The tricky part of proxying TLS sessions is having the proxy provide certificates that the client will trust. If your organization controls the desktops, you can easily enough insert your root signing key in their environment and create your own version of the certificates of the servers they are navigating to.

Susan

On 11/15/2014 11:18 AM, Leif Hedstrom wrote:
Not really. You would have to do a man-in-the middle "attack" on the TLS 
sessions. It can, and has, be done. There is no code or plugin in ATS that provides this 
feature, but the plumbing is there if you wish to write the code. Squid does have 
something for it already.

This is murky water at best. :)

-- Leif



On Nov 14, 2014, at 7:29 AM, Victor Lucero <victor.luc...@ipartner.cl> wrote:

Guys.
Hi.
Im looking for a way to cache the google searches from a network but the 
problem is that the caching must be done transparent but I understand that put 
something in the middle of an SSL/TLS connection it what SSL/TLS avoids .

There is a know working scenario of something like this?


Thanks in advance.



Reply via email to