mer [mailto:dwei...@dweimer.net] Envoyé : 9 février 2016
08:53 À : Sebastien Boulianne Cc :
squid-users@lists.squid-cache.org Objet : Re: [squid-users] Question
about my SSL test
>
> On 2016-02-09 7:38 am, sebastien.boulia...@cpu.ca wrote:
>
>> Hi,
>>
>> I did a SSL te
m PEM -out dHParam.pem 1024
>
> Which file does it uses as input ?
>
> Thanks.
>
> -Message d'origine-
> De : dweimer [mailto:dwei...@dweimer.net] Envoyé : 9 février 2016
08:53 À : Sebastien Boulianne Cc :
squid-users@lists.squid-cache.org Objet : Re: [squid-user
-cache.org Objet : Re: [squid-users] Question about my
SSL test
On 2016-02-09 7:38 am, sebastien.boulia...@cpu.ca wrote:
> Hi,
>
> I did a SSL test and I have some questions.
>
> The SSL test notified me that POODLE (SSLv3), RC4 are enable or/and
> vulnerable.
>
> Is
?
>
> Thanks.
>
> -Message d'origine-
> De : dweimer [mailto:dwei...@dweimer.net]
> Envoyé : 9 février 2016 08:53
> À : Sebastien Boulianne
> Cc : squid-users@lists.squid-cache.org
> Objet : Re: [squid-users] Question about my SSL test
>
> On 2016-02-09 7:38 am,
squid-cache.org
Objet : Re: [squid-users] Question about my SSL test
On 2016-02-09 7:38 am, sebastien.boulia...@cpu.ca wrote:
> Hi,
>
> I did a SSL test and I have some questions.
>
> The SSL test notified me that POODLE (SSLv3), RC4 are enable or/and
> vulnerable.
>
> Is it a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Also:
http://wiki.squid-cache.org/ConfigExamples/Intercept/SslBumpExplicit?#Hardening
09.02.16 19:52, dweimer пишет:
> On 2016-02-09 7:38 am, sebastien.boulia...@cpu.ca wrote:
>
>> Hi,
>>
>> I did a SSL test and I have some questions.
>>
>> The S
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Whhich test you performed?
09.02.16 19:38, sebastien.boulia...@cpu.ca пишет:
>
> Hi,
>
>
>
> I did a SSL test and I have some questions.
>
> The SSL test notified me that POODLE (SSLv3), RC4 are enable or/and
vulnerable.
>
>
>
> Is it a way to b
On 2016-02-09 7:38 am, sebastien.boulia...@cpu.ca wrote:
Hi,
I did a SSL test and I have some questions.
The SSL test notified me that POODLE (SSLv3), RC4 are enable or/and
vulnerable.
Is it a way to block that with Squid ?
How can I disable thosed protocols ? Server side or Squid side ?
Hi,
I did a SSL test and I have some questions.
The SSL test notified me that POODLE (SSLv3), RC4 are enable or/and vulnerable.
Is it a way to block that with Squid ?
How can I disable thosed protocols ? Server side or Squid side ?
Thanks for your answer guys.
Sébastien