--- a/toolkit/components/telemetry/Histograms.json
+++ b/toolkit/components/telemetry/Histograms.json
@@ -1327,87 +1327,100 @@
},
"HTTP_AUTH_DIALOG_STATS": {
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 3,
"description": "Stats about what kind of resource requested http authentication. (0=top-level doc, 1=same origin subresources 2=cross-origin subresources)"
},
"SSL_HANDSHAKE_VERSION": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
+ "bug_numbers": [1250568],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 16,
- "description": "SSL Version (1=tls1, 2=tls1.1, 3=tls1.2)"
+ "description": "SSL Version (1=tls1, 2=tls1.1, 3=tls1.2, 4=tls1.3)"
},
"SSL_TIME_UNTIL_READY": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "exponential",
"high": 60000,
"n_buckets": 200,
"description": "ms of SSL wait time including TCP and proxy tunneling"
},
"SSL_TIME_UNTIL_HANDSHAKE_FINISHED": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "exponential",
"high": 60000,
"n_buckets": 200,
"description": "ms of SSL wait time for full handshake including TCP and proxy tunneling"
},
"SSL_BYTES_BEFORE_CERT_CALLBACK": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "exponential",
"high": 32000,
"n_buckets": 64,
"description": "plaintext bytes read before a server certificate authenticated"
},
"SSL_NPN_TYPE": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 16,
"description": "NPN Results (0=none, 1=negotiated, 2=no-overlap, 3=selected(alpn))"
},
"SSL_RESUMED_SESSION": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "boolean",
"description": "complete TLS connect that used TLS Sesison Resumption"
},
"CERT_VALIDATION_HTTP_REQUEST_RESULT": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 16,
"description": "HTTP result of OCSP, etc.. (0=canceled, 1=OK, 2=FAILED, 3=internal-error)"
},
"CERT_VALIDATION_HTTP_REQUEST_CANCELED_TIME": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "exponential",
"high": 60000,
"n_buckets": 200,
"description": "ms elapsed time of OCSP etc.. that was canceled"
},
"CERT_VALIDATION_HTTP_REQUEST_SUCCEEDED_TIME": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "exponential",
"high": 60000,
"n_buckets": 200,
"description": "ms elapsed time of OCSP etc.. that succeeded"
},
"CERT_VALIDATION_HTTP_REQUEST_FAILED_TIME": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "exponential",
"high": 60000,
"n_buckets": 200,
"description": "ms elapsed time of OCSP etc.. that failed"
},
"SSL_KEY_EXCHANGE_ALGORITHM_FULL": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 16,
"description": "SSL Handshake Key Exchange Algorithm for full handshake (null=0, rsa=1, dh=2, fortezza=3, ecdh=4)"
},
"SSL_KEY_EXCHANGE_ALGORITHM_RESUMED": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 16,
"description": "SSL Handshake Key Exchange Algorithm for resumed handshake (null=0, rsa=1, dh=2, fortezza=3, ecdh=4)"
},
"SSL_OBSERVED_END_ENTITY_CERTIFICATE_LIFETIME": {
"expires_in_version": "55",
"alert_emails": ["seceng-telemetry@mozilla.com"],
@@ -5382,23 +5395,25 @@
"alert_emails": ["memshrink-telemetry-alerts@mozilla.com"],
"expires_in_version": "never",
"kind": "exponential",
"high": 5000,
"n_buckets": 10,
"description": "Time (ms) it takes to run memory reporters when sending a telemetry ping"
},
"SSL_SUCCESFUL_CERT_VALIDATION_TIME_MOZILLAPKIX" : {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "exponential",
"high": 60000,
"n_buckets": 50,
"description": "Time spent on a successful cert verification in mozilla::pkix mode (ms)"
},
"SSL_INITIAL_FAILED_CERT_VALIDATION_TIME_MOZILLAPKIX" : {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "exponential",
"high": 60000,
"n_buckets": 50,
"description": "Time spent on an initially failed cert verification in mozilla::pkix mode (ms)"
},
"CRASH_STORE_COMPRESSED_BYTES": {
"expires_in_version": "never",
@@ -7863,161 +7878,202 @@
