Re: Squid and HTTPS interception on CentOS 7 ?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



The certificate should have *CA:true* set for act a CA for dynamic signing
certificates by Squid.

Most probably, Let's Encrypt will ignore this constraint in CSR.

2018-03-05 12:33 GMT-03:00 Chris Adams <linux@xxxxxxxxxxx>:

> Once upon a time, Valeri Galtsev <galtsev@xxxxxxxxxxxxxxxxx> said:
> > https://letsencrypt.org/
> >
> > - you will have to run web server to have certificate signed by
> > them
>
> Not necessarily - we do most of our Let's Encrypt validation with DNS
> rather than HTTP.
> --
> Chris Adams <linux@xxxxxxxxxxx>
> _______________________________________________
> CentOS mailing list
> CentOS@xxxxxxxxxx
> https://lists.centos.org/mailman/listinfo/centos
>
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
https://lists.centos.org/mailman/listinfo/centos



[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]


  Powered by Linux