diff options
author | Mark H Weaver <mhw@netris.org> | 2020-01-06 19:52:05 -0500 |
---|---|---|
committer | Mark H Weaver <mhw@netris.org> | 2020-01-07 00:35:38 -0500 |
commit | e98a852d4af7e67e70d5df63742d2b8496d395fe (patch) | |
tree | 41b2bb0ad71953edbb8a5c8ad48dbfab9bc419f2 /data/settings.js | |
parent | a2aea4ddaea66c4b832f8d327a2dad3aa08fb0e4 (diff) |
Improve default settings.
* data/settings.js: Disable all safebrowsing update providers, not
just Mozilla. Make sure updater telemetry is disabled. Don't ping
Mozilla for man-in-the-middle detection. Use the proxy server to do
DNS lookups when using SOCKS. Set 'media.gmp-manager.updateEnabled'
to false, as is done in Tor browser. Don't report TLS errors to
Mozilla.
Diffstat (limited to 'data/settings.js')
-rw-r--r-- | data/settings.js | 16 |
1 files changed, 16 insertions, 0 deletions
diff --git a/data/settings.js b/data/settings.js index da9bd5b..9222d6c 100644 --- a/data/settings.js +++ b/data/settings.js @@ -98,6 +98,10 @@ pref("dom.ipc.plugins.flash.subprocess.crashreporter.enabled", false); pref("browser.safebrowsing.enabled", false); pref("browser.safebrowsing.downloads.remote.enabled", false); pref("browser.safebrowsing.malware.enabled", false); +pref("browser.safebrowsing.provider.google.updateURL", ""); +pref("browser.safebrowsing.provider.google.gethashURL", ""); +pref("browser.safebrowsing.provider.google4.updateURL", ""); +pref("browser.safebrowsing.provider.google4.gethashURL", ""); pref("browser.safebrowsing.provider.mozilla.gethashURL", ""); pref("browser.safebrowsing.provider.mozilla.updateURL", ""); pref("services.sync.privacyURL", "https://www.gnu.org/software/gnuzilla/"); @@ -126,6 +130,8 @@ pref("toolkit.telemetry.enabled", false); pref("toolkit.telemetry.server", ""); pref("experiments.manifest.uri", ""); pref("toolkit.telemetry.unified", false); +// Make sure updater telemetry is disabled; see <https://trac.torproject.org/25909>. +pref("toolkit.telemetry.updatePing.enabled", false); // Do not tell what plugins do we have enabled: https://mail.mozilla.org/pipermail/firefox-dev/2013-November/001186.html pref("plugins.enumerable_names", ""); pref("plugin.state.flash", 0); @@ -143,6 +149,8 @@ pref("browser.urlbar.userMadeSearchSuggestionsChoice", true); pref("browser.search.suggest.enabled", false); // Always ask before restoring the browsing session pref("browser.sessionstore.max_resumed_crashes", 0); +// Don't ping Mozilla for MitM detection, see <https://bugs.torproject.org/32321> +pref("security.certerrors.mitm.priming.enabled", false); // Disable shield/heartbeat pref("extensions.shield-recipe-client.enabled", false); // Don't download ads for the newtab page @@ -207,6 +215,10 @@ pref("media.peerconnection.enabled", true); pref("media.peerconnection.ice.no_host", true); pref("media.peerconnection.ice.default_address_only", true); +// Use the proxy server to do DNS lookups when using SOCKS +// <http://kb.mozillazine.org/Network.proxy.socks_remote_dns> +pref("network.proxy.socks_remote_dns", true); + // Services pref("gecko.handlerService.schemes.mailto.0.name", ""); pref("gecko.handlerService.schemes.mailto.1.name", ""); @@ -253,6 +265,7 @@ pref("pfs.filehint.url", "http://gnuzilla.gnu.org/plugins/PluginFinderService.ph // Disable Gecko media plugins: https://wiki.mozilla.org/GeckoMediaPlugins pref("media.gmp-manager.url.override", "data:text/plain,"); pref("media.gmp-manager.url", ""); +pref("media.gmp-manager.updateEnabled", false); pref("media.gmp-provider.enabled", false); // Don't install openh264 codec pref("media.gmp-gmpopenh264.enabled", false); @@ -292,6 +305,9 @@ pref("browser.casting.enabled", false); //Disable directory service pref("social.directories", ""); +// Don't report TLS errors to Mozilla +pref("security.ssl.errorReporting.enabled", false); + // Crypto hardening // https://gist.github.com/haasn/69e19fc2fe0e25f3cff5 //General settings |