infos about default values (#504)
* more infos * add colons not all EOL comments for defaults start with `// default` (23). The common string is `default:` (27 incl. these ones) with or without preceding or trailing spaces
This commit is contained in:
parent
01a978e33a
commit
ee213f2bab
14
user.js
14
user.js
@ -216,7 +216,7 @@ user_pref("_user.js.parrot", "0400 syntax error: the parrot's passed on!");
|
|||||||
* [NOTE] It includes updates for "revoked certificates"
|
* [NOTE] It includes updates for "revoked certificates"
|
||||||
* [1] https://blog.mozilla.org/security/2015/03/03/revoking-intermediate-certificates-introducing-onecrl/
|
* [1] https://blog.mozilla.org/security/2015/03/03/revoking-intermediate-certificates-introducing-onecrl/
|
||||||
* [2] https://trac.torproject.org/projects/tor/ticket/16931 ***/
|
* [2] https://trac.torproject.org/projects/tor/ticket/16931 ***/
|
||||||
user_pref("extensions.blocklist.enabled", true);
|
user_pref("extensions.blocklist.enabled", true); // default: true
|
||||||
user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozilla.com/v1/blocklist/3/%APP_ID%/%APP_VERSION%/");
|
user_pref("extensions.blocklist.url", "https://blocklists.settings.services.mozilla.com/v1/blocklist/3/%APP_ID%/%APP_VERSION%/");
|
||||||
/* 0402: enable Kinto blocklist updates (FF50+)
|
/* 0402: enable Kinto blocklist updates (FF50+)
|
||||||
* What is Kinto?: https://wiki.mozilla.org/Firefox/Kinto#Specifications
|
* What is Kinto?: https://wiki.mozilla.org/Firefox/Kinto#Specifications
|
||||||
@ -424,7 +424,7 @@ user_pref("network.predictor.enable-prefetch", false);
|
|||||||
user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost!");
|
user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost!");
|
||||||
/* 0701: disable IPv6
|
/* 0701: disable IPv6
|
||||||
* IPv6 can be abused, especially regarding MAC addresses. They also do not play nice
|
* IPv6 can be abused, especially regarding MAC addresses. They also do not play nice
|
||||||
* with VPNs. That's even assuming your ISP and/or router and/or website can hande it
|
* with VPNs. That's even assuming your ISP and/or router and/or website can handle it
|
||||||
* [WARNING] This is just an application level fallback. Disabling IPv6 is best done
|
* [WARNING] This is just an application level fallback. Disabling IPv6 is best done
|
||||||
* at an OS/network level, and/or configured properly in VPN setups
|
* at an OS/network level, and/or configured properly in VPN setups
|
||||||
* [TEST] http://ipv6leak.com/
|
* [TEST] http://ipv6leak.com/
|
||||||
@ -781,7 +781,7 @@ user_pref("security.cert_pinning.enforcement_level", 2);
|
|||||||
/** MIXED CONTENT ***/
|
/** MIXED CONTENT ***/
|
||||||
/* 1240: disable insecure active content on https pages - mixed content
|
/* 1240: disable insecure active content on https pages - mixed content
|
||||||
* [1] https://trac.torproject.org/projects/tor/ticket/21323 ***/
|
* [1] https://trac.torproject.org/projects/tor/ticket/21323 ***/
|
||||||
user_pref("security.mixed_content.block_active_content", true);
|
user_pref("security.mixed_content.block_active_content", true); // default: true
|
||||||
/* 1241: disable insecure passive content (such as images) on https pages - mixed context ***/
|
/* 1241: disable insecure passive content (such as images) on https pages - mixed context ***/
|
||||||
user_pref("security.mixed_content.block_display_content", true);
|
user_pref("security.mixed_content.block_display_content", true);
|
||||||
|
|
||||||
@ -939,7 +939,7 @@ user_pref("_user.js.parrot", "1700 syntax error: the parrot's bit the dust!");
|
|||||||
* [SETTING] Privacy & Security>Tabs>Enable Container Tabs ***/
|
* [SETTING] Privacy & Security>Tabs>Enable Container Tabs ***/
|
||||||
// user_pref("privacy.userContext.enabled", true);
|
// user_pref("privacy.userContext.enabled", true);
|
||||||
/* 1703: enable a private container for thumbnail loads (FF51+) ***/
|
/* 1703: enable a private container for thumbnail loads (FF51+) ***/
|
||||||
// user_pref("privacy.usercontext.about_newtab_segregation.enabled", true);
|
// user_pref("privacy.usercontext.about_newtab_segregation.enabled", true); // default: true in FF61+
|
||||||
/* 1704: set long press behaviour on "+ Tab" button to display container menu (FF53+)
|
/* 1704: set long press behaviour on "+ Tab" button to display container menu (FF53+)
|
||||||
* 0=disables long press, 1=when clicked, the menu is shown
|
* 0=disables long press, 1=when clicked, the menu is shown
|
||||||
* 2=the menu is shown after X milliseconds
|
* 2=the menu is shown after X milliseconds
|
||||||
@ -1336,7 +1336,7 @@ user_pref("security.csp.experimentalEnabled", true);
|
|||||||
* [1] https://bugzilla.mozilla.org/1331351
|
* [1] https://bugzilla.mozilla.org/1331351
|
||||||
* [2] https://www.wordfence.com/blog/2017/01/gmail-phishing-data-uri/
|
* [2] https://www.wordfence.com/blog/2017/01/gmail-phishing-data-uri/
|
||||||
* [3] https://www.fxsitecompat.com/en-CA/docs/2017/data-url-navigations-on-top-level-window-will-be-blocked/ ***/
|
* [3] https://www.fxsitecompat.com/en-CA/docs/2017/data-url-navigations-on-top-level-window-will-be-blocked/ ***/
|
||||||
user_pref("security.data_uri.block_toplevel_data_uri_navigations", true);
|
user_pref("security.data_uri.block_toplevel_data_uri_navigations", true); // default: true in FF59+
|
||||||
/* 2684: enforce a security delay on some confirmation dialogs such as install, open/save
|
/* 2684: enforce a security delay on some confirmation dialogs such as install, open/save
|
||||||
* [1] http://kb.mozillazine.org/Disable_extension_install_delay_-_Firefox
|
* [1] http://kb.mozillazine.org/Disable_extension_install_delay_-_Firefox
|
||||||
* [2] https://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/ ***/
|
* [2] https://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/ ***/
|
||||||
@ -1382,7 +1382,7 @@ user_pref("network.cookie.leave-secure-alone", true); // default: true
|
|||||||
* [3] https://www.sjoerdlangkemper.nl/2016/04/14/preventing-csrf-with-samesite-cookie-attribute/ ***/
|
* [3] https://www.sjoerdlangkemper.nl/2016/04/14/preventing-csrf-with-samesite-cookie-attribute/ ***/
|
||||||
// user_pref("network.cookie.same-site.enabled", true); // default: true
|
// user_pref("network.cookie.same-site.enabled", true); // default: true
|
||||||
/* 2710: disable DOM (Document Object Model) Storage
|
/* 2710: disable DOM (Document Object Model) Storage
|
||||||
* [WARNING] This will break a LOT of sites' functionality.
|
* [WARNING] This will break a LOT of sites' functionality AND extensions!
|
||||||
* You are better off using an extension for more granular control ***/
|
* You are better off using an extension for more granular control ***/
|
||||||
// user_pref("dom.storage.enabled", false);
|
// user_pref("dom.storage.enabled", false);
|
||||||
/* 2720: enforce IndexedDB (IDB) as enabled
|
/* 2720: enforce IndexedDB (IDB) as enabled
|
||||||
@ -1398,7 +1398,7 @@ user_pref("dom.indexedDB.enabled", true); // default: true
|
|||||||
user_pref("browser.cache.offline.enable", false);
|
user_pref("browser.cache.offline.enable", false);
|
||||||
/* 2730b: disable offline cache on insecure sites (FF60+)
|
/* 2730b: disable offline cache on insecure sites (FF60+)
|
||||||
* [1] https://blog.mozilla.org/security/2018/02/12/restricting-appcache-secure-contexts/ ***/
|
* [1] https://blog.mozilla.org/security/2018/02/12/restricting-appcache-secure-contexts/ ***/
|
||||||
user_pref("browser.cache.offline.insecure.enable", false);
|
user_pref("browser.cache.offline.insecure.enable", false); // default: false in FF62+
|
||||||
/* 2731: enforce websites to ask to store data for offline use
|
/* 2731: enforce websites to ask to store data for offline use
|
||||||
* [1] https://support.mozilla.org/questions/1098540
|
* [1] https://support.mozilla.org/questions/1098540
|
||||||
* [2] https://bugzilla.mozilla.org/959985 ***/
|
* [2] https://bugzilla.mozilla.org/959985 ***/
|
||||||
|
Loading…
Reference in New Issue
Block a user