|
1 | 1 | /******
|
2 | 2 | * name: arkenfox user.js
|
3 |
| -* date: 22 Nov 2020 |
4 |
| -* version 84-alpha |
| 3 | +* date: 17 Jan 2021 |
| 4 | +* version 85-alpha |
5 | 5 | * url: https://github.com/arkenfox/user.js
|
6 | 6 | * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt
|
7 | 7 |
|
@@ -116,7 +116,6 @@ user_pref("browser.newtabpage.activity-stream.telemetry", false);
|
116 | 116 | * Runs code received from a server (aka Remote Code Execution) and sends information back to a metrics server
|
117 | 117 | * [1] https://abouthome-snippets-service.readthedocs.io/ ***/
|
118 | 118 | user_pref("browser.newtabpage.activity-stream.feeds.snippets", false);
|
119 |
| -user_pref("browser.newtabpage.activity-stream.asrouter.providers.snippets", "{}"); |
120 | 119 | /* 0105c: disable Activity Stream Top Stories, Pocket-based and/or sponsored content ***/
|
121 | 120 | user_pref("browser.newtabpage.activity-stream.feeds.section.topstories", false);
|
122 | 121 | user_pref("browser.newtabpage.activity-stream.section.highlights.includePocket", false);
|
@@ -630,9 +629,11 @@ user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
|
630 | 629 | * if it disables renegotiations but the problem is that the browser can't know that.
|
631 | 630 | * Setting this pref to true is the only way for the browser to ensure there will be
|
632 | 631 | * no unsafe renegotiations on the channel between the browser and the server.
|
| 632 | + * [STATS] SSL Labs (Dec 2020) reports 99.0% of sites have secure renegotiation [4] |
633 | 633 | * [1] https://wiki.mozilla.org/Security:Renegotiation
|
634 | 634 | * [2] https://tools.ietf.org/html/rfc5746
|
635 |
| - * [3] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555 ***/ |
| 635 | + * [3] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555 |
| 636 | + * [4] https://www.ssllabs.com/ssl-pulse/ ***/ |
636 | 637 | user_pref("security.ssl.require_safe_negotiation", true);
|
637 | 638 | /* 1202: control TLS versions with min and max
|
638 | 639 | * 1=TLS 1.0, 2=TLS 1.1, 3=TLS 1.2, 4=TLS 1.3
|
@@ -767,10 +768,8 @@ user_pref("dom.security.https_only_mode_send_http_background_request", false);
|
767 | 768 | /** UI (User Interface) ***/
|
768 | 769 | /* 1270: display warning on the padlock for "broken security" (if 1201 is false)
|
769 | 770 | * Bug: warning padlock not indicated for subresources on a secure page! [2]
|
770 |
| - * [STATS] SSL Labs (Dec 2020) reports 99.0% of sites have secure renegotiation [3] |
771 | 771 | * [1] https://wiki.mozilla.org/Security:Renegotiation
|
772 |
| - * [2] https://bugzilla.mozilla.org/1353705 |
773 |
| - * [3] https://www.ssllabs.com/ssl-pulse/ ***/ |
| 772 | + * [2] https://bugzilla.mozilla.org/1353705 ***/ |
774 | 773 | user_pref("security.ssl.treat_unsafe_negotiation_as_broken", true);
|
775 | 774 | /* 1271: control "Add Security Exception" dialog on SSL warnings
|
776 | 775 | * 0=do neither 1=pre-populate url 2=pre-populate url + pre-fetch cert (default)
|
@@ -1191,7 +1190,10 @@ user_pref("permissions.delegation.enabled", false);
|
1191 | 1190 | /* 2624: enable "window.name" protection [FF82+]
|
1192 | 1191 | * If a new page from another domain is loaded into a tab, then window.name is set to an empty string. The original
|
1193 | 1192 | * string is restored if the tab reverts back to the original page. This change prevents some cross-site attacks ***/
|
1194 |
| -user_pref("privacy.window.name.update.enabled", true); |
| 1193 | +user_pref("privacy.window.name.update.enabled", true); // [DEFAULT: true FF86+] |
| 1194 | +/* 2625: disable bypassing 3rd party extension install prompts [FF82+] |
| 1195 | + * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1659530,1681331 ***/ |
| 1196 | +user_pref("extensions.postDownloadThirdPartyPrompt", false); |
1195 | 1197 |
|
1196 | 1198 | /** DOWNLOADS ***/
|
1197 | 1199 | /* 2650: discourage downloading to desktop
|
@@ -1676,12 +1678,6 @@ user_pref("browser.search.geoSpecificDefaults.url", "");
|
1676 | 1678 | /* END: internal custom pref to test for syntax errors ***/
|
1677 | 1679 | user_pref("_user.js.parrot", "SUCCESS: No no he's not dead, he's, he's restin'!");
|
1678 | 1680 |
|
1679 |
| - |
1680 |
| - |
1681 |
| - |
1682 |
| -/*** MY OVERRIDES ***/ |
1683 |
| -user_pref("_user.js.parrot", "overrides section syntax error"); |
1684 |
| - |
1685 | 1681 | /* Enable start page
|
1686 | 1682 | user_pref("browser.startup.page", 1); // 0102
|
1687 | 1683 | user_pref("browser.startup.homepage", "https://duckduckgo.com"); // 0103
|
@@ -1718,5 +1714,3 @@ user_pref("privacy.clearOnShutdown.siteSettings", false); // Site Preferences
|
1718 | 1714 |
|
1719 | 1715 | // Do not resize inner window as a FPR technique
|
1720 | 1716 | user_pref("privacy.resistFingerprinting.letterboxing", false); // 4504
|
1721 |
| - |
1722 |
| -user_pref("_user.js.parrot", "SUCCESS"); |
0 commit comments