only their own CA to prevent MiM attacks,
>>> or use their own certificate store (for a similar behaviour).
>>>
>>> Alex.
>>>
>>>> -Original Message-
>>>> From: List [mailto:list-boun...@lists.pfsense.org] On Behalf Of Roberto
>>&
list-boun...@lists.pfsense.org] On Behalf Of Roberto
>>> Carna
>>> Sent: 06 February 2018 13:32
>>> To: pfSense Support and Discussion Mailing List
>>> Subject: [pfSense] Squid transparent with SSL interception - CA
>> certificate
>>> proble
y 2018 13:32
>> To: pfSense Support and Discussion Mailing List
>> Subject: [pfSense] Squid transparent with SSL interception - CA
> certificate
>> problem
>>
>> People, I've setup a transparent Squid proxy for WiFi clients. I'm using
> SSL
>
8 13:32
> To: pfSense Support and Discussion Mailing List
> Subject: [pfSense] Squid transparent with SSL interception - CA
certificate
> problem
>
> People, I've setup a transparent Squid proxy for WiFi clients. I'm using
SSL
> interception so I had to generate a CA priva
People, I've setup a transparent Squid proxy for WiFi clients. I'm
using SSL interception so I had to generate a CA private certificate
(generated from pfSense certificate manager tab).
But when I add this CA private certificate to several Android an
Iphone devices in order to proxify and filter S