Does TLS interception necessarily require a self-signed certificate? Please explain why

A brief schema of a TLS intercepting proxy – the Client connects to the Host via the Proxy in a way which allows the Proxy to perform a (consensual) MITM.
[Client] -> [Proxy] -> [Host]

It’s my understanding reading references on… Continue reading Does TLS interception necessarily require a self-signed certificate? Please explain why