On 4/17/12 9:15 AM, troxlinux wrote:
> 2012/4/17 Tom Eastep <[email protected]>:
> 
>>> You cannot transparently proxy HTTPS -- think about it; would you want
>>> to trust your private data to a protocol where a process in the middle
>>> could read everything going back and fourth on the connection?
> 
> I understand your point Tom, but I explain my situation to you before
> having this box linux, I had a called UTM Astaro and he works to me
> perfectly of way is transparent, but we do not have money to pay but
> license .

Are you sure that it was transparent and not autoconfigured?

-Tom
-- 
Tom Eastep        \ When I die, I want to go like my Grandfather who
Shoreline,         \ died peacefully in his sleep. Not screaming like
Washington, USA     \ all of the passengers in his car
http://shorewall.net \________________________________________________

Attachment: signature.asc
Description: OpenPGP digital signature

------------------------------------------------------------------------------
Better than sec? Nothing is better than sec when it comes to
monitoring Big Data applications. Try Boundary one-second 
resolution app monitoring today. Free.
http://p.sf.net/sfu/Boundary-dev2dev
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to