mirror of
https://github.com/arkenfox/user.js.git
synced 2025-02-23 02:43:56 +00:00
7000s: ciphers, #1235
- merged 3DES cipher to bottom: it is still the same order of [1] - 3DES pref will be deprecated: pref name changes, and the cipher slated to be unavailable unless you downgrade to < TLS1.2 - see https://bugzilla.mozilla.org/show_bug.cgi?id=1724072 - FYI: we reset TLS downgrades to session only by resetting the pref currently in 1203 - "Minimal/non-existent threat of downgrade attacks" - FYI: these old ciphers are about 1-2% of traffic (from memory) - but that's still significant breakage - So the only reason to do this would be to harden against downgrade attacks (and inadvertently use weak sites = breakage): but that doesn't fit most user's threat model: and is probably never going to happen for them. Not sure if I can word that much better and just as succinct
This commit is contained in:
parent
8bfee5b59f
commit
2b26cd4f41
39
user.js
39
user.js
@ -51,7 +51,7 @@
|
||||
0800: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS
|
||||
0900: PASSWORDS
|
||||
1000: CACHE / SESSION (RE)STORE / FAVICONS
|
||||
1200: HTTPS (SSL/TLS / OCSP / CERTS / HPKP / CIPHERS)
|
||||
1200: HTTPS (SSL/TLS / OCSP / CERTS / HPKP)
|
||||
1400: FONTS
|
||||
1600: HEADERS / REFERERS
|
||||
1700: CONTAINERS
|
||||
@ -577,7 +577,7 @@ user_pref("browser.shell.shortcutFavicons", false);
|
||||
* [NOTE] favicons.sqlite is sanitized on Firefox close, not in-session ***/
|
||||
// user_pref("browser.chrome.site_icons", false);
|
||||
|
||||
/*** [SECTION 1200]: HTTPS (SSL/TLS / OCSP / CERTS / HPKP / CIPHERS)
|
||||
/*** [SECTION 1200]: HTTPS (SSL/TLS / OCSP / CERTS / HPKP)
|
||||
Your cipher and other settings can be used in server side fingerprinting
|
||||
[TEST] https://www.ssllabs.com/ssltest/viewMyClient.html
|
||||
[TEST] https://browserleaks.com/ssl
|
||||
@ -701,29 +701,6 @@ user_pref("dom.security.https_only_mode_send_http_background_request", false);
|
||||
* [1] https://bugzilla.mozilla.org/1382359 ***/
|
||||
// user_pref("dom.securecontext.whitelist_onions", true);
|
||||
|
||||
/** CIPHERS
|
||||
[WARNING] DO NOT USE: see the section 1200 intro
|
||||
These are the ciphers listed under "Cipher Suites" [1] that are either still using SHA-1 and CBC,
|
||||
and/or are missing Perfect Forward Secrecy [3] and/or have other weaknesses like key sizes of 128
|
||||
[1] https://browserleaks.com/ssl
|
||||
[2] https://en.wikipedia.org/wiki/Key_size
|
||||
[3] https://en.wikipedia.org/wiki/Forward_secrecy
|
||||
***/
|
||||
/* 1261: disable 3DES (effective key size < 128 and no PFS)
|
||||
* [1] https://en.wikipedia.org/wiki/3des#Security
|
||||
* [2] https://en.wikipedia.org/wiki/Meet-in-the-middle_attack
|
||||
* [3] https://www-archive.mozilla.org/projects/security/pki/nss/ssl/fips-ssl-ciphersuites.html ***/
|
||||
// user_pref("security.ssl3.rsa_des_ede3_sha", false);
|
||||
/* 1264: disable the remaining non-modern cipher suites as of FF78 (in order of preferred by FF) ***/
|
||||
// user_pref("security.ssl3.ecdhe_ecdsa_aes_256_sha", false);
|
||||
// user_pref("security.ssl3.ecdhe_ecdsa_aes_128_sha", false);
|
||||
// user_pref("security.ssl3.ecdhe_rsa_aes_128_sha", false);
|
||||
// user_pref("security.ssl3.ecdhe_rsa_aes_256_sha", false);
|
||||
// user_pref("security.ssl3.rsa_aes_128_gcm_sha256", false); // no PFS
|
||||
// user_pref("security.ssl3.rsa_aes_256_gcm_sha384", false); // no PFS
|
||||
// user_pref("security.ssl3.rsa_aes_128_sha", false); // no PFS
|
||||
// user_pref("security.ssl3.rsa_aes_256_sha", false); // no PFS
|
||||
|
||||
/** UI (User Interface) ***/
|
||||
/* 1270: display warning on the padlock for "broken security" (if 1201 is false)
|
||||
* Bug: warning padlock not indicated for subresources on a secure page! [2]
|
||||
@ -1444,6 +1421,18 @@ user_pref("_user.js.parrot", "8000 syntax error: the parrot's pushing up daisies
|
||||
// user_pref("permissions.default.microphone", 0);
|
||||
// user_pref("permissions.default.desktop-notification", 0);
|
||||
// user_pref("permissions.default.xr", 0); // Virtual Reality
|
||||
/* 7003: disable non-modern cipher suites [1]
|
||||
* [WHY] Passive fingerprinting. Minimal/non-existent threat of downgrade attacks
|
||||
* [1] https://browserleaks.com/ssl ***/
|
||||
// user_pref("security.ssl3.ecdhe_ecdsa_aes_256_sha", false);
|
||||
// user_pref("security.ssl3.ecdhe_ecdsa_aes_128_sha", false);
|
||||
// user_pref("security.ssl3.ecdhe_rsa_aes_128_sha", false);
|
||||
// user_pref("security.ssl3.ecdhe_rsa_aes_256_sha", false);
|
||||
// user_pref("security.ssl3.rsa_aes_128_gcm_sha256", false); // no PFS
|
||||
// user_pref("security.ssl3.rsa_aes_256_gcm_sha384", false); // no PFS
|
||||
// user_pref("security.ssl3.rsa_aes_128_sha", false); // no PFS
|
||||
// user_pref("security.ssl3.rsa_aes_256_sha", false); // no PFS
|
||||
// user_pref("security.ssl3.rsa_des_ede3_sha", false); // 3DES
|
||||
|
||||
/*** [SECTION 8000]: DON'T BOTHER: NON-RFP
|
||||
[WHY] They are insufficient to help anti-fingerprinting and do more harm than good
|
||||
|
Loading…
x
Reference in New Issue
Block a user