Граф коммитов

35 Коммитов

Автор SHA1 Сообщение Дата
Wan-Teh Chang 7b7dec31d4 Bug 591523: Disable SSL false start by default.
r=sayrer a=blocking2.0:beta7
2010-09-21 14:57:09 -07:00
Wan-Teh Chang c58333e9fa Bug 580679: remove preference security.ssl.enable_compression because
the change to build NSS with NSS_ENABLE_ZLIB=1 was reverted.  Will try
again after mozilla 2.0.  review+ and approval2.0+ by bsmedberg.
2010-09-02 13:40:19 -07:00
Wan-Teh Chang f561e6a88d Bug 580679: Build NSS with the TLS zlib compression code.
Add the security.ssl.enable_compression preference to
enable TLS compression, disabled by default.
r=khuey,kaie,sayrer,ted.  approval2.0+ by bsmedberg.
2010-08-12 14:12:05 -07:00
Wan-Teh Chang 8da7b6bc29 Bug 583908 - Enable TLS false start in Mozilla. r/a=sayrer. (CLOSED TREE) 2010-08-03 23:36:53 -07:00
Wan-Teh Chang 791274eded bustage fix for test_bug329869.html failure (undo pref flip from bug 583908) 2010-08-02 23:41:11 -07:00
Wan-Teh Chang 137eb3f5f0 Bug 583908: Enable TLS false start by default. Add the preference
security.ssl.enable_false_start to disable it.  r=sayrer.
approval2.0+ by sayrer.
2010-08-02 22:10:52 -07:00
Saint Wesonga aaf59d3e92 Bug 572668. Don't send the useless crypto token in the UA string. r=bzbarsky 2010-07-02 16:56:09 -04:00
Kai Engert 2eae427786 Bug 549641, Firefox raises alarm (in error console) about SSL servers being vulnerable to CVE-2009-3555
r=rrelyea, r=honzab
2010-05-03 13:34:16 +02:00
Kai Engert 62caa75f94 Bug 535649 - Implement UI around CVE-2009-3555 and draft-rescorla-tls-renegotiation, r=rrelyea
== NSS 3.12.6 will block some renegotiation attempts on SSL sockets by default
== This patch does not yet implement new UI by default, but adds 4 new prefs to get fine grained control (blocking/allowing, displaying broken state)
== One of the prefs is a temporary pref that is supposed to go away at some point in the future
2010-02-07 13:09:51 +01:00
Vladimir Vukicevic 8bf9ece2a9 b=511808, disable Camellia on Windows CE until alignment bug is fixed; r=jduell 2009-08-24 11:07:48 -07:00
Kai Engert b98bb36896 Bug 478839 - Support South Korean SEED crypto cipher suites. r=nelson 2009-08-09 09:19:06 +02:00
Kai Engert 3d486c9ebb Bug 431819, IMAP/POP/SMTP/LDAP with SSL client auth, Thunderbird repeatedly prompts for client certificate
(applies to firefox with SSL client auth, too)
r=relyea for an earlier patch that was checked in to mozilla-1.8.x more than a year ago
r=honzab on the diff on top of that earlier patch
a=beltzner for landing on restricted trunk
2009-05-21 00:21:51 +02:00
Reed Loden 984577563b Bug 454406 - "SSL handshakes fail after asking PSM to remember user's choice of client auth cert" (backed out changeset 6615b044bcd8 from bug 431819) 2008-10-01 01:01:39 -05:00
Kai Engert 0f228913f3 Bug 431819, SSL client auth, repeated prompts for client certificate
r=rrelyea, r=dveditz
2008-06-18 21:36:29 +02:00
dveditz@cruzio.com aca5dcbb7e bug 295922 change default for "select cert automatically", r/sr=biesi, blocking1.9+ 2008-03-07 02:52:21 -08:00
wtc@google.com 7d9ede46bb Bug 415033: added a hidden preference (in about:config) for enabling or disabling the TLS session ticket extension. The patch is contributed by Nagendra Modadugu <ngm+mozilla@google.com>. r=wtc,rrelyea,kengert a1.9+=damons Modified Files: netwerk/base/public/security-prefs.js security/manager/ssl/src/nsNSSComponent.cpp 2008-02-26 15:09:39 -08:00
dtownsend@oxymoronical.com e52758a05e Bug 341472: ship with fewer security warnings showing by default. p=Adam Guthrie <ispiked@gmail.com>, r=darin.moz@gmail.com, ui-r=beltzner, a=wanted-firefox3 2007-08-20 07:22:42 -07:00
kaie@kuix.de 5b82067aa4 Bug 382223, Add support for Camellia to PSM
Patch contributed by okazaki
r=kengert
2007-07-25 15:53:30 -07:00
kaie@kuix.de 30adde7d1d Bug 110161, enable OCSP by defaultr=cbiesinger, sr=mconnor 2007-06-05 12:27:42 -07:00
kaie@kuix.de 146b7c014e Bug 110161. Code related to the plan to enable OCSP by default.r=rrelyea, toolkit r=mconnor 2007-05-30 16:13:28 -07:00
kaie%kuix.de 99c1cc7b57 bug 235773, Patch v13
This check in will make PSM aware of ECC cipher suites. Nightly builds will not yet contain ECC, because NSS is still
being compiled with ECC disabled.
r=rrelyea/darin
2006-05-16 00:33:44 +00:00
kaie%kuix.de 4c135d354c bug 236933, Disable SSL2 and other weak ciphers by default
This checkin changes the default prefs only
r=darin
2006-02-22 12:40:17 +00:00
gavin%gavinsharp.com 2c41e8ddeb Bug 289640: Remove unused preference security.ui.enable, patch by Daniel Cater <DJCater@Gmail.com>, r=kaie, sr=darin 2006-01-16 15:08:30 +00:00
wtc%netscape.com 5cae1f1bc7 Bug 190960: added the DHE ciphersuites back because the underlying NSS bug
(bug 188856) that broke them has been fixed. r=kaie. sr=bryner. a=asa for
mozilla1.3.
Modified Files:
	netwerk/base/public/security-prefs.js
	security/manager/pki/resources/content/ssl3tlsciphers2.xul
	security/manager/pki/resources/locale/en-US/pref-ssl.dtd
	security/manager/ssl/src/nsNSSComponent.cpp
2003-02-19 15:08:50 +00:00
kaie%netscape.com c422b330bd b=190640 Remove the DHE ciphersuites until they work
r=javi sr=bryner a=asa
2003-01-28 15:06:29 +00:00
kaie%netscape.com 8ac4991f54 b=184940 Enable additional SSL ciphers, add configuration UI
r=javi sr=jaggernaut
2003-01-07 00:58:24 +00:00
ddrinan%netscape.com 18974de8f4 Bug 85720 - domestic DES 56-bit cipher pref. r=ssaux,sr=blizzard 2001-08-02 23:46:30 +00:00
ddrinan%netscape.com 2ac1f43cb1 Enable support for OCSP. Bug#80178, r=mcgreer@netscape.com, sr=blizzard@mozilla.org 2001-05-15 17:59:10 +00:00
thayes%netscape.com a189244f9e Bug 79528 r=ddrinan/sr=ben Add edit window for SSL ciphers 2001-05-09 04:04:32 +00:00
ddrinan%netscape.com c256ed06c8 Fix for bug #75277, enable tls. r=javi@netscape.com, sr=darin@netscape.com 2001-04-18 00:46:04 +00:00
jgmyers%netscape.com d72d1758bc distinguish weak crypto in PSM2: bug 31896 r=dmose ser=darin 2001-04-01 19:37:29 +00:00
dougt%netscape.com 128f95aa9b Relanding Necko Changes.
Revising nsIChannel to allow for overlapped i/o. This consists of three parts:

