Hi, My company is implementing blue coat intercepting proxy to scan for malware. The proxy intercepts TLS connections, on-the-fly generates a cert and does MITM. The clients are supposed to have certs installed to be fooled by the proxy.
Now, in Firefox, I installed the certs of the decryptor, installed HTTPS Everywhere, enabled SSL Observatory, asked it to check certs even if not on Tor and have: * Submit and check self-signed cerst * Submit and check certificates signed by non-standard root CAs. I would've expected SSL Observatory to warn me that my connection is tampered with, yet it doesn't. Any advice, please? Are the SSL Observatory checks using the firefox proxy settings? Best regards, Maciej
_______________________________________________ HTTPS-Everywhere mailing list [email protected] https://lists.eff.org/mailman/listinfo/https-everywhere
