mirror of
https://github.com/arkenfox/user.js.git
synced 2025-05-19 23:27:11 +02:00
1201 add setup tag, #1354 thanks 🐟
This commit is contained in:
parent
a568229ea2
commit
1ba6a21e4d
1 changed files with 7 additions and 7 deletions
14
user.js
14
user.js
|
@ -1,7 +1,7 @@
|
||||||
/******
|
/******
|
||||||
* name: arkenfox user.js
|
* name: arkenfox user.js
|
||||||
* date: 22 January 2022
|
* date: 10 February 2022
|
||||||
* version: 97-alpha
|
* version: 97
|
||||||
* url: https://github.com/arkenfox/user.js
|
* url: https://github.com/arkenfox/user.js
|
||||||
* license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
|
* license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
|
||||||
|
|
||||||
|
@ -452,11 +452,11 @@ user_pref("browser.shell.shortcutFavicons", false);
|
||||||
user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
|
user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
|
||||||
/** SSL (Secure Sockets Layer) / TLS (Transport Layer Security) ***/
|
/** SSL (Secure Sockets Layer) / TLS (Transport Layer Security) ***/
|
||||||
/* 1201: require safe negotiation
|
/* 1201: require safe negotiation
|
||||||
* Blocks connections (SSL_ERROR_UNSAFE_NEGOTIATION) to servers that don't support RFC 5746 [2]
|
* Blocks connections to servers that don't support RFC 5746 [2] as they're potentially vulnerable to a
|
||||||
* as they're potentially vulnerable to a MiTM attack [3]. A server without RFC 5746 can be
|
* MiTM attack [3]. A server without RFC 5746 can be safe from the attack if it disables renegotiations
|
||||||
* safe from the attack if it disables renegotiations but the problem is that the browser can't
|
* but the problem is that the browser can't know that. Setting this pref to true is the only way for the
|
||||||
* know that. Setting this pref to true is the only way for the browser to ensure there will be
|
* browser to ensure there will be no unsafe renegotiations on the channel between the browser and the server
|
||||||
* no unsafe renegotiations on the channel between the browser and the server.
|
* [SETUP-WEB] SSL_ERROR_UNSAFE_NEGOTIATION: is it worth overriding this for that one site
|
||||||
* [STATS] SSL Labs (July 2021) reports over 99% of top sites have secure renegotiation [4]
|
* [STATS] SSL Labs (July 2021) reports over 99% of top sites have secure renegotiation [4]
|
||||||
* [1] https://wiki.mozilla.org/Security:Renegotiation
|
* [1] https://wiki.mozilla.org/Security:Renegotiation
|
||||||
* [2] https://datatracker.ietf.org/doc/html/rfc5746
|
* [2] https://datatracker.ietf.org/doc/html/rfc5746
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue