Re: [squid-users] How to restrict the maximum negotiated version of squid HTTPS to TLS1.2

2019-04-02 Thread Amos Jeffries
On 2/04/19 6:07 pm, Amos Jeffries wrote: > On 2/04/19 2:10 pm, 赵 俊 wrote: >> Hi, this is part of my squid.conf: >> https_port 192.168.30.4:3129 intercept ssl-bump connection-auth=off >> generate-host-certificates=on dynamic_cert_mem_cache_size=4MB >> cert=/opt/squid/ssl_cert/CA.pem sslflags=NO_DEFA

Re: [squid-users] How to restrict the maximum negotiated version of squid HTTPS to TLS1.2

2019-04-01 Thread Amos Jeffries
On 2/04/19 2:10 pm, 赵 俊 wrote: > Hi, this is part of my squid.conf: > https_port 192.168.30.4:3129 intercept ssl-bump connection-auth=off > generate-host-certificates=on dynamic_cert_mem_cache_size=4MB > cert=/opt/squid/ssl_cert/CA.pem sslflags=NO_DEFAULT_CA  > > acl broken_sites ssl::server_name

[squid-users] How to restrict the maximum negotiated version of squid HTTPS to TLS1.2

2019-04-01 Thread 赵 俊
Hi, this is part of my squid.conf: https_port 192.168.30.4:3129 intercept ssl-bump connection-auth=off generate-host-certificates=on dynamic_cert_mem_cache_size=4MB cert=/opt/squid/ssl_cert/CA.pem sslflags=NO_DEFAULT_CA acl broken_sites ssl::server_name foo.com acl ssl_step1 at_step SslBump1 ss