Post Reply 
ProxHTTPSProxyMII: Reloaded
Jun. 06, 2021, 07:30 PM
Post: #361
RE: ProxHTTPSProxyMII: Reloaded
Hi! Tell me with what openssl arguments did you create a self-signed certificate, the one that comes with ProxHTTPSProxyMII (CA.crt)?
Add Thank You Quote this message in a reply
Jun. 18, 2021, 03:20 PM
Post: #362
RE: ProxHTTPSProxyMII: Reloaded
I believe whenever (Last Visit: Dec. 02, 2020 02:20 AM) created it.
My copy of it expires September 30, 2025.
Add Thank You Quote this message in a reply
Oct. 12, 2021, 08:28 AM
Post: #363
RE: ProxHTTPSProxyMII: Reloaded
Hi! Recently I have a problem with some sites, like reddit.com and avito.ru, they reject connections with explanation "Too many requests". It's ProxHTTPSProxy problem, because for test I redirected front port to rear. What can I do to fix it?
Add Thank You Quote this message in a reply
Oct. 14, 2021, 12:04 AM
Post: #364
RE: ProxHTTPSProxyMII: Reloaded
Using a ProxHTTPSProxy EXE from years ago, I didn't experience this with Opera portable. I didn't spend hours looking, however.

Have you 'updated'?

(Oct. 12, 2021 08:28 AM)Sudenr Wrote:  Hi! Recently I have a problem with some sites, like reddit.com and avito.ru, they reject connections with explanation "Too many requests". It's ProxHTTPSProxy problem, because for test I redirected front port to rear. What can I do to fix it?
Add Thank You Quote this message in a reply
Oct. 14, 2021, 05:05 PM
Post: #365
RE: ProxHTTPSProxyMII: Reloaded
Updated to Python 3.10, with urllib3==1.24 and problem is gone.
Add Thank You Quote this message in a reply
Mar. 04, 2022, 01:36 PM
Post: #366
RE: ProxHTTPSProxyMII: Reloaded
(Jul. 29, 2014 09:44 AM)whenever Wrote:  Created to provide modern nag-free HTTPS connections for an HTTP proxy, ProxHTTPSProxyMII is the reinvention of the ProxHTTPSProxy.

How it works
----
[Image: HowItWorks.gif]

Eligible HTTP Proxies
----

* The Proxomitron, for which ProxHTTPSProxy was created Smile!
* Any that have the ability to forward all requests with a "Tagged:ProxHTTPSProxyMII FrontProxy/*" header to the ProxHTTPSProxyMII rear server.
* Any that can be ran as two instances, one for true http and another for "tagged" http
* Any that will only be used to monitor https traffic

Install
----

* ProxHTTPSProxy's "CA.crt" to the Client's store of trusted certificate authorities.

Configure
----

* The Client to use the ProxHTTPSProxy front server at 127.0.0.1 on port 8079 for secure connections.
* The HTTP proxy to receive requests at 127.0.0.1 on port 8080.
* The HTTP proxy to forward requests to the ProxHTTPSProxy rear server at 127.0.0.1 on port 8081.
* Edit "Config.ini" to change these requirements.

Execute
----

ProxHTTPSProxy.exe to start.

Remember
----

Be aware and careful! Use a direct connection when you don't want any mistakes made.

Use at your own risk!

Have fun!

Proxomitron Tips
================

To use
----

* Add the ProxHTTPSProxy rear server to the Proxomitron's list of external proxies

Code:
127.0.0.1:8081 ProxHTTPSProxyMII

* Add to Proxomitron's "Bypass URLs that match this expression" field if it is empty

Code:
$OHDR(Tagged:ProxHTTPSProxyMII FrontProxy/*)$SETPROXY(127.0.0.1:8081)(^)

* Add to the beginning of the entry in Proxomitron's "Bypass URLs that match this expression" field if it is **not** empty

Code:
$OHDR(Tagged:ProxHTTPSProxyMII FrontProxy/*)$SETPROXY(127.0.0.1:8081)(^)|

Tips
----

* Proxomitron always executes some commands in "Bypass URLs that match this expression" field. Adding the entry there allows the Proxomitron to use the rear server when in Bypass mode.

This undocumented feature brings many possibilities but remember, an actual match triggers bypass of filtering!

- $OHDR(Tagged:ProxHTTPSProxyMII FrontProxy/*) checks for the header that indicates an https request.
- $SETPROXY(127.0.0.1:8081) is executed when found.
- (^) expression never matches.

* Identify https connections by testing for the "Tagged" request header that the ProxHTTPSProxy front server adds to the request.

Code:
$OHDR(Tagged:ProxHTTPSProxyMII FrontProxy/*)

* For local file requests, use an expression like

Code:
$USEPROXY(false)$RDIR(http://local.ptron/killed.gif)

* Before redirecting "Tagged" connections to external resources consider removing the "Tagged" header.

