use correct option when determining TLS min/max versions, fix #5546

This commit is contained in:
Maximilian Hils 2022-08-22 15:19:18 +02:00
parent 6d6d2bcdb1
commit 6ff5d0cc78
2 changed files with 4 additions and 2 deletions

View File

@ -13,6 +13,8 @@
* Setting `connection_strategy` to `lazy` now also disables early
upstream connections to fetch TLS certificate details.
(@mhils)
* Fix `tls_version_server_min` and `tls_version_server_max` options.
([#5546](https://github.com/mitmproxy/mitmproxy/issues/5546), @mhils)
* DTLS support ([#5397](https://github.com/mitmproxy/mitmproxy/pull/5397), @kckeiks).
## 28 June 2022: mitmproxy 8.1.1

View File

@ -252,8 +252,8 @@ class TlsConfig:
ssl_ctx = net_tls.create_proxy_server_context(
method=net_tls.Method.DTLS_CLIENT_METHOD if tls_start.is_dtls else net_tls.Method.TLS_CLIENT_METHOD,
min_version=net_tls.Version[ctx.options.tls_version_client_min],
max_version=net_tls.Version[ctx.options.tls_version_client_max],
min_version=net_tls.Version[ctx.options.tls_version_server_min],
max_version=net_tls.Version[ctx.options.tls_version_server_max],
cipher_list=tuple(cipher_list),
verify=verify,
ca_path=ctx.options.ssl_verify_upstream_trusted_confdir,