-
-
Notifications
You must be signed in to change notification settings - Fork 4.5k
Description
Hi, I am trying to use mitmdump to still access my HP ilo3 management interfaces. These stopped at supporting
TLS v1.1 and essentially every Browser nowadays refuses to connect, even with the AES ciphers turned on.
From a CentOS 7 machine, I can successfully curl the login page like so:
curl -k --tlsv1.1 <my ip>
I start mitmdump like this (setting cipher_server to 'ALL' does not help):
mitmdump --set tls_version_server_min=TLS1_1 --set tls_version_server_max=TLS1_1 --ssl-insecure -p 9443 --mode reverse:https://192.1xxxxxxxx/
Wireshark shows this. Could it be, that the Ciphersuite is not supported by mitmdump? I tried setting 'ALL', but also with TLS I had to be very specific as mitmdump would first try TLSv1.0, that would fail and it would not retry the others.

I can load the page in firefox after waiving the pinned cert, but then I get the same message as mitmdump prints on the commandline, so mitmdump won't talk to the server:

To successfully ssh into the ilo port, I have to use this contraption, but it works:
ssh -oKexAlgorithms=+diffie-hellman-group14-sha1 -oHostKeyAlgorithms=+ssh-dss -oCiphers=+aes256-ctr
Any hints which syntax/cipher to use to make this work?
Mitmproxy: 8.1.1 binary
Python: 3.10.5
OpenSSL: OpenSSL 3.0.3 3 May 2022
Platform: Linux-5.18.9-200.fc36.x86_64-x86_64-with-glibc2.35