rate some of the changes.
Notably, there was also a comment which discourages setting a maximum
version for the OpenSSL session to improve peek+bump compatibility - I
don't have a setup to which this applies, so I don't know how big of an
impa
sion:inappropriate
fallback (1/-1/0)".
Is a TLS fallback prevention mechanism kicking in by error? If so, how
to fix it?
Please let me know if additional log output (the debug log around the
error location did not seem helpful to me though) or a configuration to
reprod
step3 allowed_https_connections
ssl_bump terminate all
where allowed_https_connections is an ACL checking ssl::server_name.
How can I get the splicing setup working when mixing TLS 1.3 servers and
TLS 1.2 clients?
Many thanks!
Nikolaus
___
squid-users mailing list
squid-