Skip to content

Commit

Permalink
Merge branch 'nodiscc-enh-private-browsing'
Browse files Browse the repository at this point in the history
  • Loading branch information
pyllyukko committed Apr 18, 2017
2 parents 1138174 + ef32988 commit eb8ccda
Show file tree
Hide file tree
Showing 2 changed files with 11 additions and 0 deletions.
4 changes: 4 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -210,6 +210,7 @@ Disable Firefox integrated metrics/reporting/experiments, disable potentially in
* Disable FlyWeb (discovery of LAN/proximity IoT devices that expose a Web interface) [ [1](https://wiki.mozilla.org/FlyWeb) [2](https://wiki.mozilla.org/FlyWeb/Security_scenarios) [3](https://docs.google.com/document/d/1eqLb6cGjDL9XooSYEEo7mE-zKQ-o-AuDTcEyNhfBMBM/edit) [4](http://www.ghacks.net/2016/07/26/firefox-flyweb) ]
* Disable the UITour backend [ [1](https://trac.torproject.org/projects/tor/ticket/19047#comment:3) ]
* Enable Firefox Tracking Protection [ [1](https://wiki.mozilla.org/Security/Tracking_protection) [2](https://support.mozilla.org/en-US/kb/tracking-protection-firefox) [3](https://support.mozilla.org/en-US/kb/tracking-protection-pbm) [4](https://kontaxis.github.io/trackingprotectionfirefox/) [5](https://feeding.cloud.geek.nz/posts/how-tracking-protection-works-in-firefox/) ]
* Enable contextual identity Containers feature (Firefox >= 52)
* Enable hardening against various fingerprinting vectors (Tor Uplift project) [ [1](https://wiki.mozilla.org/Security/Tor_Uplift/Tracking) ]
* Disable the built-in PDF viewer [ [1](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2743) [2](https://blog.mozilla.org/security/2015/08/06/firefox-exploit-found-in-the-wild/) [3](https://www.mozilla.org/en-US/security/advisories/mfsa2015-69/) ]
* Disable collection/sending of the health report (healthreport.sqlite*) [ [1](https://support.mozilla.org/en-US/kb/firefox-health-report-understand-your-browser-perf) [2](https://gecko.readthedocs.org/en/latest/toolkit/components/telemetry/telemetry/preferences.html) ]
Expand Down Expand Up @@ -379,14 +380,17 @@ Hardening your often implies a trade-off with ease-of-use and comes with reduced
* Disabling DOM storage is known to cause`TypeError: localStorage is null` errors
* Disabling WebRTC breaks peer-to-peer file sharing tools (reep.io ...)
* IndexedDB could be used for tracking purposes, but is required for some add-ons to work (notably uBlock), so is left enabled
* Containers are not available in Private Browsing mode
* Firefox Hello requires setting `media.peerconnection.enabled` and `media.getusermedia.screensharing.enabled` to true, `security.OCSP.require` to false to work.
* Do No Track must be enabled manually
* Spoofing referers breaks functionality on websites relying on authentic referer headers
* Spoofing referers breaks visualisation of 3rd-party sites on the Lightbeam addon
* Spoofing referers disables CSRF protection on some login pages not implementing origin-header/cookie+token based CSRF protection
* Blocking 3rd-party cookies breaks a number of payment gateways
* You can not view or inspect cookies when in private browsing: https://bugzilla.mozilla.org/show_bug.cgi?id=823941
* When Javascript is enabled, Websites can detect use of Private Browsing mode
* Private browsing breaks Kerberos authentication
* Disables "Containers" functionality (see below)
* Installing user.js will **remove your saved passwords** (https://github.com/pyllyukko/user.js/issues/27)
* OCSP leaks your IP and domains you visit to the CA when OCSP Stapling is not available on visited host
* OCSP is vulnerable to replay attacks when nonce is not configured on the OCSP responder
Expand Down
7 changes: 7 additions & 0 deletions user.js
Original file line number Diff line number Diff line change
Expand Up @@ -404,6 +404,11 @@ user_pref("browser.uitour.enabled", false);
user_pref("privacy.trackingprotection.enabled", true);
user_pref("privacy.trackingprotection.pbmode.enabled", true);

// PREF: Enable contextual identity Containers feature (Firefox >= 52)
// NOTICE: Containers are not available in Private Browsing mode
// https://wiki.mozilla.org/Security/Contextual_Identity_Project/Containers
user_pref("privacy.userContext.enabled", true);

// PREF: Enable hardening against various fingerprinting vectors (Tor Uplift project)
// https://wiki.mozilla.org/Security/Tor_Uplift/Tracking
user_pref("privacy.resistFingerprinting", true);
Expand Down Expand Up @@ -606,7 +611,9 @@ user_pref("network.cookie.thirdparty.sessionOnly", true);
// https://support.mozilla.org/en-US/kb/Private-Browsing
// https://wiki.mozilla.org/PrivateBrowsing
// NOTICE: You can not view or inspect cookies when in private browsing: https://bugzilla.mozilla.org/show_bug.cgi?id=823941
// NOTICE: When Javascript is enabled, Websites can detect use of Private Browsing mode
// NOTICE: Private browsing breaks Kerberos authentication
// NOTICE: Disables "Containers" functionality (see below)
user_pref("browser.privatebrowsing.autostart", true);

// PREF: Do not store POST data in saved sessions
Expand Down

0 comments on commit eb8ccda

Please sign in to comment.