-
Notifications
You must be signed in to change notification settings - Fork 552
v144 #1992
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
Thorin-Oakenpants
wants to merge
28
commits into
master
Choose a base branch
from
Thorin-Oakenpants-patch-1
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
+40
−45
Open
v144 #1992
Changes from 22 commits
Commits
Show all changes
28 commits
Select commit
Hold shift + click to select a range
9ad1ce5
v142
Thorin-Oakenpants ae6242b
remove OCSP, #1576
Thorin-Oakenpants 934a339
add removed OCSP prefs to cleanup script
Thorin-Oakenpants ff92cee
update FPP info
Thorin-Oakenpants c5087d6
tidy
Thorin-Oakenpants 0ef5f72
tidy
Thorin-Oakenpants a05d90d
make 2635 active
Thorin-Oakenpants 7007e28
tidy
Thorin-Oakenpants ba7f0ce
don't sanitize history/downloads
Thorin-Oakenpants d01f1e9
update clearing history mentions
Thorin-Oakenpants 1c76110
remove 4510, #1965
Thorin-Oakenpants 8cd3137
browser.display.use_system_colors, #1965
Thorin-Oakenpants 1f58af5
add document_color_use, #1965
Thorin-Oakenpants c569822
grrrrr .. must. be. consistent.
Thorin-Oakenpants e69b544
correct RFP info
Thorin-Oakenpants bfcb365
Merge branch 'master' into Thorin-Oakenpants-patch-1
Thorin-Oakenpants 7c44441
remove fakespot
Thorin-Oakenpants 845872c
fakespot.featureGate
Thorin-Oakenpants 59c17aa
MOAR featuregates
Thorin-Oakenpants dd081db
ETP exception lists
Thorin-Oakenpants 669930f
passkeys attestation
Thorin-Oakenpants e1dd797
yelpRealtime.featureGate
Thorin-Oakenpants 5ca8f0c
tidy
Thorin-Oakenpants 54956e5
update RFP info
Thorin-Oakenpants c90135c
be consistent
Thorin-Oakenpants 4e94234
update pdfjs CVEs info
Thorin-Oakenpants a724883
remove keyword.enabled
Thorin-Oakenpants 2c594e5
keyword.enabled
Thorin-Oakenpants File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Some comments aren't visible on the classic Files Changed page.
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,7 +1,7 @@ | ||
| /****** | ||
| * name: arkenfox user.js | ||
| * date: 4 November 2025 | ||
| * version: 140 | ||
| * date: 15 November 2025 | ||
| * version: 144 | ||
| * urls: https://github.com/arkenfox/user.js [repo] | ||
| * : https://arkenfox.github.io/gui/ [interactive] | ||
| * license: MIT: https://github.com/arkenfox/user.js/blob/master/LICENSE.txt | ||
|
|
@@ -47,7 +47,7 @@ | |
| 0600: BLOCK IMPLICIT OUTBOUND | ||
| 0700: DNS / DoH / PROXY / SOCKS | ||
| 0800: LOCATION BAR / SEARCH BAR / SUGGESTIONS / HISTORY / FORMS | ||
| 0900: PASSWORDS | ||
| 0900: PASSWORDS / PASSKEYS | ||
| 1000: DISK AVOIDANCE | ||
| 1200: HTTPS (SSL/TLS / OCSP / CERTS / HPKP) | ||
| 1600: REFERERS | ||
|
|
@@ -205,7 +205,7 @@ user_pref("network.prefetch-next", false); | |
| user_pref("network.dns.disablePrefetch", true); | ||
| user_pref("network.dns.disablePrefetchFromHTTPS", true); | ||
| /* 0603: disable predictor / prefetching ***/ | ||
| user_pref("network.predictor.enabled", false); | ||
| user_pref("network.predictor.enabled", false); // [DEFAULT: false FF144+] | ||
| user_pref("network.predictor.enable-prefetch", false); // [FF48+] [DEFAULT: false] | ||
| /* 0604: disable link-mouseover opening connection to linked server | ||
| * [1] https://news.slashdot.org/story/15/08/14/2321202/how-to-quash-firefoxs-silent-requests ***/ | ||
|
|
@@ -285,11 +285,13 @@ user_pref("browser.urlbar.trending.featureGate", false); | |
| /* 0806: disable urlbar suggestions ***/ | ||
| user_pref("browser.urlbar.addons.featureGate", false); // [FF115+] | ||
| user_pref("browser.urlbar.amp.featureGate", false); // [FF141+] adMarketplace | ||
| user_pref("browser.urlbar.fakespot.featureGate", false); // [FF130+] [DEFAULT: false] | ||
| user_pref("browser.urlbar.importantDates.featureGate", false); // [FF143+] | ||
| user_pref("browser.urlbar.market.featureGate", false); // [FF143+] stock market | ||
| user_pref("browser.urlbar.mdn.featureGate", false); // [FF117+] | ||
| user_pref("browser.urlbar.weather.featureGate", false); // [FF108+] | ||
| user_pref("browser.urlbar.wikipedia.featureGate", false); // [FF141+] | ||
| user_pref("browser.urlbar.yelp.featureGate", false); // [FF124+] | ||
| user_pref("browser.urlbar.yelpRealtime.featureGate", false); // [FF144+] | ||
| /* 0807: disable urlbar clipboard suggestions [FF118+] ***/ | ||
| // user_pref("browser.urlbar.clipboard.featureGate", false); | ||
| /* 0808: disable recent searches [FF120+] | ||
|
|
@@ -323,7 +325,7 @@ user_pref("browser.formfill.enable", false); | |
| user_pref("browser.search.separatePrivateDefault", true); // [FF70+] | ||
