Update 'user.js'

This commit is contained in:
Narsil 2021-07-21 07:30:27 +00:00
parent 61a6234940
commit 68caddd032
1 changed files with 22 additions and 24 deletions

46
user.js
View File

@ -126,7 +126,7 @@ user_pref("browser.search.region", "US"); // [HIDDEN PREF]
// https://addons.mozilla.org/about ***/
user_pref("intl.accept_languages", "en-US, en");
// -------------------------------------
// Enforce US English locale regardless of the system locale
// Use US English locale regardless of the system locale
// [SETUP-WEB] May break some input methods e.g xim/ibus for CJK languages
// https://bugzilla.mozilla.org/buglist.cgi?bug_id=867501,1629630 ***/
user_pref("javascript.use_us_english_locale", true); // [HIDDEN PREF]
@ -305,19 +305,6 @@ user_pref("media.webvtt.testing.events", false);
// https://bugzilla.mozilla.org/show_bug.cgi?id=1608308
user_pref("corroborator.enabled", false);
// -------------------------------------
// Disable Remote Settings
// https://github.com/mozilla-services/remote-settings-lambdas
// https://remote-settings.readthedocs.io/en/latest/
user_pref("security.remote_settings.intermediates.enabled", false);
user_pref("security.remote_settings.intermediates.bucket", "");
user_pref("security.remote_settings.intermediates.collection", "");
user_pref("security.remote_settings.intermediates.signer", "");
user_pref("security.remote_settings.crlite_filters.enabled", false);
user_pref("security.remote_settings.crlite_filters.bucket", "");
user_pref("security.remote_settings.crlite_filters.collection", "");
user_pref("security.remote_settings.crlite_filters.signer", "");
user_pref("security.pki.crlite_mode", 0);
// -------------------------------------
// Block unwanted connections
user_pref("app.feedback.baseURL", "");
user_pref("app.support.baseURL", "");
@ -516,7 +503,7 @@ user_pref("network.dns.disableIPv6", true);
user_pref("network.http.altsvc.enabled", false);
user_pref("network.http.altsvc.oe", false);
// -------------------------------------
// Enforce the proxy server to do any DNS lookups when using SOCKS
// Set the proxy server to do any DNS lookups when using SOCKS
// e.g. in Tor, this stops your local DNS server from knowing your Tor destination
// as a remote Tor node will handle the DNS request
// https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/WebBrowsers ***/
@ -784,9 +771,6 @@ user_pref("security.ssl.require_safe_negotiation", true);
// user_pref("security.tls.version.min", 3); // [DEFAULT: 3]
// user_pref("security.tls.version.max", 4);
// -------------------------------------
// Enforce TLS 1.0 and 1.1 downgrades as session only
user_pref("security.tls.version.enable-deprecated", false);
// -------------------------------------
// Disable SSL session tracking [FF36+]
// SSL Session IDs are unique and last up to 24hrs in Firefox (or longer with prolongation attacks)
// These are not used in PB mode. In normal windows they are isolated when using FPI
@ -854,12 +838,26 @@ user_pref("security.family_safety.mode", 0);
// https://shiftordie.de/blog/2017/02/21/fingerprinting-firefox-users-with-cached-intermediate-ca-certificates-fiprinca/ ***/
// user_pref("security.nocertdb", true); // [HIDDEN PREF]
// -------------------------------------
// Enforce strict pinning
// Enable strict pinning
// PKP (Public Key Pinning) 0=disabled 1=allow user MiTM (such as your antivirus), 2=strict
// [SETUP-WEB] If you rely on an AV (antivirus) to protect your web browsing
// by inspecting ALL your web traffic, then leave at current default=1
// https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/16206 ***/
user_pref("security.cert_pinning.enforcement_level", 2);
// -------------------------------------
// Disable CRLite [FF73+]
// In FF84+ it covers valid certs and in mode 2 doesn't fall back to OCSP
// https://bugzilla.mozilla.org/buglist.cgi?bug_id=1429800,1670985
// https://blog.mozilla.org/security/tag/crlite/ ***/
user_pref("security.remote_settings.intermediates.enabled", false);
user_pref("security.remote_settings.intermediates.bucket", "");
user_pref("security.remote_settings.intermediates.collection", "");
user_pref("security.remote_settings.intermediates.signer", "");
user_pref("security.remote_settings.crlite_filters.enabled", false);
user_pref("security.remote_settings.crlite_filters.bucket", "");
user_pref("security.remote_settings.crlite_filters.collection", "");
user_pref("security.remote_settings.crlite_filters.signer", "");
user_pref("security.pki.crlite_mode", 0);
//
// >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
// MIXED CONTENT ***/
@ -1344,7 +1342,7 @@ user_pref("permissions.manager.defaultsUrl", "");
// Remove webchannel whitelist ***/
user_pref("webchannel.allowObject.urlWhitelist", "");
// -------------------------------------
// Enforce Punycode for Internationalized Domain Names to eliminate possible spoofing
// Use Punycode in Internationalized Domain Names to eliminate possible spoofing
// Firefox has *some* protections, but it is better to be safe than sorry
// [SETUP-WEB] Might be undesirable for non-latin alphabet users since legitimate IDN's are also punycoded
// [TEST] https://www.xn--80ak6aa92e.com/ (www.apple.com)
@ -1407,7 +1405,7 @@ user_pref("widget.non-native-theme.enabled", true); // [DEFAULT: true FF89+]
// [SETTING] To set your default "downloads": General>Downloads>Save files to ***/
// user_pref("browser.download.folderList", 2);
// -------------------------------------
// Enforce user interaction for security by always asking where to download
// Enable user interaction for security by always asking where to download
// [SETUP-CHROME] On Android this blocks longtapping and saving images
// [SETTING] General>Downloads>Always ask you where to save files ***/
user_pref("browser.download.useDownloadDir", false);
@ -1441,13 +1439,13 @@ user_pref("extensions.autoDisableScopes", 15); // [DEFAULT: 15]
// SECURITY ***/
// >>>>>>>>>>>>>>>>>>>>>
// Enforce CSP (Content Security Policy)
// [WARNING] CSP is a very important and widespread security feature. Don't disable it!
// [NOTE] CSP is a very important and widespread security feature. Don't disable it!
// https://developer.mozilla.org/docs/Web/HTTP/CSP ***/
user_pref("security.csp.enable", true); // [DEFAULT: true]
// -------------------------------------
// Enforce a security delay on some confirmation dialogs such as install, open/save
// https://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/ ***/
user_pref("security.dialog_enable_delay", 700);
user_pref("security.dialog_enable_delay", 1000); // [DEFAULT: 1000]
// -------------------------------------
// Enable Site Isolation
user_pref("fission.autostart", true);
@ -1743,7 +1741,7 @@ user_pref("ui.systemUsesDarkTheme", 0); // [HIDDEN PREF]
// https://bugzilla.mozilla.org/1288359
user_pref("dom.webaudio.enabled", false);
// -------------------------------------
// Limit font visibility (non-ANDROID) [FF79+]
// Limit font visibility (Windows, Mac, some Linux) [FF79+]
// Uses hardcoded lists with two parts: kBaseFonts + kLangPackFonts
// 1=only base system fonts, 2=also fonts from optional language packs, 3=also user-installed fonts
// [NOTE] Bundled fonts are auto-allowed