5. Generate the certificate file required for encrypted communication The http, tcp, udp proxy process communicates with the upstream. For security, we use encrypted communication. Of course, we can choose not t