user.js

Unnamed repository; edit this file 'description' to name the repository.
Log | Files | Refs | README

commit 2f6b14ab6eb5189637592a9575924db58e6f73fd
parent 2dd455ef83413468a5fcccec1d4097275fc13e94
Author: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date:   Tue, 26 Jan 2021 19:58:57 +0000

1201: add error code, fixes #1094
Diffstat:
Muser.js | 8++++----
1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/user.js b/user.js @@ -624,10 +624,10 @@ user_pref("browser.shell.shortcutFavicons", false); user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!"); /** SSL (Secure Sockets Layer) / TLS (Transport Layer Security) ***/ /* 1201: require safe negotiation - * Blocks connections to servers that don't support RFC 5746 [2] as they're potentially - * vulnerable to a MiTM attack [3]. A server *without* RFC 5746 can be safe from the attack - * if it disables renegotiations but the problem is that the browser can't know that. - * Setting this pref to true is the only way for the browser to ensure there will be + * Blocks connections (SSL_ERROR_UNSAFE_NEGOTIATION) to servers that don't support RFC 5746 [2] + * as they're potentially vulnerable to a MiTM attack [3]. A server without RFC 5746 can be + * safe from the attack if it disables renegotiations but the problem is that the browser can't + * know that. Setting this pref to true is the only way for the browser to ensure there will be * no unsafe renegotiations on the channel between the browser and the server. * [STATS] SSL Labs (Dec 2020) reports 99.0% of sites have secure renegotiation [4] * [1] https://wiki.mozilla.org/Security:Renegotiation