From 4add81d3d63136b78af4edae76ae58b287061d05 Mon Sep 17 00:00:00 2001 From: Isaac David Date: Sun, 3 Jan 2016 21:25:14 -0600 Subject: add icecat to [libre-testing]: arm port --- .../icecat/disable-crypto-hardening-settings.patch | 74 ++++++++++++++++++++++ 1 file changed, 74 insertions(+) create mode 100644 libre-testing/icecat/disable-crypto-hardening-settings.patch (limited to 'libre-testing/icecat/disable-crypto-hardening-settings.patch') diff --git a/libre-testing/icecat/disable-crypto-hardening-settings.patch b/libre-testing/icecat/disable-crypto-hardening-settings.patch new file mode 100644 index 000000000..77517c6d0 --- /dev/null +++ b/libre-testing/icecat/disable-crypto-hardening-settings.patch @@ -0,0 +1,74 @@ +diff -Nur icecat-38.5.2.orig/browser/app/profile/icecat.js icecat-38.5.2/browser/app/profile/icecat.js +--- icecat-38.5.2.orig/browser/app/profile/icecat.js 2015-12-24 18:24:09.000000000 -0300 ++++ icecat-38.5.2/browser/app/profile/icecat.js 2015-12-28 16:06:00.046009585 -0300 +@@ -2047,20 +2047,20 @@ + // Crypto hardening + // https://gist.github.com/haasn/69e19fc2fe0e25f3cff5 + //General settings +-pref("security.tls.unrestricted_rc4_fallback", false); +-pref("security.tls.insecure_fallback_hosts.use_static_list", false); +-pref("security.tls.version.min", 1); +-pref("security.ssl.require_safe_negotiation", true); +-pref("security.ssl.treat_unsafe_negotiation_as_broken", true); +-pref("security.ssl3.rsa_seed_sha", true); +-pref("security.OCSP.enabled", 1); +-pref("security.OCSP.require", true); ++//pref("security.tls.unrestricted_rc4_fallback", false); ++//pref("security.tls.insecure_fallback_hosts.use_static_list", false); ++//pref("security.tls.version.min", 1); ++//pref("security.ssl.require_safe_negotiation", true); ++//pref("security.ssl.treat_unsafe_negotiation_as_broken", true); ++//pref("security.ssl3.rsa_seed_sha", true); ++//pref("security.OCSP.enabled", 1); ++//pref("security.OCSP.require", true); + //Disable unnecessary protocols +-pref("security.ssl3.rsa_rc4_128_sha", false); +-pref("security.ssl3.rsa_rc4_128_md5", false); +-pref("security.ssl3.rsa_des_ede3_sha", false); +-pref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false); +-pref("security.ssl3.ecdhe_rsa_rc4_128_sha", false); ++//pref("security.ssl3.rsa_rc4_128_sha", false); ++//pref("security.ssl3.rsa_rc4_128_md5", false); ++//pref("security.ssl3.rsa_des_ede3_sha", false); ++//pref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false); ++//pref("security.ssl3.ecdhe_rsa_rc4_128_sha", false); + // https://directory.fsf.org/wiki/Disable_DHE + // Avoid logjam attack + pref("security.ssl3.dhe_rsa_aes_128_sha", false); +diff -Nur icecat-38.5.2.orig/mobile/android/app/mobile.js icecat-38.5.2/mobile/android/app/mobile.js +--- icecat-38.5.2.orig/mobile/android/app/mobile.js 2015-12-24 18:24:09.000000000 -0300 ++++ icecat-38.5.2/mobile/android/app/mobile.js 2015-12-28 16:06:32.144427580 -0300 +@@ -1009,20 +1009,20 @@ + // Crypto hardening + // https://gist.github.com/haasn/69e19fc2fe0e25f3cff5 + //General settings +-pref("security.tls.unrestricted_rc4_fallback", false); +-pref("security.tls.insecure_fallback_hosts.use_static_list", false); +-pref("security.tls.version.min", 1); +-pref("security.ssl.require_safe_negotiation", true); +-pref("security.ssl.treat_unsafe_negotiation_as_broken", true); +-pref("security.ssl3.rsa_seed_sha", true); +-pref("security.OCSP.enabled", 1); +-pref("security.OCSP.require", true); ++//pref("security.tls.unrestricted_rc4_fallback", false); ++//pref("security.tls.insecure_fallback_hosts.use_static_list", false); ++//pref("security.tls.version.min", 1); ++//pref("security.ssl.require_safe_negotiation", true); ++//pref("security.ssl.treat_unsafe_negotiation_as_broken", true); ++//pref("security.ssl3.rsa_seed_sha", true); ++//pref("security.OCSP.enabled", 1); ++//pref("security.OCSP.require", true); + //Disable unnecessary protocols +-pref("security.ssl3.rsa_rc4_128_sha", false); +-pref("security.ssl3.rsa_rc4_128_md5", false); +-pref("security.ssl3.rsa_des_ede3_sha", false); +-pref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false); +-pref("security.ssl3.ecdhe_rsa_rc4_128_sha", false); ++//pref("security.ssl3.rsa_rc4_128_sha", false); ++//pref("security.ssl3.rsa_rc4_128_md5", false); ++//pref("security.ssl3.rsa_des_ede3_sha", false); ++//pref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false); ++//pref("security.ssl3.ecdhe_rsa_rc4_128_sha", false); + // https://directory.fsf.org/wiki/Disable_DHE + // Avoid logjam attack + pref("security.ssl3.dhe_rsa_aes_128_sha", false); -- cgit v1.2.3-54-g00ecf