The tricky part of proxying TLS sessions is having the proxy provide
certificates that the client will trust. If your organization controls
the desktops, you can easily enough insert your root signing key in
their environment and create your own version of the certificates of the
servers they are navigating to.
Susan
On 11/15/2014 11:18 AM, Leif Hedstrom wrote:
Not really. You would have to do a man-in-the middle "attack" on the TLS
sessions. It can, and has, be done. There is no code or plugin in ATS that provides this
feature, but the plumbing is there if you wish to write the code. Squid does have
something for it already.
This is murky water at best. :)
-- Leif
On Nov 14, 2014, at 7:29 AM, Victor Lucero <victor.luc...@ipartner.cl> wrote:
Guys.
Hi.
Im looking for a way to cache the google searches from a network but the
problem is that the caching must be done transparent but I understand that put
something in the middle of an SSL/TLS connection it what SSL/TLS avoids .
There is a know working scenario of something like this?
Thanks in advance.