@@ -268,7 +268,7 @@ would establish a raw TCP proxy.
268268- Want to know what goes on over (D)TLS (without HTTP)? With mitmproxy's raw
269269 traffic support you can. Use ` --mode reverse:tls://example.com:1234 ` to
270270 spawn a TCP instance that connects to ` example.com:1234 ` using TLS, and
271- ` --mode reverse:dtls://example.com:1234 ` to use UDP and DTLS respectively instead.
271+ ` --mode reverse:dtls://example.com:1234 ` to use UDP and DTLS respectively instead.
272272 Incoming client connections can either use (D)TLS themselves or raw TCP/UDP.
273273 In case you want to inspect raw traffic only for some hosts and HTTP for
274274 others, have a look at the [ tcp_hosts] ({{< relref "concepts-options" >}}#tcp_hosts)
@@ -343,12 +343,10 @@ mitmdump --mode dns
343343```
344344
345345This mode will listen for incoming DNS queries and use the resolve
346- capabilities of your operation system to return an answer.
347- By default port 53 will be used. To specify a different port, say 5353,
346+ capabilities of your operating system to return an answer. For A/AAAA
347+ queries you can opt to ignore the system's hosts file using the
348+ [ ` dns_use_hosts_file ` ] ({{< relref "concepts-options">}}#dns_use_hosts_file)
349+ option. Custom name servers for lookups can be specified using the
350+ [ ` dns_name_servers ` ] ({{< relref "concepts-options" >}}#dns_name_servers)
351+ option. By default port 53 will be used. To specify a different port, say 5353,
348352use ` --mode dns@5353 ` .
349-
350- Since the lookup API is limited to turning host names into IP addresses
351- and vice-versa, only A, AAAA, PTR and CNAME queries are supported.
352- You can, however, use reverse mode to specify an upstream server and
353- unlock all query types. For example, to use Google's Public DNS server
354- specify ` --mode reverse:dns://8.8.8.8 ` .
0 commit comments