use correct option when determining TLS min/max versions, fix #5546
This commit is contained in:
parent
6d6d2bcdb1
commit
6ff5d0cc78
|
@ -13,6 +13,8 @@
|
|||
* Setting `connection_strategy` to `lazy` now also disables early
|
||||
upstream connections to fetch TLS certificate details.
|
||||
(@mhils)
|
||||
* Fix `tls_version_server_min` and `tls_version_server_max` options.
|
||||
([#5546](https://github.com/mitmproxy/mitmproxy/issues/5546), @mhils)
|
||||
* DTLS support ([#5397](https://github.com/mitmproxy/mitmproxy/pull/5397), @kckeiks).
|
||||
|
||||
## 28 June 2022: mitmproxy 8.1.1
|
||||
|
|
|
@ -252,8 +252,8 @@ class TlsConfig:
|
|||
|
||||
ssl_ctx = net_tls.create_proxy_server_context(
|
||||
method=net_tls.Method.DTLS_CLIENT_METHOD if tls_start.is_dtls else net_tls.Method.TLS_CLIENT_METHOD,
|
||||
min_version=net_tls.Version[ctx.options.tls_version_client_min],
|
||||
max_version=net_tls.Version[ctx.options.tls_version_client_max],
|
||||
min_version=net_tls.Version[ctx.options.tls_version_server_min],
|
||||
max_version=net_tls.Version[ctx.options.tls_version_server_max],
|
||||
cipher_list=tuple(cipher_list),
|
||||
verify=verify,
|
||||
ca_path=ctx.options.ssl_verify_upstream_trusted_confdir,
|
||||
|
|
Loading…
Reference in New Issue