Complete rewrite of secubox-app-mitmproxy to use native OpenWrt packages instead of pip runtime installation. New packages created: - mitmproxy (10.0.0) - Native build from GitHub source - python3-mitmproxy-rs (0.5.2) - Rust extension with PyO3 - python3-h11 (0.14.0) - HTTP/1.1 protocol - python3-h2 (4.1.0) - HTTP/2 protocol - python3-hyperframe (6.0.1) - HTTP/2 framing - python3-hpack (4.0.0) - HPACK compression - python3-wsproto (1.2.0) - WebSocket protocol - python3-aioquic (1.0.0) - QUIC/HTTP3 support - python3-pylsqpack (0.3.18) - QPACK encoder - python3-kaitaistruct (0.10) - Binary parsing - python3-publicsuffix2 (2.20191221) - Domain parsing - python3-ldap3 (2.9.1) - LDAP support Changes to secubox-app-mitmproxy: - Removed pip dependency, now uses native +mitmproxy package - Removed wrapper scripts (native binaries from mitmproxy package) - Fixed iptables cleanup to use configured port - Bumped version to 2.0.0 Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
154 lines
3.5 KiB
Bash
154 lines
3.5 KiB
Bash
#!/bin/sh /etc/rc.common
|
|
#
|
|
# mitmproxy init script for OpenWrt
|
|
# Copyright (C) 2025 CyberMind.fr (SecuBox)
|
|
#
|
|
|
|
START=95
|
|
STOP=10
|
|
USE_PROCD=1
|
|
|
|
PROG=/usr/bin/mitmweb
|
|
CONF_DIR=/etc/mitmproxy
|
|
PID_FILE=/var/run/mitmproxy.pid
|
|
|
|
validate_section() {
|
|
uci_load_validate mitmproxy main "$1" "$2" \
|
|
'enabled:bool:0' \
|
|
'mode:string:transparent' \
|
|
'listen_host:string:0.0.0.0' \
|
|
'listen_port:port:8080' \
|
|
'web_port:port:8081' \
|
|
'web_host:string:0.0.0.0' \
|
|
'confdir:string:/etc/mitmproxy' \
|
|
'ssl_insecure:bool:0' \
|
|
'showhost:bool:1' \
|
|
'flow_detail:range(0,4):2'
|
|
}
|
|
|
|
start_mitmproxy() {
|
|
[ "$2" = 0 ] || {
|
|
echo "mitmproxy: validation failed" >&2
|
|
return 1
|
|
}
|
|
|
|
[ "$enabled" = "1" ] || {
|
|
echo "mitmproxy: disabled in config"
|
|
return 0
|
|
}
|
|
|
|
# Create directories
|
|
mkdir -p /tmp/mitmproxy
|
|
mkdir -p /var/lib/mitmproxy
|
|
|
|
procd_open_instance mitmproxy
|
|
procd_set_param command $PROG
|
|
|
|
# Core options
|
|
procd_append_param command --set confdir="$confdir"
|
|
procd_append_param command --listen-host "$listen_host"
|
|
procd_append_param command --listen-port "$listen_port"
|
|
procd_append_param command --web-host "$web_host"
|
|
procd_append_param command --web-port "$web_port"
|
|
procd_append_param command --set flow_detail="$flow_detail"
|
|
|
|
# Mode
|
|
case "$mode" in
|
|
transparent)
|
|
procd_append_param command --mode transparent
|
|
;;
|
|
regular)
|
|
procd_append_param command --mode regular
|
|
;;
|
|
upstream)
|
|
procd_append_param command --mode upstream
|
|
;;
|
|
esac
|
|
|
|
# SSL options
|
|
[ "$ssl_insecure" = "1" ] && procd_append_param command --ssl-insecure
|
|
[ "$showhost" = "1" ] && procd_append_param command --showhost
|
|
|
|
# Capture options
|
|
local save_flows flow_file
|
|
config_get save_flows capture save_flows 0
|
|
config_get flow_file capture flow_file "/tmp/mitmproxy/flows.bin"
|
|
[ "$save_flows" = "1" ] && procd_append_param command -w "$flow_file"
|
|
|
|
procd_set_param respawn
|
|
procd_set_param stdout 1
|
|
procd_set_param stderr 1
|
|
procd_set_param pidfile $PID_FILE
|
|
|
|
procd_close_instance
|
|
|
|
# Setup iptables rules for transparent mode
|
|
[ "$mode" = "transparent" ] && setup_iptables "$listen_port"
|
|
}
|
|
|
|
setup_iptables() {
|
|
local port="$1"
|
|
|
|
# Remove existing rules first
|
|
cleanup_iptables
|
|
|
|
# Get LAN interface
|
|
local lan_ip=$(uci -q get network.lan.ipaddr || echo "192.168.1.1")
|
|
|
|
# Redirect HTTP traffic
|
|
iptables -t nat -A PREROUTING -i br-lan -p tcp --dport 80 \
|
|
-j REDIRECT --to-port "$port" 2>/dev/null
|
|
|
|
# Redirect HTTPS traffic
|
|
iptables -t nat -A PREROUTING -i br-lan -p tcp --dport 443 \
|
|
-j REDIRECT --to-port "$port" 2>/dev/null
|
|
|
|
# Mark mitmproxy traffic
|
|
iptables -t nat -I PREROUTING -p tcp -m mark --mark 0x1/0x1 -j ACCEPT 2>/dev/null
|
|
}
|
|
|
|
cleanup_iptables() {
|
|
# Get configured port (default 8080)
|
|
local port=$(uci -q get mitmproxy.main.listen_port || echo "8080")
|
|
|
|
# Remove mitmproxy redirect rules
|
|
iptables -t nat -D PREROUTING -i br-lan -p tcp --dport 80 \
|
|
-j REDIRECT --to-port "$port" 2>/dev/null
|
|
iptables -t nat -D PREROUTING -i br-lan -p tcp --dport 443 \
|
|
-j REDIRECT --to-port "$port" 2>/dev/null
|
|
iptables -t nat -D PREROUTING -p tcp -m mark --mark 0x1/0x1 -j ACCEPT 2>/dev/null
|
|
}
|
|
|
|
start_service() {
|
|
config_load mitmproxy
|
|
config_foreach validate_section main start_mitmproxy
|
|
}
|
|
|
|
stop_service() {
|
|
cleanup_iptables
|
|
}
|
|
|
|
reload_service() {
|
|
stop
|
|
start
|
|
}
|
|
|
|
service_triggers() {
|
|
procd_add_reload_trigger "mitmproxy"
|
|
}
|
|
|
|
status() {
|
|
if pgrep mitmweb >/dev/null 2>&1; then
|
|
echo "mitmproxy is running"
|
|
pgrep mitmweb
|
|
return 0
|
|
elif pgrep mitmdump >/dev/null 2>&1; then
|
|
echo "mitmdump is running"
|
|
pgrep mitmdump
|
|
return 0
|
|
else
|
|
echo "mitmproxy is not running"
|
|
return 1
|
|
fi
|
|
}
|