This guide will help you configure your browser to work with HTTPS interception so you can see all encrypted traffic content.
make setup-ca- Open the generated certificate:
open ca-certs/rootCA.crt
- macOS Keychain will open
- Add the certificate to your keychain
- Find "Rust Proxy Root CA" in Keychain Access
- Double-click the certificate
- Expand "Trust" section
- Set "When using this certificate" to "Always Trust"
- Save changes (enter password if prompted)
- Open Chrome → Settings
- Go to Privacy and Security → Security → Manage certificates
- Go to Trusted Root Certification Authorities tab
- Click Import
- Select
ca-certs/rootCA.crt - Place in "Trusted Root Certification Authorities" store
- Restart browser
- Open Firefox → Settings
- Go to Privacy & Security
- Scroll to Certificates → Click View Certificates
- Go to Authorities tab
- Click Import
- Select
ca-certs/rootCA.crt - Check "Trust this CA to identify websites"
- OK and restart Firefox
- Go to Settings → Advanced → System
- Click "Open your computer's proxy settings"
- Manual proxy setup:
- HTTP Proxy:
127.0.0.1:8080 - HTTPS Proxy:
127.0.0.1:8080 - Use proxy for all protocols: ✅
- HTTP Proxy:
- Go to Settings → Network Settings
- Click "Settings" button
- Select "Manual proxy configuration"
- HTTP Proxy:
127.0.0.1Port:8080 - SSL Proxy:
127.0.0.1Port:8080 - Check "Use this proxy server for all protocols"
make dev-local-intercept- Browse to any HTTPS website (e.g., https://httpbin.org/get)
- Check the proxy logs - you should now see complete HTTPS content!
Before Certificate Installation:
❌ TLS handshake failed: received fatal alert: CertificateUnknown
After Certificate Installation:
✅ TLS handshake successful for httpbin.org:443
🌐 Processing decrypted HTTPS traffic for httpbin.org:443
🔍 INTERCEPTED HTTPS: GET https://httpbin.org/get
📋 Request Headers:
user-agent: Mozilla/5.0...
cookie: session=abc123...
📤 Upstream HTTPS response: 200 OK
📄 Response Body: {"success": true}
✅ INTERCEPTED GET /get → 200 OK
- Development Only: Only install the root certificate on systems you control
- Remove After Testing: Delete the root certificate when done testing
- Certificate Warnings: You may still see warnings for some sites - this is normal
- Verify certificate installation: Look for "Rust Proxy Root CA" in certificate store
- Restart browser completely after certificate installation
- Clear browser cache/data
- Try incognito/private mode
Some sites use certificate pinning and will reject intercepted certificates. This is intentional security behavior.
macOS: Keychain Access → Find "Rust Proxy Root CA" → Delete Windows: certmgr.msc → Trusted Root → Delete certificate Firefox: Settings → Certificates → Authorities → Delete certificate
# Test without certificate issues
curl -x http://127.0.0.1:8080 https://httpbin.org/get -k
# Test with proper certificate validation (after browser setup)
curl -x http://127.0.0.1:8080 https://httpbin.org/getYou can configure different browsers with different settings to test various scenarios.
Once configured, you'll have complete visibility into all HTTPS traffic passing through your browser - headers, body content, cookies, everything!
Perfect for:
- API Development: See exactly what your web apps send
- Security Testing: Understand data transmission
- Debugging: Track down mysterious network issues
- Learning: Understand how HTTPS really works