Open ju916 opened 12 years ago
Rechecked with github version:
$ ./sslsniff -t -c ./certs/ -s 1414 -w x1.log terminate called after throwing an instance of 'BadCertificateException' what(): Could not parse certificate... Abgebrochen
better but still a lacking feature :-)
I found a solution here
http://double-dragon.blogspot.com/2013/01/fixing-sslsniff-problem-host-not-found.html?spref=tw
It's indonesia. But you can translate it. :)
A vaild wildcard certificate in targeted mode leads to invalid DNS queries and programm abortion. Tested with sslsniff version 0.8
Example:
$ sslsniff -t -c ./certs/ -s 1414 -w x1.log terminate called after throwing an instance of 'boost::exception_detail::clone_implboost::exception_detail::error_info_injector'
what(): Host not found (authoritative)
Abgebrochen
DNS-Query is done for: "*.heise.de" and fails.
Solution:
1) support wildcard certs (using the same mechanism already in place for CA mode) OR 2) properly reject wildcard certs with a meaningful error instead of crashing