1. Factoring nsIChannel into a protocol specific part, the nsIChannel, and a socket specific, the nsITransport.
2. Derive the nsIChannel from a nsIRequest.
2. Changes the notification system from necko and the URILoader to pass the nsIRequest interface instead of nsIChannel interface.

This goal stems from wanting to be able to have active AsyncRead and AsyncWrite operations on nsSocketTransport.
This is desired because it would greatly simplify the task of maintaining persistent/reusable socket connections
for FTP, HTTP, and Imap (and potentially other protocols). The problem with the existing nsIChannel interface is
that it does not allow one to selectively suspend just one of the read or write operations while keeping the other active.

r=darin@netscape.com
sr=rpotts@netscape.com
2001-02-21 20:38:08 +00:00
disttsc%bart.nl 3d2d80d536 Back out dougt's channel changes 2001-02-12 03:14:23 +00:00
dougt%netscape.com 1b9ca82439 Revising nsIChannel to allow for overlapped i/o. This consists of three parts:
1. Factoring nsIChannel into a protocol specific part, the nsIChannel, and a socket specific, the nsITransport.
2. Derive the nsIChannel from a nsIRequest.
2. Changes the notification system from necko and the URILoader to pass the nsIRequest interface instead of nsIChannel interface.

This goal stems from wanting to be able to have active AsyncRead and AsyncWrite operations on nsSocketTransport.
This is desired because it would greatly simplify the task of maintaining persistent/reusable socket connections
for FTP, HTTP, and Imap (and potentially other protocols).  The problem with the existing nsIChannel interface is
that it does not allow one to selectively suspend just one of the read or write operations while keeping the other active.

The full details of the change on written up in the netlib newsgroup.

r=darin@netscape.com
sr=rpotts@netscape.com
2001-02-10 00:16:26 +00:00
bryner%uiuc.edu 43b47e9463 Moving files out of security/base at request of security team. The new home for these files is in netwerk. Bug 53648. r=scc. a=gagan,brendan. 2000-09-22 04:42:20 +00:00