Skip to content

Commit 8c93d7f

Browse files
committed
Disable ciphers with CBC & SHA-1
1 parent 1aab77e commit 8c93d7f

File tree

2 files changed

+6
-5
lines changed

2 files changed

+6
-5
lines changed

README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -394,6 +394,7 @@ This section tweaks the cipher suites used by Firefox. The idea is to support on
394394
* Enable ChaCha20 and Poly1305 (Firefox >= 47) [ [1](https://www.mozilla.org/en-US/firefox/47.0/releasenotes/) [2](https://tools.ietf.org/html/rfc7905) [3](https://bugzilla.mozilla.org/show_bug.cgi?id=917571) [4](https://bugzilla.mozilla.org/show_bug.cgi?id=1247860) [5](https://cr.yp.to/chacha.html) ]
395395
* Disable ciphers susceptible to the logjam attack [ [1](https://weakdh.org/) ]
396396
* Disable ciphers with DSA (max 1024 bits)
397+
* Disable ciphers with CBC & SHA-1
397398
* Enable X25519Kyber768Draft00 (post-quantum key exchange) [FF Nightly 2024-01-18+] [ [1](https://datatracker.ietf.org/doc/draft-tls-westerbaan-xyber768d00/) [2](https://twitter.com/bwesterb/status/1748017372764475519) [3](https://pq.cloudflareresearch.com/) ]
398399
<!-- END SECTION -->
399400

user.js

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1274,11 +1274,11 @@ user_pref("security.ssl3.dhe_dss_aes_256_sha", false);
12741274
user_pref("security.ssl3.dhe_dss_camellia_128_sha", false);
12751275
user_pref("security.ssl3.dhe_dss_camellia_256_sha", false);
12761276

1277-
// PREF: Ciphers with CBC & SHA-1 (disabled)
1278-
//user_pref("security.ssl3.rsa_aes_256_sha", false); // 0x35
1279-
//user_pref("security.ssl3.rsa_aes_128_sha", false); // 0x2f
1280-
//user_pref("security.ssl3.ecdhe_rsa_aes_256_sha", false); // 0xc014
1281-
//user_pref("security.ssl3.ecdhe_ecdsa_aes_256_sha", false); // 0xc00a
1277+
// PREF: Disable ciphers with CBC & SHA-1
1278+
user_pref("security.ssl3.rsa_aes_256_sha", false); // 0x35
1279+
user_pref("security.ssl3.rsa_aes_128_sha", false); // 0x2f
1280+
user_pref("security.ssl3.ecdhe_rsa_aes_256_sha", false); // 0xc014
1281+
user_pref("security.ssl3.ecdhe_ecdsa_aes_256_sha", false); // 0xc00a
12821282

12831283
// PREF: Enable X25519Kyber768Draft00 (post-quantum key exchange) [FF Nightly 2024-01-18+]
12841284
// https://datatracker.ietf.org/doc/draft-tls-westerbaan-xyber768d00/

0 commit comments

Comments
 (0)