diff options
author | Moonchild <moonchild@palemoon.org> | 2023-11-09 23:48:50 +0100 |
---|---|---|
committer | Moonchild <moonchild@palemoon.org> | 2023-11-09 23:48:50 +0100 |
commit | 4b3745ad6e0290636647496dc2d3a3703512e5ba (patch) | |
tree | 10972af47bad3e8000c7d2d404d4b293c09bd461 | |
parent | fefc7ad344cc82f20b15aa5bc3a8af66f49e9781 (diff) | |
download | palemoon-4b3745ad6e0290636647496dc2d3a3703512e5ba.tar.gz |
No issue - Limit TLS 1.3 protocol fallback.
Since it's more common these days that there's an incorrect TLS 1.3
hello downgrade request when there's a certificate error and the
resulting malformed hello error isn't very informative, it makes more
sense to simply not allow any downgrades from TLS 1.3 to 1.2.
This makes our handling of connections a little less flexible, but
avoids user confusion and actually allows exceptions to be made in case
of a low-risk cert error like an expiration or incomplete trust chain
as it will then present a certificate trust error instead of the
malformed hello in case of a downgrade that is caught by our downgrade
sentinel.
This will not affect any straight-up TLS 1.2 or 1.3 protocol negotiation
and only changes what we do in case of a downgrade attempt.
-rw-r--r-- | palemoon/branding/shared/pref/preferences.inc | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/palemoon/branding/shared/pref/preferences.inc b/palemoon/branding/shared/pref/preferences.inc index 997a43f04..367f2efed 100644 --- a/palemoon/branding/shared/pref/preferences.inc +++ b/palemoon/branding/shared/pref/preferences.inc @@ -86,6 +86,9 @@ pref("general.useragent.compatMode.gecko", true); pref("general.useragent.compatMode.firefox", true); pref("general.useragent.compatMode.version", "102.0"); +// Limit protocol fallback from TLS 1.3 +pref("security.tls.version.fallback-limit", 4); + // ============================================================================ // ===| DevTools |============================================================= |