summaryrefslogtreecommitdiff
path: root/modules/libpref
diff options
context:
space:
mode:
authorwolfbeast <mcwerewolf@gmail.com>2018-05-29 17:27:27 +0200
committerwolfbeast <mcwerewolf@gmail.com>2018-05-29 17:27:27 +0200
commitd58930d925e61cb23839d40ac384246d6e2d2332 (patch)
tree2759cc40bdb00df877d25d3470fc1b074df73910 /modules/libpref
parent636d127253b75d0880f16ad96f006f6e27378130 (diff)
downloaduxp-d58930d925e61cb23839d40ac384246d6e2d2332.tar.gz
Fix sec pref locations and enable HPKP checking by default.
Some prefs were incorrectly in all.js (ocsp and hpkp)
Diffstat (limited to 'modules/libpref')
-rw-r--r--modules/libpref/init/all.js10
1 files changed, 0 insertions, 10 deletions
diff --git a/modules/libpref/init/all.js b/modules/libpref/init/all.js
index 18e23ff2eb..16ab85485c 100644
--- a/modules/libpref/init/all.js
+++ b/modules/libpref/init/all.js
@@ -2158,19 +2158,9 @@ pref("security.block_script_with_wrong_mime", true);
// Block images of wrong MIME for XCTO: nosniff.
pref("security.xcto_nosniff_block_images", false);
-// OCSP must-staple
-pref("security.ssl.enable_ocsp_must_staple", true);
-
// Insecure Form Field Warning
pref("security.insecure_field_warning.contextual.enabled", false);
-// Disable pinning checks by default.
-pref("security.cert_pinning.enforcement_level", 0);
-// Do not process hpkp headers rooted by not built in roots by default.
-// This is to prevent accidental pinning from MITM devices and is used
-// for tests.
-pref("security.cert_pinning.process_headers_from_non_builtin_roots", false);
-
// If set to true, allow view-source URIs to be opened from URIs that share
// their protocol with the inner URI of the view-source URI
pref("security.view-source.reachable-from-inner-protocol", false);