![]() Even if Xzandro had benign intentions, it would create a tempting target for a hacker. This is +1000 for SW Proxy website since, otherwise, it could spoof any domain name (including banks, etc.). You'd (probably) want/need separate sub-domains per-user (e.g.) to simplify this association.īecause the exporter doesn't have have access to the CA cert, it can't spoof other domain names. Overview Versions Reviews Resources Project README. with the added proviso that the website needs to know which user is connecting so it can present the correct SSL cert. This tool will parse intercepted data from Summoners War and extract information on the monsters and runes of the user. Fortunately, this workflow also works for the SW Proxy website. Summoners War Exporter This tool will parse intercepted data from Summoners War and extract information on the monsters and runes of the user. doesn't affect the security model.Įach user would create their own CA and enter their own SSL certificate (for the SW domain) in the SW Exporter. ![]() The Exporter would create a private/public key and the CA would sign the public key. Signs the public SSL key (generated by the proxy) for (only) the SW domain.For example, we could create a small app (maybe even IOS/Android) that: ![]() Specifically, you'd want/need EACH USER to control their own CA. Unfortunately, trusting a CA cert on your phone creates a backdoor so the workflow needs to emphasize security. Additionally, the connection to the proxy server from my phone was being blocked by my computers firewall. (I'm pretty sure corporations do something similar to allow for deep traffic inspection so we might have a community member with some experience doing this). I was able to get this to work, following those instructions you were following and deleting the contents of C:UsersUSERAppDataRoamingSummoners War Exporterswcerts as suggested by u/Sparkyil256.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |