endpoints: plainHttp: handler: http_proxy listenAddress: 0.0.0.0 port: 80 options: rules: - pattern: ".*\\.(?i)exe" response: ./assets/fakeFiles/sample.exe - pattern: ".*\\.(?i)(jpg|jpeg)" response: ./assets/fakeFiles/default.jpg - pattern: ".*\\.(?i)png" response: ./assets/fakeFiles/default.png - pattern: ".*\\.(?i)gif" response: ./assets/fakeFiles/default.gif - pattern: ".*\\.(?i)ico" response: ./assets/fakeFiles/default.ico - pattern: ".*\\.(?i)txt" response: ./assets/fakeFiles/default.txt - pattern: ".*" response: ./assets/fakeFiles/default.html httpsDowngrade: handler: tls_interceptor listenAddress: 0.0.0.0 port: 443 options: ecdsaCurve: P256 validity: ca: notBeforeRelative: 17520h notAfterRelative: 17520h domain: notBeforeRelative: 168h notAfterRelative: 168h rootCaCert: publicKey: ./ca.pem privateKey: ./ca.key certCachePath: /tmp/inetmock/ target: ipAddress: 127.0.0.1 port: 80 plainDns: handler: dns_mock listenAddress: 0.0.0.0 port: 53 options: rules: - pattern: "www.golem.de" response: 77.247.84.129 - pattern: ".*\\.google\\.com" response: 1.1.1.1 - pattern: ".*\\.reddit\\.com" response: 2.2.2.2 fallback: strategy: incremental args: startIP: 10.0.0.0 dnsOverTlsDowngrade: handler: tls_interceptor listenAddress: 0.0.0.0 port: 853 options: ecdsaCurve: P256 validity: ca: notBeforeRelative: 17520h notAfterRelative: 17520h domain: notBeforeRelative: 168h notAfterRelative: 168h rootCaCert: publicKey: ./ca.pem privateKey: ./ca.key certCachePath: /tmp/inetmock/ target: ipAddress: 127.0.0.1 port: 53