You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
$ sslsniff -t -c ./certs/ -s 1414 -w x1.log
terminate called after throwing an instance of 'boost::exception_detail::clone_implboost::exception_detail::error_info_injector<boost::system::system_error >'
what(): Host not found (authoritative)
Abgebrochen
DNS-Query is done for: "*.heise.de" and fails.
Solution:
support wildcard certs (using the same mechanism already in place for CA mode) OR
properly reject wildcard certs with a meaningful error instead of crashing
The text was updated successfully, but these errors were encountered:
$ ./sslsniff -t -c ./certs/ -s 1414 -w x1.log
terminate called after throwing an instance of 'BadCertificateException'
what(): Could not parse certificate...
Abgebrochen
better but still a lacking feature :-)
droe
linked a pull request
Feb 1, 2012
that will
close
this issue
A vaild wildcard certificate in targeted mode leads to invalid DNS queries and programm abortion. Tested with sslsniff version 0.8
Example:
$ sslsniff -t -c ./certs/ -s 1414 -w x1.log
terminate called after throwing an instance of 'boost::exception_detail::clone_implboost::exception_detail::error_info_injector<boost::system::system_error >'
what(): Host not found (authoritative)
Abgebrochen
DNS-Query is done for: "*.heise.de" and fails.
Solution:
The text was updated successfully, but these errors were encountered: