diff --git a/config/mozilla.cfg b/config/mozilla.cfg index 32a4eaa..6a15f6b 100644 --- a/config/mozilla.cfg +++ b/config/mozilla.cfg @@ -86,6 +86,7 @@ lockPref("browser.newtabpage.activity-stream.feeds.sections", false); // [DESKTO lockPref("browser.newtabpage.activity-stream.feeds.systemtick", false); // [DESKTOP] lockPref("browser.newtabpage.activity-stream.feeds.topsites", false); // [DESKTOP] lockPref("browser.newtabpage.activity-stream.feeds.asrouterfeed", false); // [DESKTOP] +lockPref("browser.newtabpage.activity-stream.feeds.recommendationproviderswitcher", false); // [DESKTOP] // ------------------------------------- // Pref : Disable Activity Stream (others) lockPref("browser.newtabpage.activity-stream.messageCenterExperimentEnabled", false); @@ -98,6 +99,7 @@ lockPref("browser.newtabpage.activity-stream.discoverystream.endpointSpocsClear" lockPref("browser.newtabpage.activity-stream.section.highlights.includeBookmarks", false); // [DESKTOP] lockPref("browser.newtabpage.activity-stream.section.highlights.includeDownloads", false); // [DESKTOP] lockPref("browser.newtabpage.activity-stream.section.highlights.includeVisited", false); // [DESKTOP] +lockPref("browser.newtabpage.activity-stream.discoverystream.personalization.modelKeys", ""); // [DESKTOP] // ------------------------------------- // Pref : Disable new tab tile ads & preload // https://wiki.mozilla.org/Tiles/Technical_Documentation#Ping @@ -515,6 +517,10 @@ lockPref("browser.contentHandlers.types.3.uri", ""); // [FENNEC] // If you're on wifi and an IPv4 DHCP network we will send 0 length UDP packets at port 4886 of your gateway at the default rate of 60hz for 400ms from the start of the transaction in an attempt to improve RTT during the critical early phases // https://bugzilla.mozilla.org/show_bug.cgi?id=888268 lockPref("network.tickle-wifi.enabled", false); +// ------------------------------------- +// Pref : Disable Corroborate.jsm telemetry +// https://bugzilla.mozilla.org/show_bug.cgi?id=1608308 +lockPref("corroborator.enabled", false); // [DESKTOP] // // >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> // Section : IJWY To Shut Up @@ -634,8 +640,8 @@ lockPref("extensions.webcompat-reporter.newIssueEndpoint", ""); // Pref : Don't let XPIProvider install distribution add-ons lockPref("extensions.installDistroAddons", false); // [DEFAULT: false] // [FENNEC] // ------------------------------------- -// Pref : Disable legacy extensions -lockPref("extensions.legacy.enabled", false); +// Pref : Disable experiments extensions +lockPref("extensions.experiments.enabled", false); // ------------------------------------- // Pref : Provide haptic feedback on longPress selection events lockPref("layout.accessiblecaret.hapticfeedback", false); // [DEFAULT: true] @@ -775,7 +781,7 @@ lockPref("browser.download.folderList", 2); // ------------------------------------- // Pref : Enforce user interaction, for security, by always asking the user where to download and then forget // [FENNEC] Fix for downloading issues -lockPref("browser.download.useDownloadDir", false); +lockPref("browser.download.useDownloadDir", false); // [FENNEC - BUG] It causes the breakage of all downloads lockPref("browser.download.lastDir", ""); // [DESKTOP] // ------------------------------------- // Pref : Disable adding downloads to the system's "recent documents" list @@ -1013,13 +1019,12 @@ lockPref("javascript.options.shared_memory", false); // [DEFAULT: false] lockPref("dom.targetBlankNoOpener.enabled", true); // [DEFAULT: false] // ------------------------------------- // Pref : Don't reveal build ID -// Value taken from Tor Browser for Desktop // https://bugzilla.mozilla.org/show_bug.cgi?id=583181 -lockPref("browser.startup.homepage_override.buildID", "20200402060101"); -lockPref("extensions.lastAppBuildId", "20200402060101"); -lockPref("media.gmp-manager.buildID", "20200402050101"); -lockPref("browser.sessionstore.upgradeBackup.latestBuildID", ""); // [DESKTOP] -lockPref("general.buildID.override", "20100101"); +// lockPref("browser.startup.homepage_override.buildID", ""); +// lockPref("extensions.lastAppBuildId", ""); +// lockPref("media.gmp-manager.buildID", ""); +// lockPref("browser.sessionstore.upgradeBackup.latestBuildID", ""); // [DESKTOP] +// lockPref("general.buildID.override", ""); // ------------------------------------- // Pref : Disable raw TCP socket support (mozTCPSocket) // https://trac.torproject.org/projects/tor/ticket/18863 @@ -1050,7 +1055,6 @@ lockPref("webgl.disabled", true); lockPref("webgl.enable-webgl2", false); lockPref("webgl.min_capability_mode", true); lockPref("pdfjs.enableWebGL", false); -lockPref("webgl.disable-extensions", true); // [DEFAULT: false] lockPref("webgl.disable-wgl", true); // [DEFAULT: false] lockPref("webgl.disable-fail-if-major-performance-caveat", true); lockPref("webgl.can-lose-context-in-foreground", false); // [DEFAULT: true] @@ -1116,7 +1120,7 @@ lockPref("browser.urlbar.trimURLs", false); // Pref : Limit history leaks via enumeration (PER TAB: back/forward) // This is a PER TAB session history. You still have a full history stored under all history // Minimum=1=currentpage, 2 is the recommended minimum as some pages use it as a means of referral (e.g. hotlinking), 4 or 6 or 10 may be more practical -lockPref("browser.sessionhistory.max_entries", 3); // [DEFAULT: 50] +lockPref("browser.sessionhistory.max_entries", 4); // [DEFAULT: 50] // ------------------------------------- // Pref : Disable coloring of visited links - CSS history leak // [NOTE] This has NEVER been fully "resolved": in Mozilla/docs it is stated it's only in 'certain circumstances' @@ -1312,6 +1316,7 @@ lockPref("network.http.speculative-parallel-limit", 0); lockPref("network.predictor.enabled", false); lockPref("network.predictor.cleaned-up", true); lockPref("network.predictor.enable-prefetch", false); +lockPref("network.predictor.enable-hover-on-ssl", false); // // >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> // Section : HTTP* / TCP/IP / DNS / PROXY / SOCKS etc. @@ -1386,13 +1391,6 @@ lockPref("network.negotiate-auth.allow-insecure-ntlm-v1", false); // [DESKTOP] // https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555 lockPref("security.ssl.require_safe_negotiation", true); // ------------------------------------- -// Pref : Control TLS versions with min and max -// 1=TLS 1.0, 2=TLS 1.1, 3=TLS 1.2, 4=TLS 1.3 -// [NOTE] Jul-2017: Telemetry indicates approx 2% of TLS web traffic uses 1.0 or 1.1 -// https://www.ssllabs.com/ssl-pulse/ -lockPref("security.tls.version.min", 3); -lockPref("security.tls.version.max", 4); -// ------------------------------------- // Pref : Disable deprecated TLS versions lockPref("security.tls.version.enable-deprecated", false); // ------------------------------------- @@ -1523,9 +1521,9 @@ lockPref("security.ssl3.ecdh_ecdsa_null_sha", false); // [DESKTOP] lockPref("security.ssl3.ecdhe_rsa_aes_128_gcm_sha256", true); // [DEFAULT: true] lockPref("security.ssl3.ecdhe_ecdsa_aes_128_gcm_sha256", true); // [DEFAULT: true] // ------------------------------------- -// Pref : Enable ciphers with ECDHE and key size > 128bits -lockPref("security.ssl3.ecdhe_rsa_aes_256_sha", true); // [DEFAULT: true] -lockPref("security.ssl3.ecdhe_ecdsa_aes_256_sha", true); // [DEFAULT: true] +// Pref : Disable ciphers with ECDHE and key size > 128bits +lockPref("security.ssl3.ecdhe_rsa_aes_256_sha", false); // [DEFAULT: true] +lockPref("security.ssl3.ecdhe_ecdsa_aes_256_sha", false); // [DEFAULT: true] // ------------------------------------- // Pref : Enable ChaCha20 and Poly1305 // https://www.mozilla.org/en-US/firefox/47.0/releasenotes/ @@ -1536,9 +1534,9 @@ lockPref("security.ssl3.ecdhe_ecdsa_aes_256_sha", true); // [DEFAULT: true] lockPref("security.ssl3.ecdhe_ecdsa_chacha20_poly1305_sha256", true); lockPref("security.ssl3.ecdhe_rsa_chacha20_poly1305_sha256", true); // ------------------------------------- -// Pref : Fallbacks due compatibility reasons -lockPref("security.ssl3.rsa_aes_128_sha", true); -lockPref("security.ssl3.rsa_aes_256_sha", true); +// Pref : Disable the remaining non-modern cipher suites (fallbacks) +lockPref("security.ssl3.rsa_aes_128_sha", false); +lockPref("security.ssl3.rsa_aes_256_sha", false); // ------------------------------------- // Pref : Disable ciphers with DSA (max 1024 bits) lockPref("security.ssl3.dhe_dss_aes_128_sha", false); // [DESKTOP] @@ -1594,29 +1592,19 @@ lockPref("network.gio.supported-protocols", ""); // [HIDDEN