bug 1579906 - disable sending new TLS error reports while we rethink our approach r=kjacobs
authorDana Keeler <dkeeler@mozilla.com>
Tue, 17 Sep 2019 23:55:29 +0000
changeset 493666 a80b7ebbd675fa5874d6cb0957757a47be9396a2
parent 493665 f3cf877afac25af50b7d30d81f8efefed15fd158
child 493667 0586b06a7aab5aa61aafb88f7f84c780c994e9f6
push id95638
push userdkeeler@mozilla.com
push dateTue, 17 Sep 2019 23:56:20 +0000
treeherderautoland@a80b7ebbd675 [default view] [failures only]
perfherder[talos] [build metrics] [platform microbench] (compared to previous push)
reviewerskjacobs
bugs1579906
milestone71.0a1
first release with
nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
last release without
nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
bug 1579906 - disable sending new TLS error reports while we rethink our approach r=kjacobs This also disables the UI on TLS error pages. Differential Revision: https://phabricator.services.mozilla.com/D46222
browser/base/content/docs/sslerrorreport/preferences.rst
modules/libpref/init/all.js
--- a/browser/base/content/docs/sslerrorreport/preferences.rst
+++ b/browser/base/content/docs/sslerrorreport/preferences.rst
@@ -2,18 +2,18 @@
 
 ===========
 Preferences
 ===========
 
 The following preferences are used by SSL Error reporting:
 
 "security.ssl.errorReporting.enabled"
-  Should the SSL Error Reporting UI be shown on pin violations? Default
-  value: ``true``
+  Should the SSL Error Reporting UI be shown on TLS error pages? Default value:
+  ``false``.
 
 "security.ssl.errorReporting.url"
   Where should SSL error reports be sent? Default value:
   ``https://incoming.telemetry.mozilla.org/submit/sslreports/``
 
 "security.ssl.errorReporting.automatic"
   Should error reports be sent without user interaction. Default value:
   ``false``. Note: this pref is overridden by the value of
--- a/modules/libpref/init/all.js
+++ b/modules/libpref/init/all.js
@@ -143,17 +143,17 @@ pref("security.webauth.webauthn_enable_s
 
 #ifdef MOZ_WIDGET_ANDROID
   // the Rust usbtoken support does not function on Android
   pref("security.webauth.webauthn_enable_usbtoken", false);
 #else
   pref("security.webauth.webauthn_enable_usbtoken", true);
 #endif
 
-pref("security.ssl.errorReporting.enabled", true);
+pref("security.ssl.errorReporting.enabled", false);
 pref("security.ssl.errorReporting.url", "https://incoming.telemetry.mozilla.org/submit/sslreports/");
 pref("security.ssl.errorReporting.automatic", false);
 
 // Impose a maximum age on HPKP headers, to avoid sites getting permanently
 // blacking themselves out by setting a bad pin.  (60 days by default)
 // https://tools.ietf.org/html/rfc7469#section-4.1
 pref("security.cert_pinning.max_max_age_seconds", 5184000);