On 4/17/12 9:15 AM, troxlinux wrote: > 2012/4/17 Tom Eastep <[email protected]>: > >>> You cannot transparently proxy HTTPS -- think about it; would you want >>> to trust your private data to a protocol where a process in the middle >>> could read everything going back and fourth on the connection? > > I understand your point Tom, but I explain my situation to you before > having this box linux, I had a called UTM Astaro and he works to me > perfectly of way is transparent, but we do not have money to pay but > license .
Are you sure that it was transparent and not autoconfigured? -Tom -- Tom Eastep \ When I die, I want to go like my Grandfather who Shoreline, \ died peacefully in his sleep. Not screaming like Washington, USA \ all of the passengers in his car http://shorewall.net \________________________________________________
signature.asc
Description: OpenPGP digital signature
------------------------------------------------------------------------------ Better than sec? Nothing is better than sec when it comes to monitoring Big Data applications. Try Boundary one-second resolution app monitoring today. Free. http://p.sf.net/sfu/Boundary-dev2dev
_______________________________________________ Shorewall-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/shorewall-users