PREF] // >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> // Section : User Settings // >>>>>>>>>>>>>>>>>>>> -// Pref : Set long press behaviour on "+ Tab" button to display container menu -// 0=disabled long press, 1=when clicked, the menu is shown -// 2=the menu is shown after X milliseconds -// [NOTE] The menu does not contain a non-container tab option -// https://bugzilla.mozilla.org/1328756 -defaultPref("privacy.userContext.longPressBehavior", 2); +// Pref : Set behaviour on "+ Tab" button to display container menu on left click +// [NOTE] The menu is always shown on long press and right click each new tab +// defaultPref("privacy.userContext.newTabContainerOnLeftClick.enabled", true); // [DESKTOP] // ------------------------------------- // Pref : Enable Container Tabs setting in preferences // https://bugzilla.mozilla.org/1279029 -defaultPref("privacy.userContext.ui.enabled", true); +defaultPref("privacy.userContext.ui.enabled", true); // [DESKTOP] // ------------------------------------- // Pref : Enable Container Tabs -defaultPref("privacy.userContext.enabled", true); +defaultPref("privacy.userContext.enabled", true); // [DESKTOP] // ------------------------------------- // Pref : Enable a private container for thumbnail loads -defaultPref("privacy.usercontext.about_newtab_segregation.enabled", true); // [DEFAULT: true] -// ------------------------------------- -// Pref : Enable First Party Isolation -// [SETUP-WEB] May break cross-domain logins and site functionality until perfected -// https://bugzilla.mozilla.org/1260931 -// Enabled via addons -lockPref("privacy.firstparty.isolate", true); -lockPref("privacy.firstparty.isolate.restrict_opener_access", true); +defaultPref("privacy.usercontext.about_newtab_segregation.enabled", true); // [DESKTOP] // // >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> // Section : Passwords @@ -1624,7 +1612,6 @@ lockPref("privacy.firstparty.isolate.restrict_opener_access", true); // Pref : Disable about:logins (Firefox Lockwise) // https://lockwise.firefox.com/ // https://support.mozilla.org/en-US/kb/firefox-lockwise-managing-account-data -lockPref("signon.management.page.enabled", false); // [DESKTOP] lockPref("signon.management.overrideURI", ""); // [DESKTOP] lockPref("signon.management.page.breach-alerts.enabled", false); // [DESKTOP] lockPref("signon.management.page.breachAlertUrl", ""); // [DESKTOP] @@ -1804,6 +1791,10 @@ lockPref("security.insecure_password.ui.enabled", true); // [DESKTOP] // Pref : Disable automatic Firefox start and session restore after reboot // https://bugzilla.mozilla.org/603903 lockPref("toolkit.winRegisterApplicationRestart", false); // [WINDOWS] // [DESKTOP] +// ------------------------------------- +// Pref : Disable "Restore Session", even after a crash +lockPref("browser.sessionstore.resume_from_crash", false); +lockPref("browser.sessionstore.resume_session_once", false); // [DESKTOP] // // >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> // Section : Geolocation / Language / Locale @@ -1830,10 +1821,12 @@ lockPref("javascript.use_us_english_locale", true); // [HIDDEN PREF] lockPref("geo.provider.ms-windows-location", false); // [WINDOWS] // [DESKTOP] lockPref("geo.provider.use_corelocation", false); // [MAC] // [DESKTOP] lockPref("geo.provider.use_gpsd", false); // [LINUX] // [DESKTOP] -lockPref("geo.wifi.uri", ""); // [DESKTOP] +lockPref("geo.provider.network.url", ""); +lockPref("geo.provider-country.network.scan", false); // [FENIX] +lockPref("geo.provider-country.network.url", ""); // [FENIX] // ------------------------------------- // Pref : Disable logging geolocation to the console -lockPref("geo.wifi.logging.enabled", false); // [HIDDEN PREF] // [DESKTOP] +lockPref("geo.provider.network.logging.enabled", false); // [HIDDEN PREF] // [DESKTOP] // ------------------------------------- // Pref : Enforce fallback text encoding to match en-US // When the content or server doesn't declare a charset the browser will fallback to the "Current locale" based on your application language @@ -1862,9 +1855,9 @@ lockPref("font.name.monospace.x-western", "Lucida Console"); // [DEFAULT: Courie // [NOTE] You can do this with uBlock Origin // https://bugzilla.mozilla.org/789788 // https://trac.torproject.org/projects/tor/ticket/8455 -// https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/ +// https://github.com/gorhill/uBlock/wiki/Per-site-switches#no-remote-fonts // defaultPref("gfx.downloadable_fonts.enabled", false); -// defaultPref("gfx.downloadable_fonts.fallback_delay", 0); +// defaultPref("gfx.downloadable_fonts.fallback_delay", -1); // ------------------------------------- // Pref : Disable CSS Font Loading API // [NOTE] Disabling fonts can uglify the web a fair bit. @@ -2285,6 +2278,24 @@ lockPref("network.dns.blockDotOnion", true); // [DEFAULT: true] lockPref("privacy.donottrackheader.enabled", false); // [DEFAULT: true] // // >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> +// Section : FPI (First Party Isolation) +// >>>>>>>>>>>>>>>>>>>> +// Pref : Enable FPI (First Party Isolation) +// [SETUP-WEB] May break cross-domain logins and site functionality until perfected +// https://bugzilla.mozilla.org/1260931 +lockPref("privacy.firstparty.isolate", true); +// ------------------------------------- +// Pref : Enforce FPI restriction for window.opener [FF54+] +// [NOTE] Setting this to false may reduce the breakage in the previous pref +// FF65+ blocks postMessage with targetOrigin "*" if originAttributes don't match. But to reduce breakage it ignores the 1st-party domain (FPD) originAttribute. +// The 2nd pref removes that limitation and will only allow communication if FPDs also match. +// https://bugzilla.mozilla.org/1319773#c22 +// https://bugzilla.mozilla.org/1492607 +// https://developer.mozilla.org/en-US/docs/Web/API/Window/postMessage +lockPref("privacy.firstparty.isolate.restrict_opener_access", true); +lockPref("privacy.firstparty.isolate.block_post_message", true); // [HIDDEN PREF ESR] +// +// >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> // Section : RFP (Resist Fingerprinting) / RFP Alternatives / APIs // >>>>>>>>>>>>>>>>>>>> // Pref : Enable hardening against various fingerprinting vectors (Tor Uplift project) @@ -2718,4 +2729,44 @@ lockPref("remote.force-local", true); lockPref("signon.storeSignons", false); // ------------------------------------- // FF74+ +// ------------------------------------- +// Pref : Disable legacy extensions +// https://bugzilla.mozilla.org/show_bug.cgi?id=1524327 +// https://hg.mozilla.org/comm-central/rev/c1457ba6362c +lockPref("extensions.legacy.enabled", false); +// ------------------------------------- +// Pref : Disable about:logins (Firefox Lockwise) +// https://bugzilla.mozilla.org/show_bug.cgi?id=1606888 +// https://hg.mozilla.org/mozilla-central/rev/0c7b5a9964dd +lockPref("signon.management.page.enabled", false); +// ------------------------------------- +// Pref : Disable WebGL extensions +// https://bugzilla.mozilla.org/show_bug.cgi?id=1477756 +// https://hg.mozilla.org/mozilla-central/rev/ccfa767dba64 +lockPref("webgl.disable-extensions", true); +// ------------------------------------- +// Pref : Disable using the OS's geolocation service +// https://bugzilla.mozilla.org/show_bug.cgi?id=1613627 +// https://hg.mozilla.org/mozilla-central/rev/261683a6e351 +lockPref("geo.wifi.uri", ""); +// ------------------------------------- +// Pref : Disable logging geolocation to the console +// https://bugzilla.mozilla.org/show_bug.cgi?id=1613627 +// https://hg.mozilla.org/mozilla-central/rev/261683a6e351 +lockPref("geo.wifi.logging.enabled", false); // [HIDDEN PREF] +// ------------------------------------- +// Pref : Set behaviour on "+ Tab" button to display container menu +// 0=no menu (default), 1=show when clicked, 2=show on long press +// https://bugzilla.mozilla.org/show_bug.cgi?id=1606265 +// https://hg.mozilla.org/mozilla-central/rev/4a6071f143a5 +defaultPref("privacy.userContext.longPressBehavior", 2); +// ------------------------------------- +// Pref : Control TLS versions with min and max +// 1=TLS 1.0, 2=TLS 1.1, 3=TLS 1.2, 4=TLS 1.3 +// [WARNING] Leave these at default, otherwise you alter your TLS fingerprint. +// https://bugzilla.mozilla.org/show_bug.cgi?id=1606734 +// lockPref("security.tls.version.min", 3); +// lockPref("security.tls.version.max", 4); +// ------------------------------------- +// FF75+ // ------------------------------------- \ No newline at end of file