bug 1451011 - expire TRR blacklist entries after 20 minutes by default r?mcmanus draft
authorDaniel Stenberg <daniel@haxx.se>
Tue, 03 Apr 2018 17:39:30 +0200
changeset 776692 394da391d93db45abea0fd1b902da1a59b534dc5
parent 776583 4a3275936ddf871103b53e00608e2b8d5aee7e69
push id104954
push userbmo:daniel@haxx.se
push dateTue, 03 Apr 2018 15:40:49 +0000
reviewersmcmanus
bugs1451011
milestone61.0a1
bug 1451011 - expire TRR blacklist entries after 20 minutes by default r?mcmanus MozReview-Commit-ID: 1FYM86WNeW1
modules/libpref/init/all.js
--- a/modules/libpref/init/all.js
+++ b/modules/libpref/init/all.js
@@ -5386,18 +5386,18 @@ pref("network.trr.allow-rfc1918", false)
 // Use GET (rather than POST)
 pref("network.trr.useGET", false);
 // Before TRR is widely used the NS record for this host is fetched
 // from the DOH end point to ensure proper configuration
 pref("network.trr.confirmationNS", "example.com");
 // hardcode the resolution of the hostname in network.trr.uri instead of
 // relying on the system resolver to do it for you
 pref("network.trr.bootstrapAddress", "");
-// TRR blacklist entry expire time (in seconds). Default is 72 hours.
-pref("network.trr.blacklist-duration", 259200);
+// TRR blacklist entry expire time (in seconds). Default is 20 minutes.
+pref("network.trr.blacklist-duration", 1200);
 // Single TRR request timeout, in milliseconds
 pref("network.trr.request-timeout", 3000);
 // Allow AAAA entries to be used "early", before the A results are in
 pref("network.trr.early-AAAA", false);
 
 pref("captivedetect.canonicalURL", "http://detectportal.firefox.com/success.txt");
 pref("captivedetect.canonicalContent", "success\n");
 pref("captivedetect.maxWaitingTime", 5000);