Bug 1201023 - Disable fallback whitelist in Nightly/DevEdition. r=cykesiopka a=sylvestre
authorMasatoshi Kimura <VYV03354@nifty.ne.jp>
Thu, 03 Sep 2015 21:50:51 +0900
changeset 289111 54978c0f1ce766f0b71aa6f067146fee642f7e65
parent 289110 5b331e32276013f99cbe7034f06eb2fbd1e64c80
child 289112 3477b095d58b48cc914e52be4782e593552c6544
push id5067
push userraliiev@mozilla.com
push dateMon, 21 Sep 2015 14:04:52 +0000
treeherdermozilla-beta@14221ffe5b2f [default view] [failures only]
perfherder[talos] [build metrics] [platform microbench] (compared to previous push)
reviewerscykesiopka, sylvestre
bugs1201023
milestone42.0a2
Bug 1201023 - Disable fallback whitelist in Nightly/DevEdition. r=cykesiopka a=sylvestre
netwerk/base/security-prefs.js
--- a/netwerk/base/security-prefs.js
+++ b/netwerk/base/security-prefs.js
@@ -1,21 +1,22 @@
 /* This Source Code Form is subject to the terms of the Mozilla Public
  * License, v. 2.0. If a copy of the MPL was not distributed with this
  * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
 
 pref("security.tls.version.min", 1);
 pref("security.tls.version.max", 3);
 pref("security.tls.version.fallback-limit", 3);
 pref("security.tls.insecure_fallback_hosts", "");
-pref("security.tls.insecure_fallback_hosts.use_static_list", true);
 
 #ifdef RELEASE_BUILD
+pref("security.tls.insecure_fallback_hosts.use_static_list", true);
 pref("security.tls.unrestricted_rc4_fallback", true);
 #else
+pref("security.tls.insecure_fallback_hosts.use_static_list", false);
 pref("security.tls.unrestricted_rc4_fallback", false);
 #endif
 
 pref("security.ssl.treat_unsafe_negotiation_as_broken", false);
 pref("security.ssl.require_safe_negotiation",  false);
 pref("security.ssl.warn_missing_rfc5746",  1);
 pref("security.ssl.enable_ocsp_stapling", true);
 pref("security.ssl.enable_false_start", true);