summaryrefslogtreecommitdiff
path: root/libre-testing/icecat/disable-crypto-hardening-settings.patch
diff options
context:
space:
mode:
Diffstat (limited to 'libre-testing/icecat/disable-crypto-hardening-settings.patch')
-rw-r--r--libre-testing/icecat/disable-crypto-hardening-settings.patch74
1 files changed, 74 insertions, 0 deletions
diff --git a/libre-testing/icecat/disable-crypto-hardening-settings.patch b/libre-testing/icecat/disable-crypto-hardening-settings.patch
new file mode 100644
index 000000000..77517c6d0
--- /dev/null
+++ b/libre-testing/icecat/disable-crypto-hardening-settings.patch
@@ -0,0 +1,74 @@
+diff -Nur icecat-38.5.2.orig/browser/app/profile/icecat.js icecat-38.5.2/browser/app/profile/icecat.js
+--- icecat-38.5.2.orig/browser/app/profile/icecat.js 2015-12-24 18:24:09.000000000 -0300
++++ icecat-38.5.2/browser/app/profile/icecat.js 2015-12-28 16:06:00.046009585 -0300
+@@ -2047,20 +2047,20 @@
+ // Crypto hardening
+ // https://gist.github.com/haasn/69e19fc2fe0e25f3cff5
+ //General settings
+-pref("security.tls.unrestricted_rc4_fallback", false);
+-pref("security.tls.insecure_fallback_hosts.use_static_list", false);
+-pref("security.tls.version.min", 1);
+-pref("security.ssl.require_safe_negotiation", true);
+-pref("security.ssl.treat_unsafe_negotiation_as_broken", true);
+-pref("security.ssl3.rsa_seed_sha", true);
+-pref("security.OCSP.enabled", 1);
+-pref("security.OCSP.require", true);
++//pref("security.tls.unrestricted_rc4_fallback", false);
++//pref("security.tls.insecure_fallback_hosts.use_static_list", false);
++//pref("security.tls.version.min", 1);
++//pref("security.ssl.require_safe_negotiation", true);
++//pref("security.ssl.treat_unsafe_negotiation_as_broken", true);
++//pref("security.ssl3.rsa_seed_sha", true);
++//pref("security.OCSP.enabled", 1);
++//pref("security.OCSP.require", true);
+ //Disable unnecessary protocols
+-pref("security.ssl3.rsa_rc4_128_sha", false);
+-pref("security.ssl3.rsa_rc4_128_md5", false);
+-pref("security.ssl3.rsa_des_ede3_sha", false);
+-pref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false);
+-pref("security.ssl3.ecdhe_rsa_rc4_128_sha", false);
++//pref("security.ssl3.rsa_rc4_128_sha", false);
++//pref("security.ssl3.rsa_rc4_128_md5", false);
++//pref("security.ssl3.rsa_des_ede3_sha", false);
++//pref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false);
++//pref("security.ssl3.ecdhe_rsa_rc4_128_sha", false);
+ // https://directory.fsf.org/wiki/Disable_DHE
+ // Avoid logjam attack
+ pref("security.ssl3.dhe_rsa_aes_128_sha", false);
+diff -Nur icecat-38.5.2.orig/mobile/android/app/mobile.js icecat-38.5.2/mobile/android/app/mobile.js
+--- icecat-38.5.2.orig/mobile/android/app/mobile.js 2015-12-24 18:24:09.000000000 -0300
++++ icecat-38.5.2/mobile/android/app/mobile.js 2015-12-28 16:06:32.144427580 -0300
+@@ -1009,20 +1009,20 @@
+ // Crypto hardening
+ // https://gist.github.com/haasn/69e19fc2fe0e25f3cff5
+ //General settings
+-pref("security.tls.unrestricted_rc4_fallback", false);
+-pref("security.tls.insecure_fallback_hosts.use_static_list", false);
+-pref("security.tls.version.min", 1);
+-pref("security.ssl.require_safe_negotiation", true);
+-pref("security.ssl.treat_unsafe_negotiation_as_broken", true);
+-pref("security.ssl3.rsa_seed_sha", true);
+-pref("security.OCSP.enabled", 1);
+-pref("security.OCSP.require", true);
++//pref("security.tls.unrestricted_rc4_fallback", false);
++//pref("security.tls.insecure_fallback_hosts.use_static_list", false);
++//pref("security.tls.version.min", 1);
++//pref("security.ssl.require_safe_negotiation", true);
++//pref("security.ssl.treat_unsafe_negotiation_as_broken", true);
++//pref("security.ssl3.rsa_seed_sha", true);
++//pref("security.OCSP.enabled", 1);
++//pref("security.OCSP.require", true);
+ //Disable unnecessary protocols
+-pref("security.ssl3.rsa_rc4_128_sha", false);
+-pref("security.ssl3.rsa_rc4_128_md5", false);
+-pref("security.ssl3.rsa_des_ede3_sha", false);
+-pref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false);
+-pref("security.ssl3.ecdhe_rsa_rc4_128_sha", false);
++//pref("security.ssl3.rsa_rc4_128_sha", false);
++//pref("security.ssl3.rsa_rc4_128_md5", false);
++//pref("security.ssl3.rsa_des_ede3_sha", false);
++//pref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false);
++//pref("security.ssl3.ecdhe_rsa_rc4_128_sha", false);
+ // https://directory.fsf.org/wiki/Disable_DHE
+ // Avoid logjam attack
+ pref("security.ssl3.dhe_rsa_aes_128_sha", false);