"description": "The number of errors using the FormHistoryProvider due to a locked DB. *** No longer needed (bug 1156565). Delete histogram and accumulation code! ***"
},
"SQLITEBRIDGE_PROVIDER_HOME_LOCKED": {
"expires_in_version": "40",
"kind": "enumerated",
"n_values": 10,
"description": "The number of errors using the HomeProvider due to a locked DB. *** No longer needed (bug 1156565). Delete histogram and accumulation code! ***"
},
+ "SSL_TLS13_INTOLERANCE_REASON_PRE": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
+ "bug_numbers": [1250568],
+ "expires_in_version": "never",
+ "kind": "enumerated",
+ "n_values": 64,
+ "description": "detected symptom of TLS 1.3 intolerance, before considering historical info"
+ },
+ "SSL_TLS13_INTOLERANCE_REASON_POST": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
+ "bug_numbers": [1250568],
+ "expires_in_version": "never",
+ "kind": "enumerated",
+ "n_values": 64,
+ "description": "detected symptom of TLS 1.3 intolerance, after considering historical info"
+ },
"SSL_TLS12_INTOLERANCE_REASON_PRE": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 64,
"description": "detected symptom of TLS 1.2 intolerance, before considering historical info"
},
"SSL_TLS12_INTOLERANCE_REASON_POST": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 64,
"description": "detected symptom of TLS 1.2 intolerance, after considering historical info"
},
"SSL_TLS11_INTOLERANCE_REASON_PRE": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 64,
"description": "detected symptom of TLS 1.1 intolerance, before considering historical info"
},
"SSL_TLS11_INTOLERANCE_REASON_POST": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 64,
"description": "detected symptom of TLS 1.1 intolerance, after considering historical info"
},
"SSL_TLS10_INTOLERANCE_REASON_PRE": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 64,
"description": "detected symptom of TLS 1.0 intolerance, before considering historical info"
},
"SSL_TLS10_INTOLERANCE_REASON_POST": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 64,
"description": "detected symptom of TLS 1.0 intolerance, after considering historical info"
},
"SSL_VERSION_FALLBACK_INAPPROPRIATE": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 64,
"description": "TLS/SSL version intolerance was falsely detected, server rejected handshake"
},
"SSL_FALLBACK_LIMIT_REACHED": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "default",
"kind": "enumerated",
"n_values": 16,
"description": "TLS/SSL version fallback reached the minimum version (1=TLS 1.0, 2=TLS 1.1, 3=TLS 1.2) or the fallback limit (4=TLS 1.0, 8=TLS 1.1, 12=TLS 1.2), stopped the fallback"
},
"SSL_WEAK_CIPHERS_FALLBACK": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 64,
"description": "Fallback attempted when server did not support any strong cipher suites"
},
"SSL_CIPHER_SUITE_FULL": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 128,
"description": "Negotiated cipher suite in full handshake (see key in HandshakeCallback in nsNSSCallbacks.cpp)"
},
"SSL_CIPHER_SUITE_RESUMED": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 128,
"description": "Negotiated cipher suite in resumed handshake (see key in HandshakeCallback in nsNSSCallbacks.cpp)"
},
"SSL_KEA_RSA_KEY_SIZE_FULL": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 24,
"description": "RSA KEA (TLS_RSA_*) key size in full handshake"
},
"SSL_KEA_DHE_KEY_SIZE_FULL": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 24,
"description": "DHE KEA (TLS_DHE_*) key size in full handshake"
},
"SSL_KEA_ECDHE_CURVE_FULL": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 36,
"description": "ECDHE KEA (TLS_ECDHE_*) curve (23=P-256, 24=P-384, 25=P-521) in full handshake"
},
"SSL_AUTH_ALGORITHM_FULL": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 16,
"description": "SSL Authentication Algorithm (null=0, rsa=1, dsa=2, ecdsa=4) in full handshake"
