared.a /usr/lib/libpthread_nonshared.a sudo ln -s /lib/lsb/init-functions /etc/init.d/functions sudo ln -sf /bin/bash /bin/sh
openssl req -newkey rsa:2048 -nodes -keyout ssl.key -x509 -days 3650 -out ssl.crt -subj "/C=CN/ST=GD/L=GZ/O=SwallowNetworks/OU=IT/CN=*.example.com/emailAddressemail@example.com" -addext "extendedKeyUsage = serverAuth, clientAuth" -addext "subjectAltName = DNS.1:*.google.com, DNS.2:*.g.com, IP:184.108.40.206, email:firstname.lastname@example.org, URI:https://feng.cmd.gd/" -extensions v3_req -sha384
req #引用openssl官方文档介绍: PKCS#10 certificate request and certificate generating utility -newkey rsa:2048 #生成RSA 2048bit的key -nodes #key不要密码, 删掉则要密码 -keyout ssl.key #保存key到文件 -x509 #创建证书, 删掉则创建证书请求CSR -days 3650 #创建证书使用, CSR无需 -out ssl.crt #保存证书到文件 -subj "/C=CN/ST=GD/L=GZ/O=SwallowNetworks/OU=IT/CN=*.example.com/emailAddressemail@example.com" #使用者 -addext "extendedKeyUsage = serverAuth, clientAuth" #增加扩展提供服务器认证, 客户端认证. 可配置值: Value Meaning ----- ------- serverAuth SSL/TLS Web Server Authentication. clientAuth SSL/TLS Web Client Authentication. codeSigning Code signing. emailProtection E-mail Protection (S/MIME). timeStamping Trusted Timestamping OCSPSigning OCSP Signing ipsecIKE ipsec Internet Key Exchange msCodeInd Microsoft Individual Code Signing (authenticode) msCodeCom Microsoft Commercial Code Signing (authenticode) msCTLSign Microsoft Trust List Signing msEFS Microsoft Encrypted File System -addext "subjectAltName = DNS.1:*.google.com, DNS.2:*.g.com, IP:220.127.116.11, email:firstname.lastname@example.org, URI:https://feng.cmd.gd/" #SAN 俗称多域 include email (an email address) URI a uniform resource indicator, DNS (a DNS domain name), RID (a registered ID: OBJECT IDENTIFIER), IP (an IP address), dirName (a distinguished name) and otherName. -addext "keyUsage=digitalSignature, nonRepudiation" #限定key的使用 The supported names are: digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment, keyAgreement, keyCertSign, cRLSign, encipherOnly and decipherOnly. -extensions v3_req #约束证书使用, openssl.conf默认配置是终端证书 basicConstraints = CA:FALSE, keyUsage = nonRepudiation, digitalSignature, keyEncipherment -sha384 #使用sha384摘要算法签名CSR
可信平台模块（英语：Trusted Platform Module，缩写：TPM）是一项安全密码处理器的国际标准，旨在使用设备中集成的专用微控制器（安全硬件）处理设备中的加密密钥。TPM的技术规范由称为可信计算组织（TCG）的信息业联合体编写。国际标准化组织（ISO）和国际电工委员会（IEC）已于2009年将规范标准化为ISO/IEC 11889。
由于TPM是外国技术, 在中国售卖含有TPM技术的芯片必须要取得《商用密码产品销售许可证》, 出现自主开发的可信密码模块（英语: Trusted Cryptography Module，缩写: TCM）
英特尔®平台信任技术 (英语: Intel Platform Trust Technology, 缩写: Intel® PTT), 该项技术不需要另外加装模块, 已经在CPU中内置
Intel’s PTT was Introduced in 2013 on select fourth-generation Intel Core processors and chipsets, including Intel Haswell ULT multichip packages, as well as on Atom-based, system-on-a-chip solutions like Bay Trail.
# cat /etc/sysctl.d/00-oracle.conf net.core.wmem_max = 1048576 net.core.wmem_default = 262144 net.core.rmem_max = 4194304 net.core.rmem_default = 262144 fs.file-max = 6815744 kernel.sem = 250 32000 100 128 #SEMMSL SEMMNS SEMOPM SEMMNI # cat /etc/hosts 192.168.0.90 debian debian.feng.local
Note: The latest stable version is the 1.1.1 series. This is also our Long Term Support (LTS) version, supported until 11th September 2023. ...
