Networking/Archive/IndividualPriorities
< Networking | Archive
Jump to navigation
Jump to search
Individual Priorities
Only networking team members should be changing priorities. If you have questions about priorities or anything else on this list please email the relevant person or Josh Aas (networking team manager).
Michal Novotny
- IPv6 bug 504014.
- Work on mobile disk cache.
- bug 529733.
- bug 586661.
Bjarne Herland
- Awaiting check-in bug 654926.
- Awaiting review bug 650995.
- Fix bug 661115.
- Work on mobile cache.
- Work on bugs 575928, 613159
- Understand implications and consequences of bug 602611 better
Jason Duell
- finish HTTP headers patch for bug 655389.
- Review remote websockets 537787.
- Review DNS startup prefetch
- mobile cache research/redesign.
- Look into replacing our URL parser with google-url library
- IETF IRI Unicode URL spec work
- lots of little bugs and more reviews...
Brian Smith
- Ongoing: Help intern David Keeler on DNSSEC-based TLS (Keelerification).
- 468736 PSM nsPSMBackgroundThread::requestExit is racy and not threadsafe
- Finalize WebSockets security review.
- 664542
- Test PSM using libpkix vs current cert chain building using SSLLabs and/or EFF SSL Observatory data sets.
- Security review of syn retry - bug 651635
- Remove SSL 2.0 support
- Bug 660749 - PSM doesn't revalidate certificates of resources from the cache.
- Remove support for weak crypto (https://www.wsjsafehouse.com/)
- Fix bug 650307 - Certificate chain is verified twice for EV certificates
- Fix bug 481656 - Change cert viewer to validate/build cert chains the same way they are used for trust decisions
- Fix bug 650296 - PSM may report a different certificate error than what was originally encountered
- Drive certificate exclusion standard (DANE, or a lightweight DANE-like mechanism) forward
- Any libpkix fixes identified during libpkix testing.
- Fix bug 651246 - Make libpkix-based certificate path building/validation the default in PSM (bigger project than I initially expected; see growing list of blocking bugs. Will require lots of testing.)
- Review rrelyea's patches for bug 470994 (and related bugs) - Complete active distrust in NSS
- TLS compression (Google already wrote patches, but they may require some cleanup and we need to enable the feature in PSM.)
- Patches to NSS needed to support NSS/PSM startup time improvements (bug 648407, bug 648435, bug 648431)
- Review bug 360420 - Implement OCSP Stapling, and follow-ups to enable the feature in PSM
- Finalize NSS release and import into mozilla-central
- PSM startup time improvements (bug 648407, bug 648435, bug 648431)
- Review/help on bug 644640 - Implement callbacks to augment validation checking (assigned to Kai) - for extensions to prototype DNSSEC
- Implement ability for HTTPS servers to opt in to pipelining even when it is off by default. (Could/should be given to Patrick?)
- Drive decision on acceptable cert validation staleness (no bug, related to bug 643916, will try to pass off to Gervase)
- Implement subscription-based blocklisting of certs via update ping (Bug 647868, bug 643982) - High risk of slipping
- Fix bug 646156 - Delete or Distrust doesn't work with multiple selected certs
- Fix bug 640625
- Fix bug 590364 - Stop accepting MD5 as a hash algorithm by June 30, 2011
- Fix bug 650355 - Stop accepting MD5 as a hash algorithm in PSM on June 30, 2011
- Fix bug 508633 and 511393 - de-serialize TLS connections.
Honza Bambas
Now
- Review pipelining patches from Patrick McManus (large backlog)
- Bug 621558 - Implement "happy eyeballs" IPv6 autodetection at TCP open, or similar
- Basic network timing data for telemetry:
- Review bug 507361 - localStorage doesn't work in file:/// documents
- Bug 654081 - Firefox 4 doesn't cache font file in TTF or WOFF format (analyze)
- Bug 652440 - auto dial helper does not pop up when open web page
- Bug 480878 - Generic crash nsSSLThread::requestRecvMsgPeek (depends on Brian's work on removing the SSL thread)
- Offline Application Cache future, can we turn this to an efficient optimization?
- Telemetry - next steps: measure more correctly, move some measurements to lower levels
Next
- HTTP Preconnections
- DNS hostname cache (resolve hosts previously needed by document-level host)
- Mixed content detection
- Bug 650279 - Add timing interface for SSL handshake
- Bug 657584 - Optionally record & return details timing information for certificate path validation / revocation checking
- Bug 562917 - implement captive portal detection
Nick Hurley
Patrick McManus
- SPDY 528288
- Websockets deflate-stream extension interop problem with pywebsockets. (this extension is currently disabled due to this issue) 6585466
- Websockets - secreview, follow-on issues 660613 661036
- 658580 IsAlive() with poll more expensive than msg_peek based read.. responsible for cpu hit on tp4 and syn retry feature. with brian smith's help.
- Get HTTP pipelining patches into the tree. tracking bug 603503 which includes sub bugs 232030 447866 597684 599164 602518 603505 603506 603508 603512 603513 603514 615342 631801 (this one needs an update by me) 632496. Primarily waiting on review cycle from honzab, also on operations to do something with 648091. I also continue to actively test and tweak these patches and have recently tried (with mixed success) to break them down and make them a little more accessible. That is ongoing work.
- DNS bug where multiple A records for a single hostname are not properly handled in the case of failures. 641937. Need to update based on review comments.
- After a captive portal releases you there might still be a problem due to long term persistent connections - 628561. I have a patch that will release persistent connections based on shift-reload but it got backed out due to a tp4 regression on win7 only (wtf?).. I'm trying to confirm that this is fixed because of a fix in syn retry
- 649139 first network access on mobile is slow with mark finkle.
- telemetry - add to necko:telemetry and probably actually try and capture a single piece of data as a proof of concept using mark's add-on.
Unassigned Priorities
- Stop blowing away the cache, at least in a disruptive way, after a crash or leaving private browsing mode.