* If needed, the Proxomitron can still do https. After adding the ssl files to the Proxomitron, use a header filter like

Code:
[HTTP headers]
  In = FALSE
  Out = TRUE
  Key = "Tagged: Use Proxomitron for https://badcert.com"
  URL = "badcert.com$OHDR(Tagged:ProxHTTPSProxyMII FrontProxy/*)$USEPROXY(false)$RDIR(https://badcert.com)"

This filter also removes the "Tagged" header.

For the current sidki set
----

1. Add the following two lines to Exceptions-U

Code:
$OHDR(Tagged:ProxHTTPSProxyMII FrontProxy/*)$SET(keyword=$GET(keyword)i_proxy:3.)(^)
~(^$TST(keyword=i_proxy:[03].))$OHDR(Tagged:ProxHTTPSProxyMII FrontProxy/*)$SET(keyword=$GET(keyword)i_proxy:3.)(^)

2. Redirect connections to http resources with an expression like

Code:
$USEPROXY(false)$SET(keyword=i_proxy:0.)$RDIR(http://local.ptron/killed.gif)

Changelog

Quote:Version 1.5 (20180616)
--------------
+ SubjectAltNames support for DNS and IP
- Leading '*' in commonname.
* Generated cert's Subject field still uses '*' due to some hosts using more characters than allowed.
Example: 18cfdfd73150f69310ab-4d842a0601d0ae955a714605e7fb6d6f.ssl.cf2.rackcdn.com.

Version 1.4 (20160112)
--------------
+ Socks proxy support (needs urllib3 >= 1.14)
* Certifications are now v3 instead of v1

Version 1.3.1 (20151001)
--------------
* Certifications are now signed via SHA256 instead of SHA1

Version 1.3 (20150114)
--------------
+ Each request has a number ranged from 001 to 999 for reference. 000 is reserved for SSL requests not MITMed like those in [BLACKLIST] and [SSL Pass-Thru] sections.
+ Log window now displays the length of the bytes submitted in POST method

Version 1.2 (20141221)
--------------
+ Content is streamed to client, while not cached before sending
* Fix config auto reload
* Less exception traceback dumped

Version 1.1 (20141024)
--------------
+ Support URL bypass
+ Handle both HTTP and HTTPS
+ Auto reload config upon chagnes

Version 1.0 (20140729)
--------------
Initial release

Download
link

link to 'advanced' version
'advanced' lacks the start up 'hard error' for the Certs directory.
http://www.prxbx.com/forums/showthread.php?tid=2172&pid=19296#pid19296 .

Misc
To hide the console window: http://prxbx.com/forums/showthread.php?t...5#pid17955
Hello, I'm new to this forum. Where can version 1.1 and 1.2 be downloaded?
Add Thank You Quote this message in a reply
Mar. 04, 2022, 02:52 PM
Post: #367
RE: ProxHTTPSProxyMII: Reloaded
Can't find them in my archives (external HDD).
Will look again on burnt discs, but that might take a day or two.
Add Thank You Quote this message in a reply
Mar. 06, 2022, 08:21 PM
Post: #368
RE: ProxHTTPSProxyMII: Reloaded
(Mar. 04, 2022 02:52 PM)ProxRocks Wrote:  Can't find them in my archives (external HDD).
Will look again on burnt discs, but that might take a day or two.

OK thanks!
Add Thank You Quote this message in a reply
Mar. 07, 2022, 04:30 PM
Post: #369
RE: ProxHTTPSProxyMII: Reloaded
Looks like I don't have it Sad
Add Thank You Quote this message in a reply
Mar. 21, 2022, 03:46 AM (This post was last modified: Mar. 21, 2022 03:54 AM by cattleyavns.)
Post: #370
RE: ProxHTTPSProxyMII: Reloaded
(Mar. 04, 2022 01:36 PM)maile3241 Wrote:  Hello, I'm new to this forum. Where can version 1.1 and 1.2 be downloaded?

I still have 1.1, a and b (Python, but you can compile to Windows Executable with py2exe):


.zip  ProxHTTPSProxyMII_py 1.1.zip (Size: 202.67 KB / Downloads: 246)

.zip  ProxHTTPSProxyMII_py 1.1a.zip (Size: 202.93 KB / Downloads: 234)

.zip  ProxHTTPSProxyMII_py 1.1b.zip (Size: 203.36 KB / Downloads: 249)

And 1.2 (exe): http://www.proxfilter.net/proxhttpsproxy...%201.2.zip
Add Thank You Quote this message in a reply
[-] The following 1 user says Thank You to cattleyavns for this post:
amy
Post Reply 


Forum Jump: