Company
Date Published
Author
Leonardo Barcaroli
Word count
1356
Language
English
Hacker News points
None

Summary

The guide explores the intricate process of inspecting TLS encrypted traffic on an application running on Arch Linux, using a combination of systemd-nspawn containers, mitmproxy, wireshark, and wireguard-tools. The author describes the necessity of this inspection to verify the formatting of requests when tweaking Vector to create the Koyeb log exporter, given the constraints of not being able to downgrade to unencrypted traffic or easily hook into the application's code. The method involves setting up a systemd-nspawn managed container as a transparent proxy, adding a certificate authority to the system's trusted CAs, and using wireguard to facilitate communication between the container and mitmdump. The guide provides detailed steps for configuring the environment, including starting mitmdump to intercept traffic and using wireshark for live traffic inspection, with challenges highlighted in the configuration process of mitmproxy and the benefits of real-time validation of code changes.