From e0968c03d709189045b94cd95572a2f7a80e0625 Mon Sep 17 00:00:00 2001 From: Arnout Engelen Date: Wed, 13 Oct 2021 10:04:33 +0200 Subject: [PATCH] alpnpass: init at 0.1 --- .../networking/alpnpass/default.nix | 34 +++++++++++++++++++ pkgs/top-level/all-packages.nix | 2 ++ 2 files changed, 36 insertions(+) create mode 100644 pkgs/applications/networking/alpnpass/default.nix diff --git a/pkgs/applications/networking/alpnpass/default.nix b/pkgs/applications/networking/alpnpass/default.nix new file mode 100644 index 000000000000..5cc0ac1cf05c --- /dev/null +++ b/pkgs/applications/networking/alpnpass/default.nix @@ -0,0 +1,34 @@ +{ buildGoModule +, fetchFromGitHub +, lib +}: + +buildGoModule rec { + pname = "alpnpass"; + version = "0.1"; + + src = fetchFromGitHub { + owner = "VerSprite"; + repo = "alpnpass"; + rev = version; + hash = "sha256-hNZqGTV17rFSKLhZzNqH2E4SSb6Jhk7YQ4TN0HnE+9g="; + }; + + vendorSha256 = "sha256-pQpattmS9VmO3ZIQUFn66az8GSmB4IvYhTTCFn6SUmo="; + + meta = with lib; { + description = "Inspect the plaintext payload inside of proxied TLS connections"; + longDescription = '' + This tool will listen on a given port, strip SSL encryption, + forward traffic through a plain TCP proxy, + then encrypt the returning traffic again + and send it to the target of your choice. + + Unlike most SSL stripping solutions this tool will negotiate ALPN and + preserve the negotiated protocol all the way to the target. + ''; + homepage = "https://github.com/VerSprite/alpnpass"; + license = licenses.unlicense; + maintainers = [ maintainers.raboof ]; + }; +} diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index f00ee1c353ff..0808120c1af8 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -33216,6 +33216,8 @@ with pkgs; acpilight = callPackage ../misc/acpilight { }; + alpnpass = callPackage ../applications/networking/alpnpass { }; + android-file-transfer = libsForQt5.callPackage ../tools/filesystems/android-file-transfer { }; antimicrox = libsForQt5.callPackage ../tools/misc/antimicrox { };