On 30/03/2016 9:43 a.m., Baselsayeh wrote:
> sorry
> it seems that http://squid-web-proxy-cache.1019090.n4.nabble.com doesnt
> remove posts
This is an email mailing list. Nabble is just an archive display. There
is no "oops I should not have mailed the world" undo feature in email.
>
> Yuri Voin
sorry
it seems that http://squid-web-proxy-cache.1019090.n4.nabble.com doesnt
remove posts
Yuri Voinov wrote
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> I said exactly: "Cache peer cannot use re-crypting right now".
>
> No matter what do you have behind cache_peer.
>
> 30.03.16 2:4
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
I said exactly: "Cache peer cannot use re-crypting right now".
No matter what do you have behind cache_peer.
30.03.16 2:40, Baselsayeh пишет:
> is there a workaround that i can use cache peer and squid sslbump?
> isnt stunnel is using ssl that sq
sorry
it seems that http://squid-web-proxy-cache.1019090.n4.nabble.com doesnt
remove posts
--
View this message in context:
http://squid-web-proxy-cache.1019090.n4.nabble.com/ssl-stunnel-and-cache-peer-tp4676844p4676852.html
Sent from the Squid - Users mailing list archive at Nabble.com.
__
is there a workaround that i can use cache peer and squid sslbump?
isnt stunnel is using ssl that squid dont need to re-crypting?
Yuri Voinov wrote
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> He means something like privoxy.
>
> It possible tunnel https.
>
> The similar config ofte
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
There is no workaround.
30.03.16 2:38, Baselsayeh пишет:
> is there a workaround that i can use ssl bump with cache peer?
>
>
> Yuri Voinov wrote
> He means something like privoxy.
>
> It possible tunnel https.
>
> The similar config often uses fo
is there a workaround that i can use ssl bump with cache peer?
Yuri Voinov wrote
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> He means something like privoxy.
>
> It possible tunnel https.
>
> The similar config often uses for tunnel some proxied connections to Tor
> or another ISP
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
He means something like privoxy.
It possible tunnel https.
The similar config often uses for tunnel some proxied connections to Tor
or another ISP or something.
But the thing he required is not possible. Cache peers does not support
re-crypting
On Tuesday 29 Mar 2016 at 20:11, Baselsayeh wrote:
> my setup is
> my pc with squid(as stunnel client) -> stunnel and proxy(normal non
> https)
> ive got these errors:
> 2-i cant surf any https site
What do you mean by the remote proxy being "normal non https"?
Is that perhaps the reason yo
And note that i need ssl bumping not splicing
Baselsayeh wrote
> hello
> im trying to get squid + stunnel working
> my setup is
>
> my pc with squid(as stunnel client) -> stunnel and proxy(normal non
> https)
> squid should be bumping the connection
>
> my config:
>
> https_port 3429 inter
hello
im trying to get squid + stunnel working
my setup is
my pc with squid(as stunnel client) -> stunnel and proxy(normal non
https)
squid should be bumping the connection
my config:
https_port 3429 intercept ssl-bump generate-host-certificates=on
dynamic_cert_mem_cache_size=200MB cert=/tmp
11 matches
Mail list logo