当前最新版本 openssl 1.1.1c
Usage: Configure [no-<cipher> ...] [enable-<cipher> ...] [-Dxxx] [-lxxx] [-Lxxx] [-fxxx] [-Kxxx] [no-hw-xxx|no-hw] [[no-]threads] [[no-]shared] [[no-]zlib|zlib-dynamic] [no-asm] [no-egd] [sctp]  [--prefix=DIR] [--openssldir=OPENSSLDIR] [--with-xxx[=vvv]] [--config=FILE] os/compiler[:flags]
Configuration Options ---------------------
There are several options to ./config (or ./Configure) to customize
the build (note that for Windows, the defaults for --prefix and
--openssldir depend in what configuration is used and what Windows implementation OpenSSL is built on. More notes on this in NOTES.WIN):
Don't build with support for deprecated APIs below the specified version number. For example "--api=1.1.0" will remove support for all APIS that were deprecated in OpenSSL version 1.1.0 or below.
The PREFIX to include in front of commands for your toolchain. It's likely to have to end with dash, e.g. a-b-c- would invoke GNU compiler as a-b-c-gcc, etc. Unfortunately cross-compiling is too case-specific to put together one-size-fits-all instructions. You might have to pass more flags or set up environment variables to actually make it work. Android and iOS cases are discussed in corresponding Configurations/15-*.conf files. But there are cases when this option alone is sufficient. For example to build the mingw64 target on Linux "--cross-compile-prefix=x86_64-w64-mingw32-" works. Naturally provided that mingw packages are installed. Today Debian and Ubuntu users have option to install a number of prepackaged cross-compilers along with corresponding run-time and development packages for "alien" hardware. To give another example "--cross-compile-prefix=mipsel-linux-gnu-" suffices in such case. Needless to mention that you have to invoke ./Configure, not ./config, and pass your target name explicitly. Also, note that --openssldir refers to target's file system, not one you are building on.
Build OpenSSL with debugging symbols and zero optimization level.
The name of the directory under the top of the installation directory tree (see the --prefix option) where libraries will be installed. By default this is "lib". Note that on Windows only ".lib" files will be stored in this location. dll files will always be installed to the "bin" directory.
Directory for OpenSSL configuration files, and also the default certificate and key store. Defaults are: Unix: /usr/local/ssl Windows: C:\Program Files\Common Files\SSL or C:\Program Files (x86)\Common Files\SSL OpenVMS: SYS$COMMON:[OPENSSL-COMMON]
The top of the installation directory tree. Defaults are: Unix: /usr/local Windows: C:\Program Files\OpenSSL or C:\Program Files (x86)\OpenSSL OpenVMS: SYS$COMMON:[OPENSSL-'version']
Build OpenSSL without debugging symbols. This is the default.
This is a developer flag that switches on various compiler options recommended for OpenSSL development. It only works when using gcc or clang as the compiler. If you are developing a patch for OpenSSL then it is recommended that you use this option where possible.
The directory for the location of the zlib include file. This option is only necessary if enable-zlib (see below) is used and the include file is not already on the system include path.
On Unix: this is the directory containing the zlib library. If not provided the system library path will be used. On Windows: this is the filename of the zlib library (with or without a path). This flag must be provided if the zlib-dynamic option is not also used. If zlib-dynamic is used then this flag is optional and a default value ("ZLIB1") is used if not provided. On VMS: this is the filename of the zlib library (with or without a path). This flag is optional and if not provided then "GNV$LIBZSHR", "GNV$LIBZSHR32" or "GNV$LIBZSHR64" is used by default depending on the pointer size chosen.
A comma separated list of seeding methods which will be tried by OpenSSL in order to obtain random input (a.k.a "entropy") for seeding its cryptographically secure random number generator (CSPRNG). The current seeding methods are: os: Use a trusted operating system entropy source. This is the default method if such an entropy source exists. getrandom: Use the L<getrandom(2)> or equivalent system call. devrandom: Use the the first device from the DEVRANDOM list which can be opened to read random bytes. The DEVRANDOM preprocessor constant expands to "/dev/urandom","/dev/random","/dev/srandom" on most unix-ish operating systems. egd: Check for an entropy generating daemon. rdcpu: Use the RDSEED or RDRAND command if provided by the CPU. librandom: Use librandom (not implemented yet). none: Disable automatic seeding. This is the default on some operating systems where no suitable entropy source exists, or no support for it is implemented yet. For more information, see the section 'Note on random number generation' at the end of this document.
