diff options
author | Isaac David <isacdaavid@isacdaavid.info> | 2016-04-29 12:11:19 -0500 |
---|---|---|
committer | Isaac David <isacdaavid@isacdaavid.info> | 2016-04-29 12:11:19 -0500 |
commit | 779bb403662231d81cc7602836723cdbb74e03f6 (patch) | |
tree | 9ac9f3433f4ddde800f34b915c6f95fa2c719f9b /libre-testing/icecat/disable-crypto-hardening-settings.patch | |
parent | 1dbbbd3958d3d19f625797dd4b2d2522ee6d974c (diff) | |
download | abslibre-779bb403662231d81cc7602836723cdbb74e03f6.tar.gz abslibre-779bb403662231d81cc7602836723cdbb74e03f6.tar.bz2 abslibre-779bb403662231d81cc7602836723cdbb74e03f6.zip |
libre-testing/icecat: remove package
Diffstat (limited to 'libre-testing/icecat/disable-crypto-hardening-settings.patch')
-rw-r--r-- | libre-testing/icecat/disable-crypto-hardening-settings.patch | 74 |
1 files changed, 0 insertions, 74 deletions
diff --git a/libre-testing/icecat/disable-crypto-hardening-settings.patch b/libre-testing/icecat/disable-crypto-hardening-settings.patch deleted file mode 100644 index 77517c6d0..000000000 --- a/libre-testing/icecat/disable-crypto-hardening-settings.patch +++ /dev/null @@ -1,74 +0,0 @@ -diff -Nur icecat-38.5.2.orig/browser/app/profile/icecat.js icecat-38.5.2/browser/app/profile/icecat.js ---- icecat-38.5.2.orig/browser/app/profile/icecat.js 2015-12-24 18:24:09.000000000 -0300 -+++ icecat-38.5.2/browser/app/profile/icecat.js 2015-12-28 16:06:00.046009585 -0300 -@@ -2047,20 +2047,20 @@ - // Crypto hardening - // https://gist.github.com/haasn/69e19fc2fe0e25f3cff5 - //General settings --pref("security.tls.unrestricted_rc4_fallback", false); --pref("security.tls.insecure_fallback_hosts.use_static_list", false); --pref("security.tls.version.min", 1); --pref("security.ssl.require_safe_negotiation", true); --pref("security.ssl.treat_unsafe_negotiation_as_broken", true); --pref("security.ssl3.rsa_seed_sha", true); --pref("security.OCSP.enabled", 1); --pref("security.OCSP.require", true); -+//pref("security.tls.unrestricted_rc4_fallback", false); -+//pref("security.tls.insecure_fallback_hosts.use_static_list", false); -+//pref("security.tls.version.min", 1); -+//pref("security.ssl.require_safe_negotiation", true); -+//pref("security.ssl.treat_unsafe_negotiation_as_broken", true); -+//pref("security.ssl3.rsa_seed_sha", true); -+//pref("security.OCSP.enabled", 1); -+//pref("security.OCSP.require", true); - //Disable unnecessary protocols --pref("security.ssl3.rsa_rc4_128_sha", false); --pref("security.ssl3.rsa_rc4_128_md5", false); --pref("security.ssl3.rsa_des_ede3_sha", false); --pref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false); --pref("security.ssl3.ecdhe_rsa_rc4_128_sha", false); -+//pref("security.ssl3.rsa_rc4_128_sha", false); -+//pref("security.ssl3.rsa_rc4_128_md5", false); -+//pref("security.ssl3.rsa_des_ede3_sha", false); -+//pref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false); -+//pref("security.ssl3.ecdhe_rsa_rc4_128_sha", false); - // https://directory.fsf.org/wiki/Disable_DHE - // Avoid logjam attack - pref("security.ssl3.dhe_rsa_aes_128_sha", false); -diff -Nur icecat-38.5.2.orig/mobile/android/app/mobile.js icecat-38.5.2/mobile/android/app/mobile.js ---- icecat-38.5.2.orig/mobile/android/app/mobile.js 2015-12-24 18:24:09.000000000 -0300 -+++ icecat-38.5.2/mobile/android/app/mobile.js 2015-12-28 16:06:32.144427580 -0300 -@@ -1009,20 +1009,20 @@ - // Crypto hardening - // https://gist.github.com/haasn/69e19fc2fe0e25f3cff5 - //General settings --pref("security.tls.unrestricted_rc4_fallback", false); --pref("security.tls.insecure_fallback_hosts.use_static_list", false); --pref("security.tls.version.min", 1); --pref("security.ssl.require_safe_negotiation", true); --pref("security.ssl.treat_unsafe_negotiation_as_broken", true); --pref("security.ssl3.rsa_seed_sha", true); --pref("security.OCSP.enabled", 1); --pref("security.OCSP.require", true); -+//pref("security.tls.unrestricted_rc4_fallback", false); -+//pref("security.tls.insecure_fallback_hosts.use_static_list", false); -+//pref("security.tls.version.min", 1); -+//pref("security.ssl.require_safe_negotiation", true); -+//pref("security.ssl.treat_unsafe_negotiation_as_broken", true); -+//pref("security.ssl3.rsa_seed_sha", true); -+//pref("security.OCSP.enabled", 1); -+//pref("security.OCSP.require", true); - //Disable unnecessary protocols --pref("security.ssl3.rsa_rc4_128_sha", false); --pref("security.ssl3.rsa_rc4_128_md5", false); --pref("security.ssl3.rsa_des_ede3_sha", false); --pref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false); --pref("security.ssl3.ecdhe_rsa_rc4_128_sha", false); -+//pref("security.ssl3.rsa_rc4_128_sha", false); -+//pref("security.ssl3.rsa_rc4_128_md5", false); -+//pref("security.ssl3.rsa_des_ede3_sha", false); -+//pref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false); -+//pref("security.ssl3.ecdhe_rsa_rc4_128_sha", false); - // https://directory.fsf.org/wiki/Disable_DHE - // Avoid logjam attack - pref("security.ssl3.dhe_rsa_aes_128_sha", false); |