Alex
Really looking forward to this patch being submitted and hopefully accepted.
Let me know if it would be helpful for me to do some independent testing of the
patch.
John
> On 6 Jan 2020, at 14:53, Alex Rousskov
> wrote:
>
> On 1/3/20 8:40 AM, Yaroslav Pushko wrote:
>
>> During estab
On 1/3/20 8:40 AM, Yaroslav Pushko wrote:
> During establishing TLSv1.3 handshake after successfully send our Client
> Hello, the server answers us with Hello Retry Request.
HelloRetryRequest is a TLS v1.3 feature that tells the client to restart
the negotiation (with additional info). Please kee
Hi Alex,
Thank you for the reply, we update our patch with provided changes.
One more thing, with TLSv1.3.
There is site https://3frontoffice.tre.se/login with specific behavior in
the Chrome browser OS X El Capitan.
During establishing TLSv1.3 handshake after successfully send our Client
Hello
On 12/17/19 9:00 AM, Yaroslav Pushko wrote:
> Hi All
>
> We use Squid 4.8 with OpenSSL 1.1.1d in a transparent mode for peek and
> splice interception.
>
> With this version, we lost the possibility to connect to any HTTPS site.
>
> There are a few issues:
>
> * support TLSv1.2 sites (alread
Hi All
We use Squid 4.8 with OpenSSL 1.1.1d in a transparent mode for peek and
splice interception.
With this version, we lost the possibility to connect to any HTTPS site.
There are a few issues:
- support TLSv1.2 sites (already discussed in thread
http://squid-web-proxy-cache.1019090.n