Commit message (Collapse) | Author | Age | Lines | |
---|---|---|---|---|
* | Issue #1280 - Part 1: Remove HPKP components. | wolfbeast | 2020-04-14 | -21/+0 |
| | | | | | This also removes leftover plumbing for storing preload information in SiteSecurityService since no service still uses it. | |||
* | Issue #1289 - Part 1: Add a pref to disable HPKP header processing. | wolfbeast | 2019-11-14 | -0/+8 |
| | ||||
* | Remove unused SSL errorReporting prefs | wolfbeast | 2019-03-14 | -4/+0 |
| | | | | Resolves #1003. | |||
* | Expose TLS 1.3 cipher suite prefs. | wolfbeast | 2019-02-10 | -1/+9 |
| | ||||
* | Reinstate RC4 and mark 3DES weak. | wolfbeast | 2018-08-17 | -0/+2 |
| | | | | Tag #709 | |||
* | Revert "Disable TLS 1.3 by default for now until our NSS can be updated to ↵ | wolfbeast | 2018-06-06 | -1/+1 |
| | | | | | | the latest spec." This reverts commit 6c3f95480a191ce432ddfb2aa400a6d70c4884a8. | |||
* | Fix sec pref locations and enable HPKP checking by default. | wolfbeast | 2018-05-29 | -0/+11 |
| | | | | Some prefs were incorrectly in all.js (ocsp and hpkp) | |||
* | Disable TLS 1.3 by default for now until our NSS can be updated to the ↵ | wolfbeast | 2018-04-25 | -1/+1 |
| | | | | latest spec. | |||
* | Activate TLS 1.3 by default. | wolfbeast | 2018-02-24 | -1/+1 |
| | | | | This resolves #15. | |||
* | Disable static DHE + AES suites by default (common combination for weak DH keys) | wolfbeast | 2018-02-02 | -2/+2 |
| | | | | Issue #4 point 5 | |||
* | Disable 3DES cipher by default + re-order a few things. | wolfbeast | 2018-02-02 | -2/+4 |
| | | | | Issue #4 point 4 | |||
* | Add RSA-AES + SHA256/384 suites for web compatibility. | wolfbeast | 2018-02-02 | -0/+4 |
| | | | | | | Sites with these ciphers (commonly IIS) would otherwise fall back to weak 3DES that will be disabled by default. Issue #4 points 2 and 3 | |||
* | Add Camellia to the active cipher suites. | wolfbeast | 2018-02-02 | -0/+4 |
| | | | | | | | Issue #4 point 1. Camellia is a strong, modern, safe cipher with no known weaknesses or reduced strength attacks. The cipher has been approved for use by the ISO/IEC, the European Union's NESSIE project and the Japanese CRYPTREC project. | |||
* | Add m-esr52 at 52.6.0 | Matt A. Tobin | 2018-02-02 | -0/+119 |