summaryrefslogtreecommitdiffstats
path: root/netwerk/base
Commit message (Collapse)AuthorAgeLines
* DevTools - network - implement the secureConnectionStart property for the ↵janekptacijarabaci2018-03-01-1/+16
| | | | | | | PerformanceTiming https://github.com/MoonchildProductions/moebius/pull/116 ("/testing" and "/toolkit" in in the previous commit)
* Activate TLS 1.3 by default.wolfbeast2018-02-24-1/+1
| | | | This resolves #15.
* Merge branch 'security_tls_1-3_1' into TLS-1.3wolfbeast2018-02-23-7/+9
|\
| * Bug 1343600 - Add TLS handshake Start/Stop eventsjanekptacijarabaci2018-02-11-7/+9
| |
* | CSP: Upgrade SO navigational requests per spec.janekptacijarabaci2018-02-22-0/+7
| |
* | Crypto Services (utils) - Support for SHA224-512janekptacijarabaci2018-02-21-1/+2
| |
* | Remove Windows XP specific code in netwerk.wolfbeast2018-02-19-26/+1
| |
* | Add newChannel2 back to NetUtil.jsmMatt A. Tobin2018-02-10-0/+35
|/
* Disable static DHE + AES suites by default (common combination for weak DH keys)wolfbeast2018-02-02-2/+2
| | | | Issue #4 point 5
* Disable 3DES cipher by default + re-order a few things.wolfbeast2018-02-02-2/+4
| | | | Issue #4 point 4
* Add RSA-AES + SHA256/384 suites for web compatibility.wolfbeast2018-02-02-0/+4
| | | | | | Sites with these ciphers (commonly IIS) would otherwise fall back to weak 3DES that will be disabled by default. Issue #4 points 2 and 3
* Add Camellia to the active cipher suites.wolfbeast2018-02-02-0/+4
| | | | | | | Issue #4 point 1. Camellia is a strong, modern, safe cipher with no known weaknesses or reduced strength attacks. The cipher has been approved for use by the ISO/IEC, the European Union's NESSIE project and the Japanese CRYPTREC project.
* Add m-esr52 at 52.6.0Matt A. Tobin2018-02-02-0/+67756