| Commit message (Collapse) | Author | Age | Lines |
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
Previous behavior: if an entry was in the previously-used list, and there would be an error connecting to or processing the host, it would adopt it using the previous status, with a new minimum required max age TTL.
New behavior: if an entry is in the previously-used list, and there is an error connecting to or processing the host, it will be dropped from the preload list.
The old behavior would allow entries to persist on the HSTS preload list when they drop off the 'net. Considering domain churn, it would cause issues for new owners for having a persisted HSTS entry preloaded in the browser.
Bonus: it keeps our HSTS preload list lean.
|
| |
|
|
|
|
| |
Tag #288
|
|
|
|
| |
https://github.com/MoonchildProductions/Pale-Moon/pull/1173
|
|
|
|
|
|
| |
allows end-entities to be their own trust anchors
https://github.com/MoonchildProductions/moebius/pull/119
|
|
|
|
| |
Follow-up to 11a8a39f6d2e057d51559c52c1bf0ba74bbfe189
|
|\
| |
| | |
Port across devtools enhancements
|
| |
| |
| |
| |
| |
| | |
https://github.com/MoonchildProductions/moebius/pull/113
https://github.com/MoonchildProductions/moebius/pull/118
https://github.com/MoonchildProductions/moebius/pull/127
|
|/
|
|
| |
places
|
|
|
|
| |
Issue #4 point 4
|
|
|
|
|
|
| |
Sites with these ciphers (commonly IIS) would otherwise fall back to weak 3DES that will be disabled by default.
Issue #4 points 2 and 3
|
|
|
|
|
|
|
| |
Issue #4 point 1.
Camellia is a strong, modern, safe cipher with no known weaknesses or reduced strength attacks.
The cipher has been approved for use by the ISO/IEC, the European Union's NESSIE project and the Japanese CRYPTREC project.
|
|
|
|
| |
and integration with sync, OneCRL and the custom time check for derives system time.
|
|
|