diff options
-rw-r--r-- | libre/icecat/PKGBUILD | 10 | ||||
-rw-r--r-- | libre/icecat/disable-crypto-hardening-settings.patch | 52 |
2 files changed, 21 insertions, 41 deletions
diff --git a/libre/icecat/PKGBUILD b/libre/icecat/PKGBUILD index 40d275458..74a5ccf66 100644 --- a/libre/icecat/PKGBUILD +++ b/libre/icecat/PKGBUILD @@ -13,14 +13,14 @@ _pgo=true pkgname=icecat -_pkgver=38.7.1-gnu1 +_pkgver=38.8.0-gnu1 pkgver=${_pkgver//-/_} -pkgrel=2 +pkgrel=1 pkgdesc="GNU IceCat, the standalone web browser based on Mozilla Firefox." arch=(i686 x86_64) license=(MPL GPL LGPL) -depends=(alsa-lib dbus-glib desktop-file-utils gtk2 hicolor-icon-theme hunspell icu=57.1 libevent libvpx=1.5.0 libxt mime-types mozilla-common mozilla-searchplugins nss sqlite startup-notification ttf-font) +depends=(alsa-lib dbus-glib gtk2 hicolor-icon-theme hunspell icu=57.1 libevent libvpx=1.5.0 libxt mime-types mozilla-common mozilla-searchplugins nss sqlite startup-notification ttf-font) makedepends=(diffutils gst-plugins-base-libs imake inetutils libpulse mesa python2 unzip yasm zip) options=(!emptydirs !makeflags debug) if $_pgo; then @@ -45,7 +45,7 @@ source=(http://ftp.gnu.org/gnu/gnuzilla/${_pkgver%-*}/$pkgname-$_pkgver.tar.bz2{ remove-google-play-services-support.patch disable-crypto-hardening-settings.patch) mksha256sums=('1f58676fc0bdf60dc37145b8c97f507f0acec9bc84582aeef703cf0ed9744ed3') -sha256sums=('0f65fc8a4fc2a4e73fe97249c24edeb5a84335e22d2868d0334365ada069b5f1' +sha256sums=('97f76e85cc6f98463f0e0b0e845826816032770f9b589db69ece6b1cff21936c' 'SKIP' '33a8cf07373c63a0bea70ec2c3983d2cca990752c0f946cb5dbd91f1e2b6410f' 'dd173c9283babb8a04bf55274de05e823161f7d13adb8c5e21dd5a9c0dc549a2' @@ -55,7 +55,7 @@ sha256sums=('0f65fc8a4fc2a4e73fe97249c24edeb5a84335e22d2868d0334365ada069b5f1' '977aa49b940f1da049cefa2878a63ac6669a78e63e9d55bb11db7b8f8fb64c33' '68e3a5b47c6d175cc95b98b069a15205f027cab83af9e075818d38610feb6213' '9e651b0f7e7d9d663e8b24077d52bad15f011871747743aff60d6e2d7a45ae5b' - 'bcd351d97e99f9a71ff5f44e29037f5451617378527801e32de514ff30583476') + '0166aa368420f0bf0aab064b2188e3d852b241efeeb27dee66df2bc15e84b83a') validpgpkeys=( 'A57369A8BABC2542B5A0368C3C76EED7D7E04784' # Ruben Rodriguez 'C92BAA713B8D53D3CAE63FC9E6974752F9704456' # André Silva diff --git a/libre/icecat/disable-crypto-hardening-settings.patch b/libre/icecat/disable-crypto-hardening-settings.patch index 77517c6d0..3c7dedd77 100644 --- a/libre/icecat/disable-crypto-hardening-settings.patch +++ b/libre/icecat/disable-crypto-hardening-settings.patch @@ -1,7 +1,8 @@ -diff -Nur icecat-38.5.2.orig/browser/app/profile/icecat.js icecat-38.5.2/browser/app/profile/icecat.js ---- icecat-38.5.2.orig/browser/app/profile/icecat.js 2015-12-24 18:24:09.000000000 -0300 -+++ icecat-38.5.2/browser/app/profile/icecat.js 2015-12-28 16:06:00.046009585 -0300 -@@ -2047,20 +2047,20 @@ +diff --git a/browser/app/profile/icecat.js b/browser/app/profile/icecat.js +index 3308a22..6b81444 100644 +--- a/browser/app/profile/icecat.js ++++ b/browser/app/profile/icecat.js +@@ -2035,14 +2035,14 @@ pref("network.http.speculative-parallel-limit", 0); // Crypto hardening // https://gist.github.com/haasn/69e19fc2fe0e25f3cff5 //General settings @@ -21,24 +22,14 @@ diff -Nur icecat-38.5.2.orig/browser/app/profile/icecat.js icecat-38.5.2/browser +//pref("security.ssl3.rsa_seed_sha", true); +//pref("security.OCSP.enabled", 1); +//pref("security.OCSP.require", true); - //Disable unnecessary protocols --pref("security.ssl3.rsa_rc4_128_sha", false); --pref("security.ssl3.rsa_rc4_128_md5", false); --pref("security.ssl3.rsa_des_ede3_sha", false); --pref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false); --pref("security.ssl3.ecdhe_rsa_rc4_128_sha", false); -+//pref("security.ssl3.rsa_rc4_128_sha", false); -+//pref("security.ssl3.rsa_rc4_128_md5", false); -+//pref("security.ssl3.rsa_des_ede3_sha", false); -+//pref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false); -+//pref("security.ssl3.ecdhe_rsa_rc4_128_sha", false); - // https://directory.fsf.org/wiki/Disable_DHE - // Avoid logjam attack - pref("security.ssl3.dhe_rsa_aes_128_sha", false); -diff -Nur icecat-38.5.2.orig/mobile/android/app/mobile.js icecat-38.5.2/mobile/android/app/mobile.js ---- icecat-38.5.2.orig/mobile/android/app/mobile.js 2015-12-24 18:24:09.000000000 -0300 -+++ icecat-38.5.2/mobile/android/app/mobile.js 2015-12-28 16:06:32.144427580 -0300 -@@ -1009,20 +1009,20 @@ + + // Disable channel updates + pref("app.update.enabled", false); +diff --git a/mobile/android/app/mobile.js b/mobile/android/app/mobile.js +index bfc6cba..cfdeb22 100644 +--- a/mobile/android/app/mobile.js ++++ b/mobile/android/app/mobile.js +@@ -997,14 +997,14 @@ pref("network.http.speculative-parallel-limit", 0); // Crypto hardening // https://gist.github.com/haasn/69e19fc2fe0e25f3cff5 //General settings @@ -58,17 +49,6 @@ diff -Nur icecat-38.5.2.orig/mobile/android/app/mobile.js icecat-38.5.2/mobile/a +//pref("security.ssl3.rsa_seed_sha", true); +//pref("security.OCSP.enabled", 1); +//pref("security.OCSP.require", true); - //Disable unnecessary protocols --pref("security.ssl3.rsa_rc4_128_sha", false); --pref("security.ssl3.rsa_rc4_128_md5", false); --pref("security.ssl3.rsa_des_ede3_sha", false); --pref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false); --pref("security.ssl3.ecdhe_rsa_rc4_128_sha", false); -+//pref("security.ssl3.rsa_rc4_128_sha", false); -+//pref("security.ssl3.rsa_rc4_128_md5", false); -+//pref("security.ssl3.rsa_des_ede3_sha", false); -+//pref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false); -+//pref("security.ssl3.ecdhe_rsa_rc4_128_sha", false); - // https://directory.fsf.org/wiki/Disable_DHE - // Avoid logjam attack - pref("security.ssl3.dhe_rsa_aes_128_sha", false); + + // Disable channel updates + pref("app.update.enabled", false); |