Don't build the AFALG engine. This option will be forced if on a platform that does not support AFALG.
Build with the Address sanitiser. This is a developer option only. It may not work on all platforms and should never be used in production environments. It will only work when used with gcc or clang and should be used in conjunction with the no-shared option.
Do not use assembler code. This should be viewed as debugging/trouble-shooting option rather than production. On some platforms a small amount of assembler code may still be used even with this option.
Do not build support for async operations.
Don't automatically load all supported ciphers and digests. Typically OpenSSL will make available all of its supported ciphers and digests. For a statically linked application this may be undesirable if small executable size is an objective. This only affects libcrypto. Ciphers and digests will have to be loaded manually using EVP_add_cipher() and EVP_add_digest() if this option is used. This option will force a non-shared build.
Don't automatically load all libcrypto/libssl error strings. Typically OpenSSL will automatically load human readable error strings. For a statically linked application this may be undesirable if small executable size is an objective.
Don't automatically load the default openssl.cnf file. Typically OpenSSL will automatically load a system config file which configures default ssl options.
While testing, generate C++ buildtest files that simply check that the public OpenSSL header files are usable standalone with C++. Enabling this option demands extra care. For any compiler flag given directly as configuration option, you must ensure that it's valid for both the C and the C++ compiler. If not, the C++ build test will most likely break. As an alternative, you can use the language specific variables, CFLAGS and CXXFLAGS.
Don't build the CAPI engine. This option will be forced if on a platform that does not support CAPI.
Don't build support for CMS features
Don't build support for SSL/TLS compression. If this option is left enabled (the default), then compression will only work if the zlib or zlib-dynamic options are also chosen.
Build support for debugging memory allocated via OPENSSL_malloc() or OPENSSL_zalloc().
As for crypto-mdebug, but additionally provide backtrace information for allocated memory. TO BE USED WITH CARE: this uses GNU C functionality, and is therefore not usable for non-GNU config targets. If your build complains about the use of '-rdynamic' or the lack of header file execinfo.h, this option is not for you. ALSO NOTE that even though execinfo.h is available on your system (through Gnulib), the functions might just be stubs that do nothing.
Don't build support for Certificate Transparency.
Don't build with support for any deprecated APIs. This is the same as using "--api" and supplying the latest version number.
Don't build support for datagram based BIOs. Selecting this option will also force the disabling of DTLS.
Build the /dev/crypto engine. It is automatically selected on BSD implementations, in which case it can be disabled with no-devcryptoeng.
Don't build the dynamically loaded engines. This only has an effect in a "shared" build
Don't build support for Elliptic Curves.
Don't build support for binary Elliptic Curves
Enable support for optimised implementations of some commonly used NIST elliptic curves. This is only supported on platforms: - with little-endian storage of non-byte types - that tolerate misaligned memory references - where the compiler: - supports the non-standard type __uint128_t - defines the built-in macro __SIZEOF_INT128__
Build support for gathering entropy from EGD (Entropy Gathering Daemon).
Don't build support for loading engines.
Don't compile in any error strings.
Enable building of integration with external test suites. This is a developer option and may not work on all platforms. The only supported external test suite at the current time is the BoringSSL test suite. See the file test/README.external for further details.
Don't compile in filename and line number information (e.g. for errors and memory allocation).
Build with support for fuzzing using either libfuzzer or AFL. These are developer options only. They may not work on all platforms and should never be used in production environments. See the file fuzz/README.md for further details.
Don't build support for GOST based ciphersuites. Note that if this feature is enabled then GOST ciphersuites are only available if the GOST algorithms are also available through loading an externally supplied engine.
Don't build the padlock engine.
Don't generate dependencies.
Don't build support for writing multiple records in one go in libssl (Note: this is a different capability to the pipelining functionality).
Don't build support for the NPN TLS extension.
Don't build support for OCSP.
