Skip to content

Commit dfb2b27

Browse files
errorxyzmhils
andauthored
Updates docs for DNS and HTTP/3 mode (mitmproxy#7474)
* Update docs * fix typo * fix capitalization --------- Co-authored-by: Maximilian Hils <git@maximilianhils.com>
1 parent ee1ead7 commit dfb2b27

2 files changed

Lines changed: 9 additions & 13 deletions

File tree

docs/src/content/concepts-modes.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -268,7 +268,7 @@ would establish a raw TCP proxy.
268268
- Want to know what goes on over (D)TLS (without HTTP)? With mitmproxy's raw
269269
traffic support you can. Use `--mode reverse:tls://example.com:1234` to
270270
spawn a TCP instance that connects to `example.com:1234` using TLS, and
271-
`--mode reverse:dtls://example.com:1234` to use UDP and DTLS respectively instead.
271+
`--mode reverse:dtls://example.com:1234` to use UDP and DTLS respectively instead.
272272
Incoming client connections can either use (D)TLS themselves or raw TCP/UDP.
273273
In case you want to inspect raw traffic only for some hosts and HTTP for
274274
others, have a look at the [tcp_hosts]({{< relref "concepts-options" >}}#tcp_hosts)
@@ -343,12 +343,10 @@ mitmdump --mode dns
343343
```
344344

345345
This mode will listen for incoming DNS queries and use the resolve
346-
capabilities of your operation system to return an answer.
347-
By default port 53 will be used. To specify a different port, say 5353,
346+
capabilities of your operating system to return an answer. For A/AAAA
347+
queries you can opt to ignore the system's hosts file using the
348+
[`dns_use_hosts_file`]({{< relref "concepts-options">}}#dns_use_hosts_file)
349+
option. Custom name servers for lookups can be specified using the
350+
[`dns_name_servers`]({{< relref "concepts-options" >}}#dns_name_servers)
351+
option. By default port 53 will be used. To specify a different port, say 5353,
348352
use `--mode dns@5353`.
349-
350-
Since the lookup API is limited to turning host names into IP addresses
351-
and vice-versa, only A, AAAA, PTR and CNAME queries are supported.
352-
You can, however, use reverse mode to specify an upstream server and
353-
unlock all query types. For example, to use Google's Public DNS server
354-
specify `--mode reverse:dns://8.8.8.8`.

docs/src/content/concepts-protocols.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Most protocols can be disabled by toggling the respective [option]({{< relref co
1313

1414
## HTTP/1
1515

16-
HTTP/1.0 and HTTP/1.1 support in mitmproxy is based on our custom HTTP stack based on
16+
HTTP/1.0 and HTTP/1.1 support in mitmproxy is based on our custom HTTP stack based on
1717
[h11](https://github.com/python-hyper/h11), which is particularly robust to HTTP syntax
1818
errors. Protocol violations are often deliberately forwarded or inserted at the proxy.
1919

@@ -36,7 +36,7 @@ server does not speak HTTP/2, mitmproxy seamlessly translates messages to HTTP/1
3636
## HTTP/3
3737

3838
HTTP/3 support in mitmproxy is based on [aioquic](https://github.com/aiortc/aioquic). Mitmproxy's HTTP/3 functionality
39-
is still experimental and only available in reverse proxy mode.
39+
is available in reverse proxy, local and WireGuard mode.
4040

4141
##### Known Limitations
4242

@@ -64,9 +64,7 @@ DNS support in mitmproxy is based on a custom DNS implementation.
6464
##### Known Limitations
6565

6666
- *Replay*: Client or server replay is not possible yet.
67-
- mitmproxy current does not support DNS over TCP.
6867
- We have not started any work on DoT/DoH/DoQ (DNS-over-TLS/HTTPS/QUIC) yet. Contributions are welcome.
69-
- We have not started any work on stripping ESNI or HTTPS RR records yet. Contributions are welcome.
7068

7169
## Generic TCP/TLS Proxy
7270

0 commit comments

Comments
 (0)