Thanks for this AmosI will try and do more experimenting this week
with more results.
James
On Tue, 2015-05-26 at 19:46 +1200, Amos Jeffries wrote:
> On 26/05/2015 4:26 a.m., James Lay wrote:
> > So following advice and instructions on this page:
> >
> > http://wiki.squid-cache.org/Features
On 26/05/2015 4:26 a.m., James Lay wrote:
> So following advice and instructions on this page:
>
> http://wiki.squid-cache.org/Features/DynamicSslCert
>
> I have set up my lab with explicit proxy by exporting http_proxy and
> https_proxy. After creating the self-signed root CA certificate above
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Ah, misunderstand.
Error you got means that target server certificate's CA is not visible
by Squid. Or for client.
Huh. :) I had thought that Squid suddenly turned into a hackware
:)))
25.05.15 22:26, James Lay пишет:
> So following advi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hm. Interesting.
You want to say, you uses ordinal server certificate, signed with
external trusted CA?
And users can't see MiTM?
25.05.15 22:26, James Lay пишет:
> So following advice and instructions on this page:
>
> http://wiki.squid-cache.o
So following advice and instructions on this page:
http://wiki.squid-cache.org/Features/DynamicSslCert
I have set up my lab with explicit proxy by exporting http_proxy and
https_proxy. After creating the self-signed root CA certificate above
and creating the .der file for the client, here are my