Henrik Nordstrom escribió:
tor 2007-03-29 klockan 16:11 +0200 skrev Emilio Casbas:
Henrik Nordstrom escribió:
tor 2007-03-29 klockan 11:37 +0200 skrev Emilio Casbas:
A significant disadvantage of interception caching is that breaks the
TCP/IP standard and only supports the HTTP protocol, not S
tor 2007-03-29 klockan 16:11 +0200 skrev Emilio Casbas:
> Henrik Nordstrom escribió:
> > tor 2007-03-29 klockan 11:37 +0200 skrev Emilio Casbas:
> >> A significant disadvantage of interception caching is that breaks the
> >> TCP/IP standard and only supports the HTTP protocol, not SSL among others
On Thu, Mar 29, 2007, Emilio Casbas wrote:
> I reply myself, I have found the response in this thread
>
> http://www.squid-cache.org/mail-archive/squid-users/200102/0816.html
> and the possible solution:
> http://www.squid-cache.org/mail-archive/squid-users/200102/0822.html
>
> Then the question
Emilio Casbas escribió:
Henrik Nordstrom escribió:
tor 2007-03-29 klockan 11:37 +0200 skrev Emilio Casbas:
A significant disadvantage of interception caching is that breaks the
TCP/IP standard and only supports the HTTP protocol, not SSL among
others.
But is there any way or workaround to a in
Henrik Nordstrom escribió:
tor 2007-03-29 klockan 11:37 +0200 skrev Emilio Casbas:
A significant disadvantage of interception caching is that breaks the
TCP/IP standard and only supports the HTTP protocol, not SSL among others.
But is there any way or workaround to a interception proxy could wor
tor 2007-03-29 klockan 11:37 +0200 skrev Emilio Casbas:
> A significant disadvantage of interception caching is that breaks the
> TCP/IP standard and only supports the HTTP protocol, not SSL among others.
> But is there any way or workaround to a interception proxy could works
> with SSL protocol
A significant disadvantage of interception caching is that breaks the
TCP/IP standard and only supports the HTTP protocol, not SSL among others.
But is there any way or workaround to a interception proxy could works
with SSL protocol?
Thanks
Emilio C.