for my case, i had to write a System Patch to make squid work again.
it is a workaround, lowering the security of squid and is not recommended... use at your own risk
for what i have tested, it was something in the "options" that do not work now (maybe the tls1)
Hope someone more skilled will fix this mess...
here is the patch, tested for pf 24.11 and lightsquid 3.0.7_5 / squid 0.5
--- a/src/usr/local/pkg/squid.inc 2024-12-24 12:49:02.735299000 +0100 +++ b/src/usr/local/pkg/squid.inc 2024-12-24 12:59:50.633211000 +0100 @@ -1229,14 +1229,14 @@ $crt_pk = SQUID_CONFBASE . "/serverkey.pem"; $crt_capath = SQUID_LOCALBASE . "/share/certs/"; $crt_cafile = SQUID_LOCALBASE . "/share/certs/ca-root-nss.crt"; - $sslproxy_options = "NO_SSLv3, NO_TLSv1, NO_TLSv1_1"; + $sslproxy_options = "";//"NO_SSLv3, NO_TLSv1, NO_TLSv1_1"; /* XXX: Bug #4453, Bug #6592, Feature #6593, Bug #6563 * http://wiki.squid-cache.org/ConfigExamples/Intercept/SslBumpExplicit#Modern_DH.2FEDH_ciphers_usage */ if (empty($settings['sslproxy_compatibility_mode']) || ($settings['sslproxy_compatibility_mode'] == 'modern')) { // Modern cipher suites $sslproxy_cipher = "EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA384:EECDH+ECDSA+SHA256:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH:EDH+aRSA:!RC4:!aNULL:!eNULL:!LOW:!3DES:!SHA1:!MD5:!EXP:!PSK:!SRP:!DSS"; - $sslproxy_options .= ",NO_TLSv1"; + //$sslproxy_options .= ",NO_TLSv1"; } else { $sslproxy_cipher = "EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA384:EECDH+ECDSA+SHA256:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH:EDH+aRSA:HIGH:!RC4:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS"; }