Don't build with support for Position Independent Code.
no-pinshared By default OpenSSL will attempt to stay in memory
process exits. This is so that libcrypto and libssl can be properly cleaned up automatically via an "atexit()" handler. The handler is registered by libcrypto and cleans up both libraries. On some platforms the atexit() handler will run on unload of libcrypto (if it has been dynamically loaded) rather than at process exit. This option can be used to stop OpenSSL from attempting to stay in memory until the process exits. This could lead to crashes if either libcrypto or libssl have already been unloaded at the point that the atexit handler is invoked, e.g. on a platform which calls atexit() on unload of the library, and libssl is unloaded before libcrypto then a crash is likely to happen. Applications can suppress running of the atexit() handler at run time by using the OPENSSL_INIT_NO_ATEXIT option to OPENSSL_init_crypto(). See the man page for it for further details.
Don't use POSIX IO capabilities.
Don't build support for Pre-Shared Key based ciphersuites.
Don't use hardware RDRAND capabilities.
Don't build support for RFC3779 ("X.509 Extensions for IP Addresses and AS Identifiers")
Build support for SCTP
Do not create shared libraries, only static ones. See "Note on shared libraries" below.
Don't build support for socket BIOs
Don't build support for SRP or SRP based ciphersuites.
Don't build SRTP support
Exclude SSE2 code paths from 32-bit x86 assembly modules. Normally SSE2 extension is detected at run-time, but the decision whether or not the machine code will be executed is taken solely on CPU capability vector. This means that if you happen to run OS kernel which does not support SSE2 extension on Intel P4 processor, then your application might be exposed to "illegal instruction" exception. There might be a way to enable support in kernel, e.g. FreeBSD kernel can be compiled with CPU_ENABLE_SSE, and there is a way to disengage SSE2 code paths upon application start-up, but if you aim for wider "audience" running such kernel, consider no-sse2. Both the 386 and no-asm options imply no-sse2.
Build with the SSL Trace capabilities (adds the "-trace" option to s_client and s_server).
Don't build the statically linked engines. This only has an impact when not built "shared".
Don't use anything from the C header file "stdio.h" that makes use of the "FILE" type. Only libcrypto and libssl can be built in this way. Using this option will suppress building the command line applications. Additionally since the OpenSSL tests also use the command line applications the tests will also be skipped.
Don't build test programs or run any test.
Don't try to build with support for multi-threaded applications.
Build with support for multi-threaded applications. Most platforms will enable this by default. However if on a platform where this is not the case then this will usually require additional system-dependent options! See "Note on multi-threading" below.
Don't build Time Stamping Authority support.
Build with the Undefined Behaviour sanitiser. This is a developer option only. It may not work on all platforms and should never be used in production environments. It will only work when used with gcc or clang and should be used in conjunction with the "-DPEDANTIC" option (or the --strict-warnings option).
Don't build with the "UI" capability (i.e. the set of features enabling text based prompts).
Enable additional unit test APIs. This should not typically be used in production deployments.
Build support for SSL/TLS ciphers that are considered "weak" (e.g. RC4 based ciphersuites).
Build with support for zlib compression/decompression.
Like "zlib", but has OpenSSL load the zlib library dynamically when needed. This is only supported on systems where loading of shared libraries is supported.
In 32-bit x86 builds, when generating assembly modules, use the 80386 instruction set only (the default x86 code is more efficient, but requires at least a 486). Note: This doesn't affect code generated by compiler, you're likely to complement configuration command line with suitable compiler-specific option.
Don't build support for negotiating the specified SSL/TLS protocol (one of ssl, ssl3, tls, tls1, tls1_1, tls1_2, tls1_3, dtls, dtls1 or dtls1_2). If "no-tls" is selected then all of tls1, tls1_1, tls1_2 and tls1_3 are disabled. Similarly "no-dtls" will disable dtls1 and dtls1_2. The "no-ssl" option is synonymous with "no-ssl3". Note this only affects version negotiation. OpenSSL will still provide the methods for applications to explicitly select the individual protocol versions.
As for no-<prot> but in addition do not build the methods for applications to explicitly select individual protocol versions. Note that there is no "no-tls1_3-method" option because there is no application method for TLSv1.3. Using individual protocol methods directly is deprecated. Applications should use TLS_method() instead.
Build with support for the specified algorithm, where <alg> is one of: md2 or rc5.
