fix: fixed a bug in the https.proxy certificates cache due to a race condition which caused the same certificate to be generated more than once

This commit is contained in:
evilsocket 2019-02-19 10:51:12 +01:00
commit e3573b81e4
No known key found for this signature in database
GPG key ID: 1564D7F30393A456
2 changed files with 9 additions and 9 deletions

View file

@ -211,7 +211,7 @@ func (p *HTTPProxy) TLSConfigFromCA(ca *tls.Certificate) func(host string, ctx *
cert := getCachedCert(hostname, port)
if cert == nil {
p.Debug("creating spoofed certificate for %s:%d", tui.Yellow(hostname), port)
p.Info("creating spoofed certificate for %s:%d", tui.Yellow(hostname), port)
cert, err = btls.SignCertificateForHost(ca, hostname, port)
if err != nil {
p.Warning("cannot sign host certificate with provided CA: %s", err)
@ -219,6 +219,8 @@ func (p *HTTPProxy) TLSConfigFromCA(ca *tls.Certificate) func(host string, ctx *
}
setCachedCert(hostname, port, cert)
} else {
p.Debug("serving spoofed certificate for %s:%d", tui.Yellow(hostname), port)
}
config := tls.Config{