X-Git-Url: https://ruderich.org/simon/gitweb/?a=blobdiff_plain;f=README;h=c88806b1f2f82724fc0aaaaf77d85ae5d5fc5613;hb=64bfebde76d568808b6fa8a8d09b4b5afe13dc15;hp=0178e5c8f97a7caff3f3041cb50e4751ac10bc52;hpb=6e568e11dd479576d27dc74a0f77cbc81dd5f766;p=tlsproxy%2Ftlsproxy.git diff --git a/README b/README index 0178e5c..c88806b 100644 --- a/README +++ b/README @@ -12,7 +12,7 @@ REQUIREMENTS ------------ - GnuTLS library including development headers -- certtool (from by GnuTLS) to create TLS certificates +- certtool (from GnuTLS) to create TLS certificates USAGE @@ -88,3 +88,11 @@ might be used! If you always verify the authentication of the connection this isn't a problem, but if you only check if it's a HTTPS connection then this attack is possible. + + +KNOWN ISSUES +------------ + +- Firefox (at least Iceweasel 3.5.16 on Debian) fails to load the error page + sent with the "invalid" certificate once the certificate has been accepted. + As the user shouldn't accept the invalid certificate this is a minor issue.