File tree Expand file tree Collapse file tree 2 files changed +3
-3
lines changed
Expand file tree Collapse file tree 2 files changed +3
-3
lines changed Original file line number Diff line number Diff line change @@ -367,7 +367,6 @@ Improve visibility of security-related elements, mitigate shoulder-surfing
367367* Enable Online Certificate Status Protocol [ [ 1] ( https://en.wikipedia.org/wiki/Online_Certificate_Status_Protocol ) [ 2] ( https://www.imperialviolet.org/2014/04/19/revchecking.html ) [ 3] ( https://www.maikel.pro/blog/current-state-certificate-revocation-crls-ocsp/ ) [ 4] ( https://wiki.mozilla.org/CA:RevocationPlan ) [ 5] ( https://wiki.mozilla.org/CA:ImprovingRevocation ) [ 6] ( https://wiki.mozilla.org/CA:OCSP-HardFail ) [ 7] ( https://news.netcraft.com/archives/2014/04/24/certificate-revocation-why-browsers-remain-affected-by-heartbleed.html ) [ 8] ( https://news.netcraft.com/archives/2013/04/16/certificate-revocation-and-the-performance-of-ocsp.html ) ]
368368* Enable OCSP Stapling support [ [ 1] ( https://en.wikipedia.org/wiki/OCSP_stapling ) [ 2] ( https://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox/ ) [ 3] ( https://www.digitalocean.com/community/tutorials/how-to-configure-ocsp-stapling-on-apache-and-nginx ) ]
369369* Enable OCSP Must-Staple support (Firefox >= 45) [ [ 1] ( https://blog.mozilla.org/security/2015/11/23/improving-revocation-ocsp-must-staple-and-short-lived-certificates/ ) [ 2] ( https://www.entrust.com/ocsp-must-staple/ ) [ 3] ( https://github.com/schomery/privacy-settings/issues/40 ) ]
370- * Require a valid OCSP response for OCSP enabled certificates [ [ 1] ( https://groups.google.com/forum/#!topic/mozilla.dev.security/n1G-N2-HTVA ) ]
371370* Disable TLS Session Tickets [ [ 1] ( https://www.blackhat.com/us-13/briefings.html#NextGen ) [ 2] ( https://media.blackhat.com/us-13/US-13-Daigniere-TLS-Secrets-Slides.pdf ) [ 3] ( https://media.blackhat.com/us-13/US-13-Daigniere-TLS-Secrets-WP.pdf ) [ 4] ( https://bugzilla.mozilla.org/show_bug.cgi?id=917049 ) [ 5] ( https://bugzilla.mozilla.org/show_bug.cgi?id=967977 ) ]
372371* Only allow TLS 1.[ 2-3] [ [ 1] ( http://kb.mozillazine.org/Security.tls.version.* ) ]
373372* Disable insecure TLS version fallback [ [ 1] ( https://bugzilla.mozilla.org/show_bug.cgi?id=1084025 ) [ 2] ( https://github.com/pyllyukko/user.js/pull/206#issuecomment-280229645 ) ]
Original file line number Diff line number Diff line change @@ -1095,12 +1095,13 @@ user_pref("security.ssl.enable_ocsp_stapling", true);
10951095// NOTICE: Firefox falls back on plain OCSP when must-staple is not configured on the host certificate
10961096user_pref ( "security.ssl.enable_ocsp_must_staple" , true ) ;
10971097
1098- // PREF: Require a valid OCSP response for OCSP enabled certificates
1098+ // PREF: Require a valid OCSP response for OCSP enabled certificates (disabled)
10991099// https://groups.google.com/forum/#!topic/mozilla.dev.security/n1G-N2-HTVA
1100+ // https://www.feistyduck.com/newsletter/issue_121_the_slow_death_of_ocsp
11001101// Disabling this will make OCSP bypassable by MitM attacks suppressing OCSP responses
11011102// NOTICE: `security.OCSP.require` will make the connection fail when the OCSP responder is unavailable
11021103// NOTICE: `security.OCSP.require` is known to break browsing on some [captive portals](https://en.wikipedia.org/wiki/Captive_portal)
1103- user_pref ( "security.OCSP.require" , true ) ;
1104+ // user_pref("security.OCSP.require", true);
11041105
11051106// PREF: Disable TLS Session Tickets
11061107// https://www.blackhat.com/us-13/briefings.html#NextGen
You can’t perform that action at this time.
0 commit comments