Hello Eliezer,

I did not mean to be rude, just forgot to type CentOS *7* stock Squid from the 
distribution maintainers (not from you :)

The FF requires patching in gadget.cc otherwise it shows 
sec_error_inadequate_key_usage for almost all SSL bumped pages. The new version 
3.4.8 is probably better in handling this but it is not part of stock CentOS 7 
yet.

Some admins seem to heavily rely on updates coming from distribution 
maintainers and deny recompiling any software.

Best regards,
Rafael Akchurin
Diladele B.V.

-----Original Message-----
From: squid-users [mailto:squid-users-boun...@lists.squid-cache.org] On Behalf 
Of Eliezer Croitoru
Sent: Monday, October 27, 2014 11:36 PM
To: squid-users@lists.squid-cache.org
Subject: Re: [squid-users] Filtering keywords on google search

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 10/27/2014 09:01 PM, Rafael Akchurin wrote:
> Default stock Squid in CentOS for example allows for SSL Sump out of 
> the box (not for Firefox though).
Why not for firefox?
It is working on firefox and all other browsers while some will like the 
certificate they will get and others will not.

Also there have been couple patches to ssl bump that can help with couple 
issues(while might bringing others)

Eliezer
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBAgAGBQJUTsjBAAoJENxnfXtQ8ZQUvm4H/0N3+X4YtfgsQogRw8/Po3m6
syZq+YdsjAjXB4NMQqG81GoD0Jhz3ENDThjd4Srj6a0vpaVSdp6efjIwMiMr6I4w
jWbKoSDZWqE/HIg43MShNMy5PVzW+c6VuAIr/D9qIsUPHlnlHC3rCqGggV5xZJHr
b8Sfn4YnU9LwFOOON2e0iBme9rwtDOrIpQ+TUuaKT5rcKmNxsFTQav5FcdvaataO
pqmckmXGX7eZMmci/ivxwfxlxkdrNyGRvvMJNhnIRw47pUoXb8CihchgXJUDaGhq
oC3sV4TQ94OZKs62ZUUJD5sgxHkbRFYSyPlLt0M4YsXtA5e/vAlQkrJdAVh3bYc=
=gwdo
-----END PGP SIGNATURE-----
_______________________________________________
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users
_______________________________________________
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users

Reply via email to