summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMoonchild <moonchild@palemoon.org>2023-11-09 23:48:50 +0100
committerMoonchild <moonchild@palemoon.org>2023-11-09 23:48:50 +0100
commit4b3745ad6e0290636647496dc2d3a3703512e5ba (patch)
tree10972af47bad3e8000c7d2d404d4b293c09bd461
parentfefc7ad344cc82f20b15aa5bc3a8af66f49e9781 (diff)
downloadpalemoon-4b3745ad6e0290636647496dc2d3a3703512e5ba.tar.gz
No issue - Limit TLS 1.3 protocol fallback.
Since it's more common these days that there's an incorrect TLS 1.3 hello downgrade request when there's a certificate error and the resulting malformed hello error isn't very informative, it makes more sense to simply not allow any downgrades from TLS 1.3 to 1.2. This makes our handling of connections a little less flexible, but avoids user confusion and actually allows exceptions to be made in case of a low-risk cert error like an expiration or incomplete trust chain as it will then present a certificate trust error instead of the malformed hello in case of a downgrade that is caught by our downgrade sentinel. This will not affect any straight-up TLS 1.2 or 1.3 protocol negotiation and only changes what we do in case of a downgrade attempt.
-rw-r--r--palemoon/branding/shared/pref/preferences.inc3
1 files changed, 3 insertions, 0 deletions
diff --git a/palemoon/branding/shared/pref/preferences.inc b/palemoon/branding/shared/pref/preferences.inc
index 997a43f04..367f2efed 100644
--- a/palemoon/branding/shared/pref/preferences.inc
+++ b/palemoon/branding/shared/pref/preferences.inc
@@ -86,6 +86,9 @@ pref("general.useragent.compatMode.gecko", true);
pref("general.useragent.compatMode.firefox", true);
pref("general.useragent.compatMode.version", "102.0");
+// Limit protocol fallback from TLS 1.3
+pref("security.tls.version.fallback-limit", 4);
+
// ============================================================================
// ===| DevTools |=============================================================