<html>
<head>
<meta content="text/html; charset=utf-8" http-equiv="Content-Type">
</head>
<body text="#000000" bgcolor="#FFFFFF">
<br>
-----BEGIN PGP SIGNED MESSAGE----- <br>
Hash: SHA256 <br>
<br>
I want to get the answer the people who did it. And not those that
suggest that they could do it.<br>
<br>
15.09.15 23:42, Matus UHLAR - fantomas пишет:<br>
<span style="white-space: pre;">>>> On 15.09.15 22:45, Yuri
Voinov wrote:<br>
>>>> Does anyone know - is it possible to send the
connection, starting with<br>
>>>> the CONNECT, to cache-peer?<br>
><br>
>> 15.09.15 23:17, Matus UHLAR - fantomas пишет:<br>
>>> cache_peer_access with proper ACLs should do that.<br>
>>> note that always_direct can avoid it.<br>
><br>
> On 15.09.15 23:33, Yuri Voinov wrote:<br>
>> Squid working in transparent SSL Bump mode.<br>
>><br>
>> AFAIK, here is SSL decrypts. AFAIK, decrypted tunnel
denied to be<br>
>> forwarded to parent.<br>
>><br>
>> I need to forward some URLs without decryption to peer.
Whole session<br>
>> starting with CONNECT.<br>
>><br>
>> Problem: Peer must accepts both HTTP and HTTPS
connections. Yes, there<br>
>> is Privoxy, which can tunnel CONNECT. How to tell Squid -
"Forward this<br>
>> URL and this URL into peer, whenever HTTP or HTTPS"?<br>
><br>
> disable sslbump (enable "splice") with proper ACLs:<br>
> <a class="moz-txt-link-freetext" href="http://www.squid-cache.org/Doc/config/ssl_bump/">http://www.squid-cache.org/Doc/config/ssl_bump/</a><br>
></span><br>
<br>
-----BEGIN PGP SIGNATURE-----
<br>
Version: GnuPG v2
<br>
<br>
iQEcBAEBCAAGBQJV+FkgAAoJENNXIZxhPexG6qMH/0FDG+TuZxeF2oLVPt/oKZSe
<br>
H80saCKW3eIgzvkclnLdCetrL0UGl+rmSvM53jrgqe6/x9NnTcapcpbeV2oxMAJv
<br>
mcbJ7QM4lJhBJHx3qyiZU0DuKGj9QM0DIoA6i3y8mgoiXNwc0D7DfmOwYrrk6BWw
<br>
fBHx3fazZ4DEnMRay+YuzOsdV7eV19Pc7TqnBRyyBfsoYXh9THxZRAXHBelKwPcu
<br>
9qvFQQ7wwiEhx+BBakSBwyc9BG1oHfZVQnLKdasalTkJqDYP0bYPVT1HNAvEF0JL
<br>
/K9ojVll4vbX8kWuWUArI5ZMLBx21sb3mjev+smB22/5/FKmm7EWNDYuHHjCyjY=
<br>
=MzgN
<br>
-----END PGP SIGNATURE-----
<br>
<br>
</body>
</html>