diff options
author | Ruben Rodriguez <ruben@gnu.org> | 2015-10-10 11:28:21 -0500 |
---|---|---|
committer | Ruben Rodriguez <ruben@gnu.org> | 2015-10-12 23:20:55 -0500 |
commit | 539a005be12fd6e37e12bde27bacfba0de391b59 (patch) | |
tree | 608926733b6bad07facb71412ea9804fd74cb2bd /data/settings.js | |
parent | 1b277f8e11d53af04ef645f95fb32857035e3a33 (diff) |
Added more privacy settings and crypto hardening
Diffstat (limited to 'data/settings.js')
-rw-r--r-- | data/settings.js | 51 |
1 files changed, 38 insertions, 13 deletions
diff --git a/data/settings.js b/data/settings.js index c41320a..31865d3 100644 --- a/data/settings.js +++ b/data/settings.js @@ -136,6 +136,40 @@ pref("plugin.state.flash", 1); pref("browser.search.update", false); // Warn when the page tries to redirect or refresh //pref("accessibility.blockautorefresh", true); +pref("dom.battery.enabled", false); +pref("device.sensors.enabled", false); +pref("camera.control.face_detection.enabled", false); +pref("camera.control.autofocus_moving_callback.enabled", false); +pref("network.http.speculative-parallel-limit", 0); + +// Crypto hardening +// https://gist.github.com/haasn/69e19fc2fe0e25f3cff5 +//General settings +pref("security.tls.unrestricted_rc4_fallback", false); +pref("security.tls.insecure_fallback_hosts.use_static_list", false); +pref("security.tls.version.min", 1); +pref("security.ssl.require_safe_negotiation", true); +pref("security.ssl.treat_unsafe_negotiation_as_broken", true); +pref("security.ssl3.rsa_seed_sha", true); +pref("security.OCSP.enabled", 1); +pref("security.OCSP.require", true); +//Disable unnecessary protocols +pref("security.ssl3.rsa_rc4_128_sha", false); +pref("security.ssl3.rsa_rc4_128_md5", false); +pref("security.ssl3.rsa_des_ede3_sha", false); +pref("security.ssl3.ecdhe_ecdsa_rc4_128_sha", false); +pref("security.ssl3.ecdhe_rsa_rc4_128_sha", false); +// https://directory.fsf.org/wiki/Disable_DHE +// Avoid logjam attack +pref("security.ssl3.dhe_rsa_aes_128_sha", false); +pref("security.ssl3.dhe_rsa_aes_256_sha", false); +pref("security.ssl3.dhe_dss_aes_128_sha", false); +pref("security.ssl3.dhe_rsa_des_ede3_sha", false); +//Optional +//Perfect forward secrecy +// pref("security.ssl3.rsa_aes_256_sha", false); +//Force TLS 1.2 +// pref("security.tls.version.min", 3); // Disable channel updates pref("app.update.enabled", false); @@ -185,12 +219,6 @@ pref("browser.search.defaultenginename", "DuckDuckGo"); pref("browser.search.order.extra.duckduckgo", "DuckDuckGo"); pref("browser.search.showOneOffButtons", false); -// https://directory.fsf.org/wiki/Disable_DHE -pref("security.ssl3.dhe_rsa_aes_128_sha", false); -pref("security.ssl3.dhe_rsa_aes_256_sha", false); -pref("security.ssl3.dhe_dss_aes_128_sha", false); -pref("security.ssl3.dhe_rsa_des_ede3_sha", false); - // Disable Gecko media plugins: https://wiki.mozilla.org/GeckoMediaPlugins pref("media.gmp-manager.url", "http://127.0.0.1/"); pref("media.gmp-manager.url.override", "data:text/plain,"); @@ -210,12 +238,6 @@ pref("loop.enabled",false); // Use old style preferences, that allow javascript to be disabled pref("browser.preferences.inContent",false); -// Avoid logjam attack -pref("security.ssl3.dhe_rsa_aes_128_sha", false); -pref("security.ssl3.dhe_rsa_aes_256_sha", false); -pref("security.ssl3.dhe_dss_aes_128_sha", false); -pref("security.ssl3.dhe_rsa_des_ede3_sha", false); - // Don't download ads for the newtab page pref("browser.newtabpage.directory.source", ""); pref("browser.newtabpage.directory.ping", ""); @@ -226,7 +248,10 @@ pref("browser.aboutHomeSnippets.updateUrl", "data:text/html"); // Disable hardware acceleration and WebGL //pref("layers.acceleration.disabled", false); -//pref("webgl.disabled", false); +pref("webgl.disabled", false); // Disable SSDP pref("browser.casting.enabled", false); + +//Disable directory service +pref("social.directories", ""); |