Build without support for the specified algorithm, where <alg> is one of: aria, bf, blake2, camellia, cast, chacha, cmac, des, dh, dsa, ecdh, ecdsa, idea, md4, mdc2, ocb, poly1305, rc2, rc4, rmd160, scrypt, seed, siphash, sm2, sm3, sm4 or whirlpool. The "ripemd" algorithm is deprecated and if used is synonymous with rmd160.
-Dxxx, -Ixxx, -Wp, -lxxx, -Lxxx, -Wl, -rpath, -R, -framework,
These system specific options will be recognised and passed through to the compiler to allow you to define preprocessor symbols, specify additional libraries, library directories or other compiler options. It might be worth noting that some compilers generate code specifically for processor the compiler currently executes on. This is not necessarily what you might have in mind, since it might be unsuitable for execution on other, typically older, processor. Consult your compiler documentation. Take note of the VAR=value documentation below and how these flags interact with those variables.
Additional options that are not otherwise recognised are passed through as they are to the compiler as well. Again, consult your compiler documentation. Take note of the VAR=value documentation below and how these flags interact with those variables.
Assignment of environment variable for Configure. These work just like normal environment variable assignments, but are supported on all platforms and are confined to the configuration scripts only. These assignments override the corresponding value in the inherited environment, if there is one. The following variables are used as "make variables" and can be used as an alternative to giving preprocessor, compiler and linker options directly as configuration. The following variables are supported: AR The static library archiver. ARFLAGS Flags for the static library archiver. AS The assembler compiler. ASFLAGS Flags for the assembler compiler. CC The C compiler. CFLAGS Flags for the C compiler. CXX The C++ compiler. CXXFLAGS Flags for the C++ compiler. CPP The C/C++ preprocessor. CPPFLAGS Flags for the C/C++ preprocessor. CPPDEFINES List of CPP macro definitions, separated by a platform specific character (':' or space for Unix, ';' for Windows, ',' for VMS). This can be used instead of using -D (or what corresponds to that on your compiler) in CPPFLAGS. CPPINCLUDES List of CPP inclusion directories, separated the same way as for CPPDEFINES. This can be used instead of -I (or what corresponds to that on your compiler) in CPPFLAGS. HASHBANGPERL Perl invocation to be inserted after '#!' in public perl scripts (only relevant on Unix). LD The program linker (not used on Unix, $(CC) is used there). LDFLAGS Flags for the shared library, DSO and program linker. LDLIBS Extra libraries to use when linking. Takes the form of a space separated list of library specifications on Unix and Windows, and as a comma separated list of libraries on VMS. RANLIB The library archive indexer. RC The Windows resource compiler. RCFLAGS Flags for the Windows resource compiler. RM The command to remove files and directories. These cannot be mixed with compiling / linking flags given on the command line. In other words, something like this isn't permitted. ./config -DFOO CPPFLAGS=-DBAR -DCOOKIE Backward compatibility note: To be compatible with older configuration scripts, the environment variables are ignored if compiling / linking flags are given on the command line, except for these: AR, CC, CXX, CROSS_COMPILE, HASHBANGPERL, PERL, RANLIB, RC and WINDRES For example, the following command will not see -DBAR: CPPFLAGS=-DBAR ./config -DCOOKIE However, the following will see both set variables: CC=gcc CROSS_COMPILE=x86_64-w64-mingw32- \ ./config -DCOOKIE If CC is set, it is advisable to also set CXX to ensure both C and C++ compilers are in the same "family". This becomes relevant with 'enable-external-tests' and 'enable-buildtest-c++'.
Reconfigure from earlier data. This fetches the previous command line options and environment from data saved in "configdata.pm", and runs the configuration process again, using these options and environment. Note: NO other option is permitted together with "reconf". This means that you also MUST use "./Configure" (or what corresponds to that on non-Unix platforms) directly to invoke this option. Note: The original configuration saves away values for ALL environment variables that were used, and if they weren't defined, they are still saved away with information that they weren't originally defined. This information takes precedence over environment variables that are defined when reconfiguring.
make make test make install_sw
ECC publickey, SHA384 signature hash algorithm.
