diff options
author | André Fabian Silva Delgado <emulatorman@parabola.nu> | 2016-12-03 14:21:36 -0300 |
---|---|---|
committer | André Fabian Silva Delgado <emulatorman@parabola.nu> | 2016-12-04 01:12:54 -0300 |
commit | b8c1a2f78a819a1b484cce6d2ba878db9e80fa2f (patch) | |
tree | 7d87d04cc040a31df1e91a76c280a24779487fd9 /libre/icecat/disable-crypto-hardening-settings.patch | |
parent | dafd37bb0307e11a5b55b719e9473da95862d7f8 (diff) |
icecat-45.5.1_gnu1-1: updating version
Diffstat (limited to 'libre/icecat/disable-crypto-hardening-settings.patch')
-rw-r--r-- | libre/icecat/disable-crypto-hardening-settings.patch | 54 |
1 files changed, 54 insertions, 0 deletions
diff --git a/libre/icecat/disable-crypto-hardening-settings.patch b/libre/icecat/disable-crypto-hardening-settings.patch new file mode 100644 index 000000000..3c7dedd77 --- /dev/null +++ b/libre/icecat/disable-crypto-hardening-settings.patch @@ -0,0 +1,54 @@ +diff --git a/browser/app/profile/icecat.js b/browser/app/profile/icecat.js +index 3308a22..6b81444 100644 +--- a/browser/app/profile/icecat.js ++++ b/browser/app/profile/icecat.js +@@ -2035,14 +2035,14 @@ pref("network.http.speculative-parallel-limit", 0); + // Crypto hardening + // https://gist.github.com/haasn/69e19fc2fe0e25f3cff5 + //General settings +-pref("security.tls.unrestricted_rc4_fallback", false); +-pref("security.tls.insecure_fallback_hosts.use_static_list", false); +-pref("security.tls.version.min", 1); +-pref("security.ssl.require_safe_negotiation", true); +-pref("security.ssl.treat_unsafe_negotiation_as_broken", true); +-pref("security.ssl3.rsa_seed_sha", true); +-pref("security.OCSP.enabled", 1); +-pref("security.OCSP.require", true); ++//pref("security.tls.unrestricted_rc4_fallback", false); ++//pref("security.tls.insecure_fallback_hosts.use_static_list", false); ++//pref("security.tls.version.min", 1); ++//pref("security.ssl.require_safe_negotiation", true); ++//pref("security.ssl.treat_unsafe_negotiation_as_broken", true); ++//pref("security.ssl3.rsa_seed_sha", true); ++//pref("security.OCSP.enabled", 1); ++//pref("security.OCSP.require", true); + + // Disable channel updates + pref("app.update.enabled", false); +diff --git a/mobile/android/app/mobile.js b/mobile/android/app/mobile.js +index bfc6cba..cfdeb22 100644 +--- a/mobile/android/app/mobile.js ++++ b/mobile/android/app/mobile.js +@@ -997,14 +997,14 @@ pref("network.http.speculative-parallel-limit", 0); + // Crypto hardening + // https://gist.github.com/haasn/69e19fc2fe0e25f3cff5 + //General settings +-pref("security.tls.unrestricted_rc4_fallback", false); +-pref("security.tls.insecure_fallback_hosts.use_static_list", false); +-pref("security.tls.version.min", 1); +-pref("security.ssl.require_safe_negotiation", true); +-pref("security.ssl.treat_unsafe_negotiation_as_broken", true); +-pref("security.ssl3.rsa_seed_sha", true); +-pref("security.OCSP.enabled", 1); +-pref("security.OCSP.require", true); ++//pref("security.tls.unrestricted_rc4_fallback", false); ++//pref("security.tls.insecure_fallback_hosts.use_static_list", false); ++//pref("security.tls.version.min", 1); ++//pref("security.ssl.require_safe_negotiation", true); ++//pref("security.ssl.treat_unsafe_negotiation_as_broken", true); ++//pref("security.ssl3.rsa_seed_sha", true); ++//pref("security.OCSP.enabled", 1); ++//pref("security.OCSP.require", true); + + // Disable channel updates + pref("app.update.enabled", false); |