summaryrefslogtreecommitdiffstats
path: root/security/manager
Commit message (Collapse)AuthorAgeLines
* Update HSTS preload listwolfbeast2019-05-28-8368/+16300
| | | | Tag #447
* Issue #1053 - Drop support Android and remove Fennec - Part 1b: Remove ↵Matt A. Tobin2019-04-23-1/+1
| | | | MOZ_FENNEC
* Remove SecurityUI telemetry.adeshkp2019-04-21-171/+0
|
* Fix order of member variables in a couple of initializer listsadeshkp2019-03-14-1/+1
|
* Update HSTS preload listtrav902019-01-31-2982/+5618
| | | | Tag #447
* Fix check for HSTS when service is disabled.Ascrod2019-01-17-1/+1
|
* Add preference for fully disabling HSTS.Ascrod2019-01-16-0/+25
|
* Remove a pointless `switch` after telemetry cleanupadeshkp2019-01-14-14/+0
|
* Telemetry: Remove stubs and related codeadeshkp2019-01-12-782/+6
|
* Update HSTS preload listtrav902019-01-02-1989/+1978
| | | | Tag #447
* Update HSTS preload listtrav902018-12-15-2240/+3430
| | | | Tag #447
* Update HSTS preload listtrav902018-11-27-2835/+4530
| | | | Tag #447
* Remove AccumulateCipherSuite()wolfbeast2018-11-08-71/+2
| | | | This resolves #858
* Remove ancient workaround in client certificate codewolfbeast2018-11-02-57/+1
| | | | | | | | Apparently a prehistoric server implementation would send a certificate_authorities field that didn't include the outer DER SEQUENCE tag, so PSM attempted to detect this and work around it. This prehistoric server implementation isn't in use anywhere anymore, so this 18-yo server bug workaround can be removed.
* Make sure nsNSSCertList handling checks for valid certs.wolfbeast2018-11-02-3/+36
|
* Update HSTS preload listtrav902018-10-27-1940/+3077
| | | | Tag #447
* Update HSTS preload listtrav902018-10-12-1500/+2523
| | | | Tag #447
* Ensure we got an nsISSLStatus when deserializing in TransportSecurityInfo.wolfbeast2018-10-04-1/+92
|
* Update HSTS preload listtrav902018-09-29-1907/+2923
| | | | Tag #447
* Get rid of the incorrect mechanism to remove insecure fallback hosts.wolfbeast2018-09-29-12/+0
| | | | This fixes #797.
* Update HSTS preload listtrav902018-09-11-1799/+3198
| | | | Tag #447
* Remove all C++ Telemetry Accumulation calls.wolfbeast2018-09-03-295/+4
| | | | | This creates a number of stubs and leaves some surrounding code that may be irrelevant (eg. recorded time stamps, status variables). Stub resolution/removal should be a follow-up to this.
* Remove support for TLS session caches in TLSServerSocket.wolfbeast2018-09-01-15/+0
| | | | This resolves #738
* Update HSTS preload listtrav902018-08-27-2462/+4464
| | | | Tag #447
* Fix missed in32->int64 in df852120098dc7ba5df4a76126c6297c6d2d1b7bwolfbeast2018-08-17-1/+1
| | | | Tag #709.
* Reinstate RC4 and mark 3DES weak.wolfbeast2018-08-17-1/+7
| | | | Tag #709
* Extend {EnabledWeakCiphers} bit field to allow more cipher suites.wolfbeast2018-08-17-8/+8
| | | | Tag #709.
* Update HSTS preload listtrav902018-08-01-1735/+1719
| | | | Tag #447
* replace "certErrorCodePrefix2" with "certErrorCodePrefix"yami2018-07-22-4/+3
|
* Update HSTS preload listtrav902018-07-17-2555/+4080
| | | | Tag #447
* Remove SSL Error Reporting telemetrywolfbeast2018-06-29-136/+0
|
* Update HSTS preload listtrav902018-06-21-1865/+2637
| | | | Tag #447
* Fix SSL status ambiguity.wolfbeast2018-06-20-6/+25
| | | | | - Adds CipherSuite string with the full suite - Changes CipherName to be the actual cipher name instead of the (erroneous) full suite like Firefox does.
* [PALEMOON] Add missed strings required by page infoJustOff2018-06-08-1/+3
|
* Merge pull request #461 from trav90/HSTSMoonchild2018-06-07-64341/+42935
|\ | | | | Improve HSTS preload list generation
| * Regenerate the HSTS preload listtrav902018-06-07-64270/+42907
| |
| * Restore clearly-delimited format for the HSTS preload listtrav902018-06-06-65/+23
| |
| * Increase concurrent lookups to 15 when generating HSTS preload listtrav902018-06-05-1/+1
| |
| * Update HSTS preload list generation scripttrav902018-06-05-5/+4
| | | | | | | | | | | | | | | | Previous behavior: if an entry was in the previously-used list, and there would be an error connecting to or processing the host, it would adopt it using the previous status, with a new minimum required max age TTL. New behavior: if an entry is in the previously-used list, and there is an error connecting to or processing the host, it will be dropped from the preload list. The old behavior would allow entries to persist on the HSTS preload list when they drop off the 'net. Considering domain churn, it would cause issues for new owners for having a persisted HSTS entry preloaded in the browser. Bonus: it keeps our HSTS preload list lean.
* | Request NSS to use DBM as the storage file formatJustOff2018-06-06-2/+2
|/
* Remove support and tests for HSTS priming from the tree. Fixes #384Gaming4JC2018-05-26-17/+0
|
* Remove MOZ_WIDGET_GONK [1/2]wolfbeast2018-05-12-6/+0
| | | | Tag #288
* Fix unsafe "instanceof" negationsjanekptacijarabaci2018-05-02-3/+0
| | | | https://github.com/MoonchildProductions/Pale-Moon/pull/1173
* moebius#119: (Windows) Security - Certificate Stores - NSSCertDBTrustDomain ↵janekptacijarabaci2018-04-23-3/+25
| | | | | | allows end-entities to be their own trust anchors https://github.com/MoonchildProductions/moebius/pull/119
* Fix build system translation errors.wolfbeast2018-03-04-1/+1
| | | | Follow-up to 11a8a39f6d2e057d51559c52c1bf0ba74bbfe189
* Merge pull request #34 from janekptacijarabaci/devtools_import-from-moebius_1Moonchild2018-03-02-1/+147
|\ | | | | Port across devtools enhancements
| * DevTools - network - security (improvements)janekptacijarabaci2018-03-01-1/+147
| | | | | | | | | | | | https://github.com/MoonchildProductions/moebius/pull/113 https://github.com/MoonchildProductions/moebius/pull/118 https://github.com/MoonchildProductions/moebius/pull/127
* | Use MOZ_FENNEC and MOZ_XULRUNNER instead of checking MOZ_BUILD_APP in most ↵Matt A. Tobin2018-03-01-1/+1
|/ | | | places
* Disable 3DES cipher by default + re-order a few things.wolfbeast2018-02-02-6/+9
| | | | Issue #4 point 4
* Add RSA-AES + SHA256/384 suites for web compatibility.wolfbeast2018-02-02-0/+8
| | | | | | Sites with these ciphers (commonly IIS) would otherwise fall back to weak 3DES that will be disabled by default. Issue #4 points 2 and 3