On 30/1/18 5:22 pm, Izaac wrote:
Q: How can I automatically undermine the basis of the SSL PKI by forcing my
CA (which, by design, generates certificates for arbitrary sites and
thereby main-in-the-middles all communications) onto third parties that
happen to be traversing my network?
A: You can
On Tue, Jan 30, 2018 at 12:22:50PM -0500, Izaac wrote:
> main-in-the-middles
man-in-the-middle
--
. ___ ___ . . ___
. \/ |\ |\ \
. _\_ /__ |-\ |-\ \__
___
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the proj
On Tue, Jan 30, 2018 at 01:56:34PM -0300, Roberto Carna wrote:
> How can I automatically force the CA certificate installation as a
> trusted Root CA on WiFi clients, taking into account they can be
> Windows, Linux, Android, Iphone, etc. ???
So, I'm going to re-word this in a way that may make it
anuary 30, 2018 11:57 AM
To: pfSense Support and Discussion Mailing List
Subject: [pfSense] Force CA certificate installation as tsueted root CA on WiFi
clients
Dear, I have pfSEnse + Squid in transparent mode.
I have to filter web sites and content in HTTPS with Squidguard, so I've
created
Dear, I have pfSEnse + Squid in transparent mode.
I have to filter web sites and content in HTTPS with Squidguard, so
I've created a CA self-signed certificate and a server certificate
(signed by the CA) in pfSense. After that I defined the CA certificate
in the Squid configuration tab from pfSens