commit 450c9a9e0f2ef14ae392d71f06132da578471a33
parent 6acfdaccbdb961ab748bfb067e2d77db11d159cd
Author: Thorin-Oakenpants <Thorin-Oakenpants@users.noreply.github.com>
Date: Sat, 23 Nov 2019 03:23:08 +1300
simplify ciphers, closes #839 (#844)
* simplify ciphers
- let's not encourage (remove options 1, 2) changing your cipher suite FP
- remove "it's quite technical ..." (everything is technical to someone), trim to one line
- add test link so users can just see that it's FP'able
- reinforce not to fuck with the cipher suite in the cipher's sub-section
Diffstat:
1 file changed, 3 insertions(+), 10 deletions(-)
diff --git a/user.js b/user.js
@@ -626,15 +626,8 @@ user_pref("browser.shell.shortcutFavicons", false);
user_pref("alerts.showFavicons", false); // [DEFAULT: false]
/*** [SECTION 1200]: HTTPS (SSL/TLS / OCSP / CERTS / HPKP / CIPHERS)
- Note that your cipher and other settings can be used server side as a fingerprint attack
- vector, see [1] (It's quite technical but the first part is easy to understand
- and you can stop reading when you reach the second section titled "Enter Bro")
-
- Option 1: Use defaults for ciphers (1260's). There is nothing *weak* about these, but
- due to breakage, browsers can't deprecate them until the web stops using them
- Option 2: Disable the ciphers in 1261, 1262 and 1263. These shouldn't break anything.
- Optionally, disable the ciphers in 1264.
-
+ Your cipher and other settings can be used in server side fingerprinting
+ [TEST] https://www.ssllabs.com/ssltest/viewMyClient.html
[1] https://www.securityartwork.es/2017/02/02/tls-client-fingerprinting-with-bro/
***/
user_pref("_user.js.parrot", "1200 syntax error: the parrot's a stiff!");
@@ -728,7 +721,7 @@ user_pref("security.mixed_content.block_display_content", true);
* [1] https://bugzilla.mozilla.org/1190623 ***/
user_pref("security.mixed_content.block_object_subrequest", true);
-/** CIPHERS [see the section 1200 intro] ***/
+/** CIPHERS [WARNING: do not meddle with your cipher suite: see the section 1200 intro] ***/
/* 1261: disable 3DES (effective key size < 128)
* [1] https://en.wikipedia.org/wiki/3des#Security
* [2] https://en.wikipedia.org/wiki/Meet-in-the-middle_attack