},
"SSL_AUTH_RSA_KEY_SIZE_FULL": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 24,
"description": "RSA signature key size for TLS_*_RSA_* in full handshake"
},
"SSL_AUTH_DSA_KEY_SIZE_FULL": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 24,
"description": "DSA signature key size for TLS_*_DSS_* in full handshake"
},
"SSL_AUTH_ECDSA_CURVE_FULL": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 36,
"description": "ECDSA signature curve for TLS_*_ECDSA_* in full handshake (23=P-256, 24=P-384, 25=P-521)"
},
"SSL_SYMMETRIC_CIPHER_FULL": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 32,
"description": "Symmetric cipher used in full handshake (null=0, rc4=1, 3des=4, aes-cbc=7, camellia=8, seed=9, aes-gcm=10)"
},
"SSL_SYMMETRIC_CIPHER_RESUMED": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 32,
"description": "Symmetric cipher used in resumed handshake (null=0, rc4=1, 3des=4, aes-cbc=7, camellia=8, seed=9, aes-gcm=10)"
},
"SSL_REASONS_FOR_NOT_FALSE_STARTING": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 512,
"description": "Bitmask of reasons we did not false start when libssl would have let us (see key in nsNSSCallbacks.cpp)"
},
"SSL_HANDSHAKE_TYPE": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 8,
"description": "Type of handshake (1=resumption, 2=false started, 3=chose not to false start, 4=not allowed to false start)"
},
"SSL_OCSP_STAPLING": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 8,
"description": "Status of OCSP stapling on this handshake (1=present, good; 2=none; 3=present, expired; 4=present, other error)"
},
"SSL_OCSP_MAY_FETCH": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "default",
"kind": "enumerated",
"n_values": 8,
"description": "For non-stapling cases, is OCSP fetching a possibility? (0=yes, 1=no because missing/invalid OCSP URI, 2=no because fetching disabled, 3=no because both)"
},
"SSL_CERT_ERROR_OVERRIDES": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 24,
"description": "Was a certificate error overridden on this handshake? What was it? (0=unknown error (indicating bug), 1=no, >1=a specific error)"
},
"SSL_CERT_VERIFICATION_ERRORS": {
"alert_emails": ["seceng@mozilla.org"],
"expires_in_version": "default",
@@ -8029,16 +8085,17 @@
"alert_emails": ["seceng@mozilla.org"],
"expires_in_version": "default",
"kind": "exponential",
"high": 1024,
"n_buckets": 10,
"description": "How many permanent certificate overrides a user has stored."
},
"SSL_SERVER_AUTH_EKU": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 10,
"description": "Presence of of the Server Authenticaton EKU in accepted SSL server certificates (0=No EKU, 1=EKU present and has id_kp_serverAuth, 2=EKU present and has id_kp_serverAuth as well as some other EKU, 3=EKU present but does not contain id_kp_serverAuth)"
},
"TELEMETRY_TEST_EXPIRED": {
"expires_in_version": "4.0a1",
"kind": "flag",
@@ -8046,21 +8103,23 @@
},
"TLS_ERROR_REPORT_UI": {
"expires_in_version": "never",
"kind": "enumerated",
"n_values": 15,
"description": "User interaction with the TLS Error Reporter in about:neterror (0=Error seen, 1='auto' checked, 2='auto' unchecked, 3=Sent manually, 4=Sent automatically, 5=Send success, 6=Send failure, 7=Report section expanded)"
},
"CERT_OCSP_ENABLED": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "boolean",
"description": "Is OCSP fetching enabled? (pref security.OCSP.enabled)"
},
"CERT_OCSP_REQUIRED": {
+ "alert_emails": ["seceng-telemetry@mozilla.com"],
"expires_in_version": "never",
"kind": "boolean",
"description": "Is OCSP required when the cert has an OCSP URI? (pref security.OCSP.require)"
},
"OSFILE_WORKER_LAUNCH_MS": {
"expires_in_version": "default",
"kind": "exponential",
"description": "The duration between the instant the first message is sent to OS.File and the moment the OS.File worker starts executing JavaScript, in milliseconds",