openssl ecparam -genkey -name secp384r1 -out private/cakey.pem openssl req -new -sha384 -x509 -key private/cakey.pem -out cacert.pem
openssl ecparam -genkey -name secp384r1 -out feng.cmd.gd.key openssl req -new -sha256 -key feng.cmd.gd.key -out feng.cmd.gd.csr openssl ca -in nginx.csr -out nginx.crt
openssl req -new -sha256 \ -key feng.cmd.gd.key \ -subj "/C=CN/ST=Beijing/L=Beijing/O=UnitedStack/OU=Devops/CN=www.ustack.com" \ -reqexts SAN \ -config <(cat /etc/pki/tls/openssl.cnf \ <(printf "[SAN]\nsubjectAltName=DNS:www.ustack.in,DNS:www.test.ustack.com")) \ -out ustack.csr openssl ca -in ustack.csr \ -extensions SAN \ -config <(cat /etc/pki/tls/openssl.cnf \ <(printf "[SAN]\nsubjectAltName=DNS:www.ustack.in,DNS:www.test.ustack.com")) \ -out ustack.crt
openssl x509 -noout -fingerprint -sha256 -inform pem -in cacert.pem openssl x509 -noout -fingerprint -sha1 -inform pem -in cacert.pem
技术讨论 | Apostille：让假证书以假乱真的证书伪造工具
[INFO] Copying bctls-jdk15on-1.58.jar to /root/apostille/target/bctls-jdk15on-1.58.jar [INFO] Copying hamcrest-core-1.3.jar to /root/apostille/target/hamcrest-core-1.3.jar [INFO] Copying bcprov-jdk15on-1.58.jar to /root/apostille/target/bcprov-jdk15on-1.58.jar [INFO] Copying bcpkix-jdk15on-1.58.jar to /root/apostille/target/bcpkix-jdk15on-1.58.jar [INFO] Copying junit-4.12.jar to /root/apostille/target/junit-4.12.jar [INFO] ------------------------------------------------------------------------ [INFO] BUILD SUCCESS [INFO] ------------------------------------------------------------------------ [INFO] Total time: 03:11 min [INFO] Finished at: 2019-05-07T14:52:12+08:00 [INFO] ------------------------------------------------------------------------
java -jar target/apostille-1.0-SNAPSHOT.jar example.com:443 dstkeystore.jks kspassword keypassword > example.com.key+chain
# java -jar target/apostille-1.0-SNAPSHOT.jar feng.cmd.gd:443 fake-cert-feng.cmd.gd.jks kspassword keypassword > fake-feng.cmd.gd.key+chain Provided keystore now has the following aliases: Alias: dst root ca x3, added Tue May 07 14:56:35 HKT 2019 Alias: cmd.gd, added Tue May 07 14:56:36 HKT 2019
Key for cmd.gd -----BEGIN EC PRIVATE KEY----- MD...2g== -----END EC PRIVATE KEY----- Certificate 1: Subject = CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US Certificate 1: Issuer = CN=DST Root CA X3, O=Digital Signature Trust Co. -----BEGIN CERTIFICATE----- MI...zQ== -----END CERTIFICATE----- Certificate 0: Subject = CN=cmd.gd Certificate 0: Issuer = CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US -----BEGIN CERTIFICATE----- MI...Ai -----END CERTIFICATE-----
note: output的certificate调转了, Nginx部署的方式是certificate->rootCA->subCA
来看看certificate的属性, 左边是正常由Let's Encrypt颁发的certificate, 右边是clone fake的certificate
克隆ECC貌似有问题 key和certificate校验不过, RSA正常
Google Chrome 版本 76.0.3799.0（正式版本）canary （64 位）
安装后开启web界面 web界面默认8081 proxy默认8080
mitmweb --set web_iface=0.0.0.0
使用mitmproxy也行, 没web方便 调参数较麻烦
iptables -t nat -A PREROUTING -i eth0 -p tcp --dport 443 -j REDIRECT --to-port 8080 ip6tables -t nat -A PREROUTING -i eth0 -p tcp --dport 443 -j REDIRECT --to-port 8080
# openssl s_client -debug -connect feng.cmd.gd:443 CONNECTED(00000003) write to 0x55bcecd42820 [0x55bcecd54610] (303 bytes => 303 (0x12F)) ...... SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-ECDSA-AES256-GCM-SHA384 ...... --- ^C