diff options
Diffstat (limited to 'libre/icecat/disable-crypto-hardening-settings.patch')
-rw-r--r-- | libre/icecat/disable-crypto-hardening-settings.patch | 52 |
1 files changed, 16 insertions, 36 deletions
diff --git a/libre/icecat/disable-crypto-hardening-settings.patch b/libre/icecat/disable-crypto-hardening-settings.patch index 77517c6d0..3c7dedd77 100644 --- a/libre/icecat/disable-crypto-hardening-settings.patch +++ b/libre/icecat/disable-crypto-hardening-settings.patch @@ -1,7 +1,8 @@ -diff -Nur icecat-38.5.2.orig/browser/app/profile/icecat.js icecat-38.5.2/browser/app/profile/icecat.js ---- icecat-38.5.2.orig/browser/app/profile/icecat.js 2015-12-24 18:24:09.000000000 -0300 -+++ icecat-38.5.2/browser/app/profile/icecat.js 2015-12-28 16:06:00.046009585 -0300 -@@ -2047,20 +2047,20 @@ +diff --git a/browser/app/profile/icecat.js b/browser/app/profile/icecat.js +index 3308a22..6b81444 100644 +--- a/browser/app/profile/icecat.js ++++ b/browser/app/profile/icecat.js +@@ -2035,14 +2035,14 @@ pref("network.http.speculative-parallel-limit", 0); // Crypto hardening // https://gist.github.com/haasn/69e19fc2fe0e25f3cff5 //General settings @@ -21,24 +22,14 @@ diff -Nur icecat-38.5.2.orig/browser/app/profile/icecat.js icecat-38.5.2/browser +//pref("security.ssl3.rsa_seed_sha", true); +//pref("security.OCSP.enabled", 1); +//pref("security.OCSP.require", true); - //Disable unnecessary protocols --pref("security.ssl3.rsa_rc4_128_sha", false); --pref("security.ssl3.rsa_rc4_128_md5", false); --pref("security.ssl3.rsa_des_ede3_sha", false); --pref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false); --pref("security.ssl3.ecdhe_rsa_rc4_128_sha", false); -+//pref("security.ssl3.rsa_rc4_128_sha", false); -+//pref("security.ssl3.rsa_rc4_128_md5", false); -+//pref("security.ssl3.rsa_des_ede3_sha", false); -+//pref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false); -+//pref("security.ssl3.ecdhe_rsa_rc4_128_sha", false); - // https://directory.fsf.org/wiki/Disable_DHE - // Avoid logjam attack - pref("security.ssl3.dhe_rsa_aes_128_sha", false); -diff -Nur icecat-38.5.2.orig/mobile/android/app/mobile.js icecat-38.5.2/mobile/android/app/mobile.js ---- icecat-38.5.2.orig/mobile/android/app/mobile.js 2015-12-24 18:24:09.000000000 -0300 -+++ icecat-38.5.2/mobile/android/app/mobile.js 2015-12-28 16:06:32.144427580 -0300 -@@ -1009,20 +1009,20 @@ + + // Disable channel updates + pref("app.update.enabled", false); +diff --git a/mobile/android/app/mobile.js b/mobile/android/app/mobile.js +index bfc6cba..cfdeb22 100644 +--- a/mobile/android/app/mobile.js ++++ b/mobile/android/app/mobile.js +@@ -997,14 +997,14 @@ pref("network.http.speculative-parallel-limit", 0); // Crypto hardening // https://gist.github.com/haasn/69e19fc2fe0e25f3cff5 //General settings @@ -58,17 +49,6 @@ diff -Nur icecat-38.5.2.orig/mobile/android/app/mobile.js icecat-38.5.2/mobile/a +//pref("security.ssl3.rsa_seed_sha", true); +//pref("security.OCSP.enabled", 1); +//pref("security.OCSP.require", true); - //Disable unnecessary protocols --pref("security.ssl3.rsa_rc4_128_sha", false); --pref("security.ssl3.rsa_rc4_128_md5", false); --pref("security.ssl3.rsa_des_ede3_sha", false); --pref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false); --pref("security.ssl3.ecdhe_rsa_rc4_128_sha", false); -+//pref("security.ssl3.rsa_rc4_128_sha", false); -+//pref("security.ssl3.rsa_rc4_128_md5", false); -+//pref("security.ssl3.rsa_des_ede3_sha", false); -+//pref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false); -+//pref("security.ssl3.ecdhe_rsa_rc4_128_sha", false); - // https://directory.fsf.org/wiki/Disable_DHE - // Avoid logjam attack - pref("security.ssl3.dhe_rsa_aes_128_sha", false); + + // Disable channel updates + pref("app.update.enabled", false); |