Browser Setup
Hugin intercepts HTTP/HTTPS traffic by acting as a proxy. You need to (1) point your browser at the proxy and (2) trust the Hugin CA certificate.
Quick Setup (Mullvad Browser)
Click the Mullvad Browser button in the Hugin toolbar. Hugin automatically:
- Creates a temporary Firefox profile with the proxy pre-configured
- Imports the Hugin CA certificate
- Disables certificate pinning, HSTS preload, and HTTPS-Only Mode
- Disables the Mullvad Browser Extension (which would override proxy settings)
- Launches the browser in an isolated profile
No manual configuration needed. Your normal Mullvad Browser profile is untouched.
Requirement: certutil must be installed (brew install nss on macOS).
Manual Setup
Step 1: Configure the Proxy
Set your browser to use 127.0.0.1 port 8080 as its HTTP and HTTPS proxy.
Firefox / Mullvad Browser
Settings > Network Settings > Manual Proxy Configuration:
- HTTP Proxy:
127.0.0.1, Port:8080 - Check "Also use this proxy for HTTPS"
Mullvad Browser -- Extra Settings
Mullvad Browser requires additional about:config overrides:
security.enterprise_roots.enabled=truesecurity.cert_pinning.enforcement_level=0network.stricttransportsecurity.preloadlist=falsedom.security.https_only_mode=falsedom.security.https_only_mode_ever_enabled=falsedom.security.https_only_mode_pbm=falseextensions.torlauncher.start_tor=falseextensions.installDistroAddons=false
The Mullvad Browser Extension uses browser.proxy.onRequest to route all traffic through a SOCKS proxy, overriding your manual settings. Disable it via Add-ons > Extensions, or set extensions.installDistroAddons to false.
Mullvad Browser resets prefs.js on each startup. Use user.js in the profile directory for persistent settings.
Chrome / Chromium
Chrome uses system proxy settings. Alternatively, launch with a flag:
chromium --proxy-server="http://127.0.0.1:8080"
macOS System Proxy
System Settings > Network > (your adapter) > Advanced > Proxies:
- HTTP Proxy:
127.0.0.1:8080 - HTTPS Proxy:
127.0.0.1:8080
Step 2: Trust the CA Certificate
Hugin generates a CA certificate at ~/.config/hugin/Hugin-Proxy-CA.pem on first run. Your browser or OS must trust this certificate for HTTPS interception.
You can also download it from http://127.0.0.1:8081/api/ca.pem while Hugin is running.
macOS (System Keychain)
sudo security add-trusted-cert -d -r trustRoot \
-k /Library/Keychains/System.keychain \
~/.config/hugin/Hugin-Proxy-CA.pem
Linux (System-wide)
sudo cp ~/.config/hugin/Hugin-Proxy-CA.pem /usr/local/share/ca-certificates/hugin-ca.crt
sudo update-ca-certificates
Windows (Administrator)
certutil -addstore Root %USERPROFILE%\.config\hugin\Hugin-Proxy-CA.pem
Firefox (Manual Import)
Firefox uses its own certificate store, separate from the OS:
- Settings > Privacy & Security > Certificates > View Certificates
- Authorities tab > Import
- Select
~/.config/hugin/Hugin-Proxy-CA.pem - Check "Trust this CA to identify websites"
Or via command line with certutil (from NSS tools):
certutil -A -n "Hugin Proxy CA" -t "CT,C,C" \
-i ~/.config/hugin/Hugin-Proxy-CA.pem \
-d "sql:$(find ~/Library/Application\ Support/Firefox/Profiles -name '*.default-release' | head -1)"
Chrome on Linux
certutil -d sql:$HOME/.pki/nssdb -A -t "C,," -n "Hugin CA" \
-i ~/.config/hugin/Hugin-Proxy-CA.pem
Verifying the Setup
- Start Hugin
- Open the configured browser
- Visit any HTTPS site (e.g.,
https://httpbin.org/get) - Check the HTTP History tab in Hugin -- you should see the request appear
- No certificate warnings should appear in the browser
If you see certificate errors:
- Verify the CA cert is imported and trusted
- For Mullvad Browser: confirm
security.cert_pinning.enforcement_level=0 - For HSTS-protected sites: confirm
network.stricttransportsecurity.preloadlist=false
Scope
By default, Hugin captures all traffic through the proxy. To limit capture to specific targets, configure scope in the Scopes view within the UI, or edit config.toml:
[scope]
include_hosts = ["*.example.com", "api.target.com"]
exclude_hosts = ["fonts.googleapis.com", "*.analytics.com"]
Mullvad VPN Compatibility
Hugin works alongside Mullvad VPN. Browser traffic routes through the Hugin proxy on localhost, then Hugin's outbound connections go through the VPN tunnel. Enable split tunneling in the Mullvad app if you experience connectivity issues.