Skip to content

Commit 7e8b46c

Browse files
committed
1 parent 44b5d5a commit 7e8b46c

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

README.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -367,7 +367,6 @@ Improve visibility of security-related elements, mitigate shoulder-surfing
367367
* Enable Online Certificate Status Protocol [ [1](https://en.wikipedia.org/wiki/Online_Certificate_Status_Protocol) [2](https://www.imperialviolet.org/2014/04/19/revchecking.html) [3](https://www.maikel.pro/blog/current-state-certificate-revocation-crls-ocsp/) [4](https://wiki.mozilla.org/CA:RevocationPlan) [5](https://wiki.mozilla.org/CA:ImprovingRevocation) [6](https://wiki.mozilla.org/CA:OCSP-HardFail) [7](https://news.netcraft.com/archives/2014/04/24/certificate-revocation-why-browsers-remain-affected-by-heartbleed.html) [8](https://news.netcraft.com/archives/2013/04/16/certificate-revocation-and-the-performance-of-ocsp.html) ]
368368
* Enable OCSP Stapling support [ [1](https://en.wikipedia.org/wiki/OCSP_stapling) [2](https://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox/) [3](https://www.digitalocean.com/community/tutorials/how-to-configure-ocsp-stapling-on-apache-and-nginx) ]
369369
* Enable OCSP Must-Staple support (Firefox >= 45) [ [1](https://blog.mozilla.org/security/2015/11/23/improving-revocation-ocsp-must-staple-and-short-lived-certificates/) [2](https://www.entrust.com/ocsp-must-staple/) [3](https://github.com/schomery/privacy-settings/issues/40) ]
370-
* Require a valid OCSP response for OCSP enabled certificates [ [1](https://groups.google.com/forum/#!topic/mozilla.dev.security/n1G-N2-HTVA) ]
371370
* Disable TLS Session Tickets [ [1](https://www.blackhat.com/us-13/briefings.html#NextGen) [2](https://media.blackhat.com/us-13/US-13-Daigniere-TLS-Secrets-Slides.pdf) [3](https://media.blackhat.com/us-13/US-13-Daigniere-TLS-Secrets-WP.pdf) [4](https://bugzilla.mozilla.org/show_bug.cgi?id=917049) [5](https://bugzilla.mozilla.org/show_bug.cgi?id=967977) ]
372371
* Only allow TLS 1.[2-3] [ [1](http://kb.mozillazine.org/Security.tls.version.*) ]
373372
* Disable insecure TLS version fallback [ [1](https://bugzilla.mozilla.org/show_bug.cgi?id=1084025) [2](https://github.com/pyllyukko/user.js/pull/206#issuecomment-280229645) ]

user.js

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1095,12 +1095,13 @@ user_pref("security.ssl.enable_ocsp_stapling", true);
10951095
// NOTICE: Firefox falls back on plain OCSP when must-staple is not configured on the host certificate
10961096
user_pref("security.ssl.enable_ocsp_must_staple", true);
10971097

1098-
// PREF: Require a valid OCSP response for OCSP enabled certificates
1098+
// PREF: Require a valid OCSP response for OCSP enabled certificates (disabled)
10991099
// https://groups.google.com/forum/#!topic/mozilla.dev.security/n1G-N2-HTVA
1100+
// https://www.feistyduck.com/newsletter/issue_121_the_slow_death_of_ocsp
11001101
// Disabling this will make OCSP bypassable by MitM attacks suppressing OCSP responses
11011102
// NOTICE: `security.OCSP.require` will make the connection fail when the OCSP responder is unavailable
11021103
// NOTICE: `security.OCSP.require` is known to break browsing on some [captive portals](https://en.wikipedia.org/wiki/Captive_portal)
1103-
user_pref("security.OCSP.require", true);
1104+
//user_pref("security.OCSP.require", true);
11041105

11051106
// PREF: Disable TLS Session Tickets
11061107
// https://www.blackhat.com/us-13/briefings.html#NextGen

0 commit comments

Comments
 (0)