summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--libre/icecat/PKGBUILD10
-rw-r--r--libre/icecat/disable-crypto-hardening-settings.patch52
2 files changed, 21 insertions, 41 deletions
diff --git a/libre/icecat/PKGBUILD b/libre/icecat/PKGBUILD
index 40d275458..74a5ccf66 100644
--- a/libre/icecat/PKGBUILD
+++ b/libre/icecat/PKGBUILD
@@ -13,14 +13,14 @@
_pgo=true
pkgname=icecat
-_pkgver=38.7.1-gnu1
+_pkgver=38.8.0-gnu1
pkgver=${_pkgver//-/_}
-pkgrel=2
+pkgrel=1
pkgdesc="GNU IceCat, the standalone web browser based on Mozilla Firefox."
arch=(i686 x86_64)
license=(MPL GPL LGPL)
-depends=(alsa-lib dbus-glib desktop-file-utils gtk2 hicolor-icon-theme hunspell icu=57.1 libevent libvpx=1.5.0 libxt mime-types mozilla-common mozilla-searchplugins nss sqlite startup-notification ttf-font)
+depends=(alsa-lib dbus-glib gtk2 hicolor-icon-theme hunspell icu=57.1 libevent libvpx=1.5.0 libxt mime-types mozilla-common mozilla-searchplugins nss sqlite startup-notification ttf-font)
makedepends=(diffutils gst-plugins-base-libs imake inetutils libpulse mesa python2 unzip yasm zip)
options=(!emptydirs !makeflags debug)
if $_pgo; then
@@ -45,7 +45,7 @@ source=(http://ftp.gnu.org/gnu/gnuzilla/${_pkgver%-*}/$pkgname-$_pkgver.tar.bz2{
remove-google-play-services-support.patch
disable-crypto-hardening-settings.patch)
mksha256sums=('1f58676fc0bdf60dc37145b8c97f507f0acec9bc84582aeef703cf0ed9744ed3')
-sha256sums=('0f65fc8a4fc2a4e73fe97249c24edeb5a84335e22d2868d0334365ada069b5f1'
+sha256sums=('97f76e85cc6f98463f0e0b0e845826816032770f9b589db69ece6b1cff21936c'
'SKIP'
'33a8cf07373c63a0bea70ec2c3983d2cca990752c0f946cb5dbd91f1e2b6410f'
'dd173c9283babb8a04bf55274de05e823161f7d13adb8c5e21dd5a9c0dc549a2'
@@ -55,7 +55,7 @@ sha256sums=('0f65fc8a4fc2a4e73fe97249c24edeb5a84335e22d2868d0334365ada069b5f1'
'977aa49b940f1da049cefa2878a63ac6669a78e63e9d55bb11db7b8f8fb64c33'
'68e3a5b47c6d175cc95b98b069a15205f027cab83af9e075818d38610feb6213'
'9e651b0f7e7d9d663e8b24077d52bad15f011871747743aff60d6e2d7a45ae5b'
- 'bcd351d97e99f9a71ff5f44e29037f5451617378527801e32de514ff30583476')
+ '0166aa368420f0bf0aab064b2188e3d852b241efeeb27dee66df2bc15e84b83a')
validpgpkeys=(
'A57369A8BABC2542B5A0368C3C76EED7D7E04784' # Ruben Rodriguez
'C92BAA713B8D53D3CAE63FC9E6974752F9704456' # André Silva
diff --git a/libre/icecat/disable-crypto-hardening-settings.patch b/libre/icecat/disable-crypto-hardening-settings.patch
index 77517c6d0..3c7dedd77 100644
--- a/libre/icecat/disable-crypto-hardening-settings.patch
+++ b/libre/icecat/disable-crypto-hardening-settings.patch
@@ -1,7 +1,8 @@
-diff -Nur icecat-38.5.2.orig/browser/app/profile/icecat.js icecat-38.5.2/browser/app/profile/icecat.js
---- icecat-38.5.2.orig/browser/app/profile/icecat.js 2015-12-24 18:24:09.000000000 -0300
-+++ icecat-38.5.2/browser/app/profile/icecat.js 2015-12-28 16:06:00.046009585 -0300
-@@ -2047,20 +2047,20 @@
+diff --git a/browser/app/profile/icecat.js b/browser/app/profile/icecat.js
