Re: [squid-users] Fwd: Squid 4.8 with OpenSSL 1.1.1d

2020-01-09 Thread John Sweet-Escott
Alex Really looking forward to this patch being submitted and hopefully accepted. Let me know if it would be helpful for me to do some independent testing of the patch. John > On 6 Jan 2020, at 14:53, Alex Rousskov > wrote: > > On 1/3/20 8:40 AM, Yaroslav Pushko wrote: > >> During estab

Re: [squid-users] Fwd: Squid 4.8 with OpenSSL 1.1.1d

2020-01-06 Thread Alex Rousskov
On 1/3/20 8:40 AM, Yaroslav Pushko wrote: > During establishing TLSv1.3 handshake after successfully send our Client > Hello, the server answers us with Hello Retry Request. HelloRetryRequest is a TLS v1.3 feature that tells the client to restart the negotiation (with additional info). Please kee

Re: [squid-users] Fwd: Squid 4.8 with OpenSSL 1.1.1d

2020-01-03 Thread Yaroslav Pushko
Hi Alex, Thank you for the reply, we update our patch with provided changes. One more thing, with TLSv1.3. There is site https://3frontoffice.tre.se/login with specific behavior in the Chrome browser OS X El Capitan. During establishing TLSv1.3 handshake after successfully send our Client Hello

Re: [squid-users] Fwd: Squid 4.8 with OpenSSL 1.1.1d

2019-12-17 Thread Alex Rousskov
On 12/17/19 9:00 AM, Yaroslav Pushko wrote: > Hi All > > We use Squid 4.8 with OpenSSL 1.1.1d in a transparent mode for peek and > splice interception. > > With this version, we lost the possibility to connect to any HTTPS site. > > There are a few issues:  > > * support TLSv1.2 sites (alread

[squid-users] Fwd: Squid 4.8 with OpenSSL 1.1.1d

2019-12-17 Thread Yaroslav Pushko
Hi All We use Squid 4.8 with OpenSSL 1.1.1d in a transparent mode for peek and splice interception. With this version, we lost the possibility to connect to any HTTPS site. There are a few issues: - support TLSv1.2 sites (already discussed in thread http://squid-web-proxy-cache.1019090.n