Commit message (Collapse) | Author | Age | Lines | |
---|---|---|---|---|
* | Be more consistent about decoding IP addresses in PSM. | wolfbeast | 2020-01-11 | -2/+7 |
| | ||||
* | Issue #447 - Update HSTS preload list | wolfbeast | 2019-11-19 | -3828/+3982 |
| | ||||
* | Issue #1289 - Part 3: Update tests. | wolfbeast | 2019-11-14 | -0/+36 |
| | ||||
* | Issue #1289 - Part 2: Clear out the preload list except for test | wolfbeast | 2019-11-14 | -503/+2 |
| | | | | domains. | |||
* | Issue #1289 - Part 1: Add a pref to disable HPKP header processing. | wolfbeast | 2019-11-14 | -4/+37 |
| | ||||
* | Issue #447 - Update HSTS preload list. | wolfbeast | 2019-11-09 | -11027/+26141 |
| | ||||
* | Properly implement various HSTS states. | wolfbeast | 2019-09-05 | -16/+27 |
| | | | | | | | | Previously, HSTS preload list values could be overridden temporarily due to counter-intuitive behavior of the API's removeState function. This adds an explicit flag to the API for writing knockout values to the Site Security Service, with the default resetting to whatever the preload list state is. | |||
* | Update HSTS preload list | trav90 | 2019-06-26 | -4115/+6505 |
| | | | | Tag #447 | |||
* | Update HSTS preload list | wolfbeast | 2019-05-28 | -8368/+16300 |
| | | | | Tag #447 | |||
* | Remove SecurityUI telemetry. | adeshkp | 2019-04-21 | -151/+0 |
| | ||||
* | Fix order of member variables in a couple of initializer lists | adeshkp | 2019-03-14 | -1/+1 |
| | ||||
* | Update HSTS preload list | trav90 | 2019-01-31 | -2982/+5618 |
| | | | | Tag #447 | |||
* | Fix check for HSTS when service is disabled. | Ascrod | 2019-01-17 | -1/+1 |
| | ||||
* | Add preference for fully disabling HSTS. | Ascrod | 2019-01-16 | -0/+25 |
| | ||||
* | Remove a pointless `switch` after telemetry cleanup | adeshkp | 2019-01-14 | -14/+0 |
| | ||||
* | Telemetry: Remove stubs and related code | adeshkp | 2019-01-12 | -782/+6 |
| | ||||
* | Update HSTS preload list | trav90 | 2019-01-02 | -1989/+1978 |
| | | | | Tag #447 | |||
* | Update HSTS preload list | trav90 | 2018-12-15 | -2240/+3430 |
| | | | | Tag #447 | |||
* | Update HSTS preload list | trav90 | 2018-11-27 | -2835/+4530 |
| | | | | Tag #447 | |||
* | Remove AccumulateCipherSuite() | wolfbeast | 2018-11-08 | -71/+2 |
| | | | | This resolves #858 | |||
* | Remove ancient workaround in client certificate code | wolfbeast | 2018-11-02 | -57/+1 |
| | | | | | | | | Apparently a prehistoric server implementation would send a certificate_authorities field that didn't include the outer DER SEQUENCE tag, so PSM attempted to detect this and work around it. This prehistoric server implementation isn't in use anywhere anymore, so this 18-yo server bug workaround can be removed. | |||
* | Make sure nsNSSCertList handling checks for valid certs. | wolfbeast | 2018-11-02 | -3/+36 |
| | ||||
* | Update HSTS preload list | trav90 | 2018-10-27 | -1940/+3077 |
| | | | | Tag #447 | |||
* | Update HSTS preload list | trav90 | 2018-10-12 | -1500/+2523 |
| | | | | Tag #447 | |||
* | Ensure we got an nsISSLStatus when deserializing in TransportSecurityInfo. | wolfbeast | 2018-10-04 | -1/+92 |
| | ||||
* | Update HSTS preload list | trav90 | 2018-09-29 | -1907/+2923 |
| | | | | Tag #447 | |||
* | Get rid of the incorrect mechanism to remove insecure fallback hosts. | wolfbeast | 2018-09-29 | -12/+0 |
| | | | | This fixes #797. | |||
* | Update HSTS preload list | trav90 | 2018-09-11 | -1799/+3198 |
