Intercepting macOS Applications

05 Dec 2023, Emanuele Micheletti @emanuele_em_

mitmproxy can now transparently intercept traffic from macOS applications running on the same device, without fiddling with any proxy settings.

Editorial Note: Hi!

My name is Emanuele Micheletti, and I’m one of this year’s Google Summer of Code students for mitmproxy, mentored by Maximilian Hils. In this post I will present the implementation of a macOS Network Extension to transparently intercept macOS traffic!1

The Problem: Transparent Proxies are Hard

Transparently intercepting network traffic has been a long-standing usability issue for mitmproxy users. iptables, nftables, and pf.conf are hard to get right, especially for users who are not as familiar with networking concepts. While we have relatively extensive documentation on this, it’s still a pain to set up.

In 2022, we’ve introduced WireGuard® mode, which makes interception much easier for external devices such as smartphones or IoT devices. But this does not work for traffic originating from the same machine that mitmproxy is running on. Setting up a redirecting VPN does not work here, because we catch our own outgoing traffic again and will end up in an endless loop.

The Solution: Local Redirect Mode

The above problem was the motivation to implement a new proxy mode in mitmproxy, local redirect mode. In this mode, macOS users can instruct mitmproxy to transparently intercept traffic from the current machine:

mitmproxy --mode local

By default, all traffic will be intercepted, but we can also narrow it down to specific applications and processes:

# Intercept curl only
mitmproxy --mode local:curl
# Intercept everything *but* curl
mitmproxy --mode local:!curl
# Intercept a specific PID
mitmproxy --mode local:4123

As all other proxy modes, this works on all available interfaces: mitmdump, mitmproxy and mitmweb.

How does it work?

Behind the scenes, there are a bunch of things going on. To get access to the network traffic, we implemented a macOS Network Extension in Swift. This extension looks at individual UDP and TCP flows, determines if they need to be redirected, and then forwards them to mitmproxy_rs as events over a Unix pipe. As with WireGuard mode, we have opted to implement the mitmproxy side in Rust, which lends itself very well to writing this sort of highly-concurrent code. We’re also able to reuse our Rust bindings from WireGuard mode.

Architecture of the Transparent mode in macOS

Architecture of the Transparent mode in macOS

We initially built the local redirector using Apple’s Packet Tunnel Provider API, but this made it hard to only process traffic from specific applications. We’ve since switched to the App Proxy Provider API, which, while limited to TCP and UDP only, allows us to leave some flows to the operating system to handle.

When is it available?

Local redirect mode is already available in mitmproxy 10.1.5+! We’re announcing it only now because we first needed to figure out how to ship a signed and notarized system extension via Homebrew. But thanks to the fantastic Homebrew folks, brew install mitmproxy now works!

What about certificates?

So far this post has focused on redirecting the traffic to mitmproxy, but in many cases we still need to get the target application to trust your local mitmproxy certificates. As part of GSoC, I have also implemented relevant functionality within the security-framework crate, which wraps the Apple Security Framework in Rust. Thanks to these changes, mitmproxy will soon be able to automatically install the certificate when running in local redirect mode as well!

What’s next?

We’re pretty excited to have a first version of local redirect mode available for macOS users in the latest release, but we’re only getting started here. There are three areas we’re currently working on:

  1. Windows Support! @mhils has been working on a similar solution for Windows, which will be based on the WinDivert. Expect a blog post on this soon!
  2. Redirection on Linux is still in its infancy, but @decathorpe has plans for an EBPF-based solution.
  3. Last but not least, local redirect mode is bound to receive a UI integration into mitmweb. My work for the macOS bits of this is in progress as well!

Acknowledgements

This work supported by Google Summer of Code under the umbrella of the Honeynet Project, and the NGI0 Entrust fund established by NLnet.


  1. You can find the source code for this not in the main mitmproxy repository, but over at https://github.com/mitmproxy/mitmproxy_rs↩︎