mirror of
https://github.com/arkenfox/user.js.git
synced 2025-04-30 22:13:40 +02:00
fxbrit tweaks
This commit is contained in:
parent
850341107d
commit
d551849af3
1 changed files with 4 additions and 4 deletions
8
user.js
8
user.js
|
@ -1,6 +1,6 @@
|
||||||
/******
|
/******
|
||||||
* name: arkenfox user.js
|
* name: arkenfox user.js
|
||||||
* date: 10 February 2022
|
* date: 11 February 2022
|
||||||
* version: 97
|
* version: 97
|
||||||
* url: https://github.com/arkenfox/user.js
|
* url: https://github.com/arkenfox/user.js
|
||||||
* license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
|
* license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
|
||||||
|
@ -456,7 +456,7 @@ user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
|
||||||
* MiTM attack [3]. A server without RFC 5746 can be safe from the attack if it disables renegotiations
|
* MiTM attack [3]. A server without RFC 5746 can be safe from the attack if it disables renegotiations
|
||||||
* but the problem is that the browser can't know that. Setting this pref to true is the only way for the
|
* but the problem is that the browser can't know that. Setting this pref to true is the only way for the
|
||||||
* browser to ensure there will be no unsafe renegotiations on the channel between the browser and the server
|
* browser to ensure there will be no unsafe renegotiations on the channel between the browser and the server
|
||||||
* [SETUP-WEB] SSL_ERROR_UNSAFE_NEGOTIATION: is it worth overriding this for that one site
|
* [SETUP-WEB] SSL_ERROR_UNSAFE_NEGOTIATION: is it worth overriding this for that one site?
|
||||||
* [STATS] SSL Labs (July 2021) reports over 99% of top sites have secure renegotiation [4]
|
* [STATS] SSL Labs (July 2021) reports over 99% of top sites have secure renegotiation [4]
|
||||||
* [1] https://wiki.mozilla.org/Security:Renegotiation
|
* [1] https://wiki.mozilla.org/Security:Renegotiation
|
||||||
* [2] https://datatracker.ietf.org/doc/html/rfc5746
|
* [2] https://datatracker.ietf.org/doc/html/rfc5746
|
||||||
|
@ -1030,8 +1030,8 @@ user_pref("_user.js.parrot", "5000 syntax error: the parrot's taken 'is last bow
|
||||||
// user_pref("browser.download.folderList", 2);
|
// user_pref("browser.download.folderList", 2);
|
||||||
|
|
||||||
/*** [SECTION 5500]: OPTIONAL HARDENING
|
/*** [SECTION 5500]: OPTIONAL HARDENING
|
||||||
Not recommended. Keep in mind that these can cause breakage and performance
|
Not recommended. Overriding these can cause breakage and performance issues,
|
||||||
issues, are mostly fingerprintable, and the threat model is practically zero
|
they are mostly fingerprintable, and the threat model is practically nonexistent
|
||||||
***/
|
***/
|
||||||
user_pref("_user.js.parrot", "5500 syntax error: this is an ex-parrot!");
|
user_pref("_user.js.parrot", "5500 syntax error: this is an ex-parrot!");
|
||||||
/* 5501: disable MathML (Mathematical Markup Language) [FF51+]
|
/* 5501: disable MathML (Mathematical Markup Language) [FF51+]
|
||||||
|
|
Loading…
Add table
Reference in a new issue