| | | | | Tag #447 | |||
* | Remove all C++ Telemetry Accumulation calls. | wolfbeast | 2018-09-03 | -295/+4 |
| | | | | | This creates a number of stubs and leaves some surrounding code that may be irrelevant (eg. recorded time stamps, status variables). Stub resolution/removal should be a follow-up to this. | |||
* | Remove support for TLS session caches in TLSServerSocket. | wolfbeast | 2018-09-01 | -15/+0 |
| | | | | This resolves #738 | |||
* | Update HSTS preload list | trav90 | 2018-08-27 | -2462/+4464 |
| | | | | Tag #447 | |||
* | Fix missed in32->int64 in df852120098dc7ba5df4a76126c6297c6d2d1b7b | wolfbeast | 2018-08-17 | -1/+1 |
| | | | | Tag #709. | |||
* | Reinstate RC4 and mark 3DES weak. | wolfbeast | 2018-08-17 | -1/+7 |
| | | | | Tag #709 | |||
* | Extend {EnabledWeakCiphers} bit field to allow more cipher suites. | wolfbeast | 2018-08-17 | -8/+8 |
| | | | | Tag #709. | |||
* | Update HSTS preload list | trav90 | 2018-08-01 | -1735/+1719 |
| | | | | Tag #447 | |||
* | replace "certErrorCodePrefix2" with "certErrorCodePrefix" | yami | 2018-07-22 | -2/+2 |
| | ||||
* | Update HSTS preload list | trav90 | 2018-07-17 | -2555/+4080 |
| | | | | Tag #447 | |||
* | Remove SSL Error Reporting telemetry | wolfbeast | 2018-06-29 | -136/+0 |
| | ||||
* | Update HSTS preload list | trav90 | 2018-06-21 | -1865/+2637 |
| | | | | Tag #447 | |||
* | Fix SSL status ambiguity. | wolfbeast | 2018-06-20 | -6/+25 |
| | | | | | - Adds CipherSuite string with the full suite - Changes CipherName to be the actual cipher name instead of the (erroneous) full suite like Firefox does. | |||
* | Merge pull request #461 from trav90/HSTS | Moonchild | 2018-06-07 | -64272/+42909 |
|\ | | | | | Improve HSTS preload list generation | |||
| * | Regenerate the HSTS preload list | trav90 | 2018-06-07 | -64270/+42907 |
| | | ||||
| * | Restore clearly-delimited format for the HSTS preload list | trav90 | 2018-06-06 | -2/+2 |
| | | ||||
* | | Request NSS to use DBM as the storage file format | JustOff | 2018-06-06 | -2/+2 |
|/ | ||||
* | Remove support and tests for HSTS priming from the tree. Fixes #384 | Gaming4JC | 2018-05-26 | -17/+0 |
| | ||||
* | moebius#119: (Windows) Security - Certificate Stores - NSSCertDBTrustDomain ↵ | janekptacijarabaci | 2018-04-23 | -3/+25 |
| | | | | | | allows end-entities to be their own trust anchors https://github.com/MoonchildProductions/moebius/pull/119 | |||
* | DevTools - network - security (improvements) | janekptacijarabaci | 2018-03-01 | -1/+147 |
| | | | | | | https://github.com/MoonchildProductions/moebius/pull/113 https://github.com/MoonchildProductions/moebius/pull/118 https://github.com/MoonchildProductions/moebius/pull/127 | |||
* | Disable 3DES cipher by default + re-order a few things. | wolfbeast | 2018-02-02 | -6/+9 |
| | | | | Issue #4 point 4 | |||
* | Add RSA-AES + SHA256/384 suites for web compatibility. | wolfbeast | 2018-02-02 | -0/+8 |
| | | | | | | Sites with these ciphers (commonly IIS) would otherwise fall back to weak 3DES that will be disabled by default. Issue #4 points 2 and 3 | |||
* | Add Camellia to the active cipher suites. | wolfbeast | 2018-02-02 | -0/+8 |
| | | | | | | | Issue #4 point 1. Camellia is a strong, modern, safe cipher with no known weaknesses or reduced strength attacks. The cipher has been approved for use by the ISO/IEC, the European Union's NESSIE project and the Japanese CRYPTREC project. |