Re: [squid-users] Splicing a connection if server cert cannot be verified

2014-12-17 Thread Soren Madsen (DREIJER)
Hi Amos, > > Yes, but Squid has no way of trusting a self-signed cert. When Squid > > mints a server cert on the fly and sends it to the client, the client > > won't have any idea that the cert was originally self-signed. Like the > > previous scenario, I'd want to step out of the way and defer th

Re: [squid-users] Splicing a connection if server cert cannot be verified

2014-12-16 Thread Amos Jeffries
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 16/12/2014 10:20 a.m., Soren Madsen (DREIJER) wrote: > Thanks for the quick reply, Amos. > >> Offering SSLv3 from a server is suicide these days. Those sites >> should be on the fast decline, or at very least shunned like >> plague victims. Lookup

Re: [squid-users] Splicing a connection if server cert cannot be verified

2014-12-15 Thread Soren Madsen (DREIJER)
Thanks for the quick reply, Amos. > Offering SSLv3 from a server is suicide these days. Those sites should > be on the fast decline, or at very least shunned like plague victims. > Lookup POODLE if you dont know why already. That's correct. That's why I don't want to bump such connections and ins

Re: [squid-users] Splicing a connection if server cert cannot be verified

2014-12-15 Thread Amos Jeffries
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 16/12/2014 8:11 a.m., Soren Madsen (DREIJER) wrote: > Hi all, > > By default, I want to bump all connections through my Squid > instance. However, while testing I've discovered lots of sites that > use SSLv3 Offering SSLv3 from a server is suicid

[squid-users] Splicing a connection if server cert cannot be verified

2014-12-15 Thread Soren Madsen (DREIJER)
Hi all, By default, I want to bump all connections through my Squid instance. However, while testing I've discovered lots of sites that use SSLv3 or self-signed certificates, in which case I'd like to fall back to TLS passthrough mode and let the client decide whether it wants to trust the serv