+index 3308a22..6b81444 100644
+--- a/browser/app/profile/icecat.js
++++ b/browser/app/profile/icecat.js
+@@ -2035,14 +2035,14 @@ pref("network.http.speculative-parallel-limit", 0);
// Crypto hardening
// https://gist.github.com/haasn/69e19fc2fe0e25f3cff5
//General settings
@@ -21,24 +22,14 @@ diff -Nur icecat-38.5.2.orig/browser/app/profile/icecat.js icecat-38.5.2/browser
+//pref("security.ssl3.rsa_seed_sha", true);
+//pref("security.OCSP.enabled", 1);
+//pref("security.OCSP.require", true);
- //Disable unnecessary protocols
--pref("security.ssl3.rsa_rc4_128_sha", false);
--pref("security.ssl3.rsa_rc4_128_md5", false);
--pref("security.ssl3.rsa_des_ede3_sha", false);
--pref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false);
--pref("security.ssl3.ecdhe_rsa_rc4_128_sha", false);
-+//pref("security.ssl3.rsa_rc4_128_sha", false);
-+//pref("security.ssl3.rsa_rc4_128_md5", false);
-+//pref("security.ssl3.rsa_des_ede3_sha", false);
-+//pref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false);
-+//pref("security.ssl3.ecdhe_rsa_rc4_128_sha", false);
- // https://directory.fsf.org/wiki/Disable_DHE
- // Avoid logjam attack
- pref("security.ssl3.dhe_rsa_aes_128_sha", false);
-diff -Nur icecat-38.5.2.orig/mobile/android/app/mobile.js icecat-38.5.2/mobile/android/app/mobile.js
---- icecat-38.5.2.orig/mobile/android/app/mobile.js 2015-12-24 18:24:09.000000000 -0300
-+++ icecat-38.5.2/mobile/android/app/mobile.js 2015-12-28 16:06:32.144427580 -0300
-@@ -1009,20 +1009,20 @@
+
+ // Disable channel updates
+ pref("app.update.enabled", false);
+diff --git a/mobile/android/app/mobile.js b/mobile/android/app/mobile.js
+index bfc6cba..cfdeb22 100644
+--- a/mobile/android/app/mobile.js
++++ b/mobile/android/app/mobile.js
+@@ -997,14 +997,14 @@ pref("network.http.speculative-parallel-limit", 0);
// Crypto hardening
// https://gist.github.com/haasn/69e19fc2fe0e25f3cff5
//General settings
@@ -58,17 +49,6 @@ diff -Nur icecat-38.5.2.orig/mobile/android/app/mobile.js icecat-38.5.2/mobile/a
+//pref("security.ssl3.rsa_seed_sha", true);
+//pref("security.OCSP.enabled", 1);
+//pref("security.OCSP.require", true);
- //Disable unnecessary protocols
--pref("security.ssl3.rsa_rc4_128_sha", false);
--pref("security.ssl3.rsa_rc4_128_md5", false);
--pref("security.ssl3.rsa_des_ede3_sha", false);
--pref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false);
--pref("security.ssl3.ecdhe_rsa_rc4_128_sha", false);
-+//pref("security.ssl3.rsa_rc4_128_sha", false);
-+//pref("security.ssl3.rsa_rc4_128_md5", false);
-+//pref("security.ssl3.rsa_des_ede3_sha", false);
-+//pref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false);
-+//pref("security.ssl3.ecdhe_rsa_rc4_128_sha", false);
- // https://directory.fsf.org/wiki/Disable_DHE
- // Avoid logjam attack
- pref("security.ssl3.dhe_rsa_aes_128_sha", false);
+
+ // Disable channel updates
+ pref("app.update.enabled", false);