### ESR Uplift Approval Request * **If this is not a sec:{high,crit} bug, please state case for ESR consideration**: blocking a non-HTTP port for HTTP traffic. * **User impact if declined**: less protection for an (undisclosed) bug * **Fix Landed on Version**: * **Risk to taking this patch**: Low * **Why is the change risky/not risky? (and alternatives if risky)**: Might be risky if enterprises run stuff on very odd ports in their intranet. We don't have telemetry for this. Users can override with a pref. We can also override the blocking with a remote pref, but I honestly don't know if these overrides would be valid for ESR or if we'd remove the protection on all branches. (Same as https://bugzilla.mozilla.org/show_bug.cgi?id=1674735#c9) * **String or UUID changes made by this patch**:
Bug 1677047 Comment 7 Edit History
Note: The actual edited comment in the bug view page will always show the original commenter’s name and original timestamp.
### ESR Uplift Approval Request * **If this is not a sec:{high,crit} bug, please state case for ESR consideration**: blocking a non-HTTP port for HTTP traffic. * **User impact if declined**: less protection for an (undisclosed) bug * **Fix Landed on Version**: * **Risk to taking this patch**: Low * **Why is the change risky/not risky? (and alternatives if risky)**: Might be risky if enterprises run stuff on very odd ports in their intranet. We don't have telemetry for this. Users can override with a pref. We can also override the blocking with a remote pref, but I honestly don't know if these overrides would be valid for ESR or if we'd remove the protection on all branches. (Same as https://bugzilla.mozilla.org/show_bug.cgi?id=1674735#c9), though this issue here is not public yet * **String or UUID changes made by this patch**: