summaryrefslogtreecommitdiff
path: root/libre/icecat/disable-crypto-hardening-settings.patch
diff options
context:
space:
mode:
Diffstat (limited to 'libre/icecat/disable-crypto-hardening-settings.patch')
-rw-r--r--libre/icecat/disable-crypto-hardening-settings.patch54
1 files changed, 54 insertions, 0 deletions
diff --git a/libre/icecat/disable-crypto-hardening-settings.patch b/libre/icecat/disable-crypto-hardening-settings.patch
new file mode 100644
index 000000000..3c7dedd77
--- /dev/null
+++ b/libre/icecat/disable-crypto-hardening-settings.patch
@@ -0,0 +1,54 @@
+diff --git a/browser/app/profile/icecat.js b/browser/app/profile/icecat.js
+index 3308a22..6b81444 100644
+--- a/browser/app/profile/icecat.js
++++ b/browser/app/profile/icecat.js
+@@ -2035,14 +2035,14 @@ pref("network.http.speculative-parallel-limit", 0);
+ // Crypto hardening
+ // https://gist.github.com/haasn/69e19fc2fe0e25f3cff5
+ //General settings
+-pref("security.tls.unrestricted_rc4_fallback", false);
+-pref("security.tls.insecure_fallback_hosts.use_static_list", false);
+-pref("security.tls.version.min", 1);
+-pref("security.ssl.require_safe_negotiation", true);
+-pref("security.ssl.treat_unsafe_negotiation_as_broken", true);
+-pref("security.ssl3.rsa_seed_sha", true);
+-pref("security.OCSP.enabled", 1);
+-pref("security.OCSP.require", true);
++//pref("security.tls.unrestricted_rc4_fallback", false);
++//pref("security.tls.insecure_fallback_hosts.use_static_list", false);
++//pref("security.tls.version.min", 1);
++//pref("security.ssl.require_safe_negotiation", true);
++//pref("security.ssl.treat_unsafe_negotiation_as_broken", true);
++//pref("security.ssl3.rsa_seed_sha", true);
++//pref("security.OCSP.enabled", 1);
++//pref("security.OCSP.require", true);
+
+ // Disable channel updates
+ pref("app.update.enabled", false);
+diff --git a/mobile/android/app/mobile.js b/mobile/android/app/mobile.js
+index bfc6cba..cfdeb22 100644
+--- a/mobile/android/app/mobile.js
++++ b/mobile/android/app/mobile.js
+@@ -997,14 +997,14 @@ pref("network.http.speculative-parallel-limit", 0);
+ // Crypto hardening
+ // https://gist.github.com/haasn/69e19fc2fe0e25f3cff5
+ //General settings
+-pref("security.tls.unrestricted_rc4_fallback", false);
+-pref("security.tls.insecure_fallback_hosts.use_static_list", false);
+-pref("security.tls.version.min", 1);
+-pref("security.ssl.require_safe_negotiation", true);
+-pref("security.ssl.treat_unsafe_negotiation_as_broken", true);
+-pref("security.ssl3.rsa_seed_sha", true);
+-pref("security.OCSP.enabled", 1);
+-pref("security.OCSP.require", true);
++//pref("security.tls.unrestricted_rc4_fallback", false);
++//pref("security.tls.insecure_fallback_hosts.use_static_list", false);
++//pref("security.tls.version.min", 1);
++//pref("security.ssl.require_safe_negotiation", true);
++//pref("security.ssl.treat_unsafe_negotiation_as_broken", true);
++//pref("security.ssl3.rsa_seed_sha", true);
++//pref("security.OCSP.enabled", 1);
++//pref("security.OCSP.require", true);
+
+ // Disable channel updates
+ pref("app.update.enabled", false);