| user_pref("browser.search.separatePrivateDefault.ui.enabled", true); // [FF71+] | ||
|
|
||
| /*** [SECTION 0900]: PASSWORDS | ||
| /*** [SECTION 0900]: PASSWORDS / PASSKEYS | ||
| [1] https://support.mozilla.org/kb/use-primary-password-protect-stored-logins-and-pas | ||
| ***/ | ||
| user_pref("_user.js.parrot", "0900 syntax error: the parrot's expired!"); | ||
|
|
@@ -349,6 +351,9 @@ user_pref("network.auth.subresource-http-auth-allow", 1); | |
| /* 0907: enforce no automatic authentication on Microsoft sites [FF131+] [MAC] | ||
| * On macOS, SSO only works on corporate devices ***/ | ||
| // user_pref("network.http.microsoft-entra-sso.enabled", false); // [DEFAULT: false] | ||
| /* 0910: enforce no direct attestation in passkeys [FF144+] | ||
| // [1] https://bugzilla.mozilla.org/show_bug.cgi?id=1981587 ***/ | ||
| pref("security.webauthn.always_allow_direct_attestation", false); // [DEFAULT: false] | ||
|
|
||
| /*** [SECTION 1000]: DISK AVOIDANCE ***/ | ||
| user_pref("_user.js.parrot", "1000 syntax error: the parrot's gone to meet 'is maker!"); | ||
|
|
@@ -402,29 +407,6 @@ user_pref("security.ssl.require_safe_negotiation", true); | |
| * [3] https://blog.cloudflare.com/tls-1-3-overview-and-q-and-a/ ***/ | ||
| user_pref("security.tls.enable_0rtt_data", false); | ||
|
|
||
| /** OCSP (Online Certificate Status Protocol) | ||
| [1] https://scotthelme.co.uk/revocation-is-broken/ | ||
| [2] https://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox/ | ||
| ***/ | ||
| /* 1211: enforce OCSP fetching to confirm current validity of certificates | ||
| * 0=disabled, 1=enabled (default), 2=enabled for EV certificates only | ||
| * OCSP (non-stapled) leaks information about the sites you visit to the CA (cert authority) | ||
| * It's a trade-off between security (checking) and privacy (leaking info to the CA) | ||
| * [NOTE] This pref only controls OCSP fetching and does not affect OCSP stapling | ||
| * [SETTING] Privacy & Security>Security>Certificates>Query OCSP responder servers... | ||
| * [1] https://en.wikipedia.org/wiki/Ocsp ***/ | ||
| user_pref("security.OCSP.enabled", 1); // [DEFAULT: 1] | ||
| /* 1212: set OCSP fetch failures (non-stapled, see 1211) to hard-fail | ||
| * [SETUP-WEB] SEC_ERROR_OCSP_SERVER_ERROR | SEC_ERROR_OCSP_UNAUTHORIZED_REQUEST | ||
| * When a CA cannot be reached to validate a cert, Firefox just continues the connection (=soft-fail) | ||
| * Setting this pref to true tells Firefox to instead terminate the connection (=hard-fail) | ||
| * It is pointless to soft-fail when an OCSP fetch fails: you cannot confirm a cert is still valid (it | ||
| * could have been revoked) and/or you could be under attack (e.g. malicious blocking of OCSP servers) | ||
| * [1] https://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox/ | ||
| * [2] https://www.imperialviolet.org/2014/04/19/revchecking.html | ||
| * [3] https://letsencrypt.org/2024/12/05/ending-ocsp/ ***/ | ||
| user_pref("security.OCSP.require", true); | ||
|
|
||
| /** CERTS / HPKP (HTTP Public Key Pinning) ***/ | ||
| /* 1223: enable strict PKP (Public Key Pinning) | ||
| * 0=disabled, 1=allow user MiTM (default; such as your antivirus), 2=strict | ||
|
|
@@ -433,12 +415,13 @@ user_pref("security.cert_pinning.enforcement_level", 2); | |
| /* 1224: enable CRLite [FF73+] | ||
| * 0 = disabled | ||
| * 1 = consult CRLite but only collect telemetry | ||
| * 2 = consult CRLite and enforce both "Revoked" and "Not Revoked" results | ||
| * 3 = consult CRLite and enforce "Not Revoked" results, but defer to OCSP for "Revoked" (default) | ||
| * 2 = consult CRLite and enforce both "Revoked" and "Not Revoked" results (default) | ||
| * 3 = consult CRLite and enforce "Not Revoked" results, but defer to OCSP for "Revoked" (removed FF145) | ||
| * [1] https://bugzilla.mozilla.org/buglist.cgi?bug_id=1429800,1670985,1753071 | ||
| * [2] https://blog.mozilla.org/security/tag/crlite/ ***/ | ||
| * [2] https://blog.mozilla.org/security/tag/crlite/ | ||
| * [3] https://hacks.mozilla.org/2025/08/crlite-fast-private-and-comprehensive-certificate-revocation-checking-in-firefox/ ***/ | ||
| user_pref("security.remote_settings.crlite_filters.enabled", true); // [DEFAULT: true FF137+] | ||
| user_pref("security.pki.crlite_mode", 2); | ||
| user_pref("security.pki.crlite_mode", 2); // [DEFAULT: 2 FF142+] | ||
|
|
||
| /** MIXED CONTENT ***/ | ||
| /* 1241: disable insecure passive content (such as images) on https pages ***/ | ||
|
|
@@ -572,7 +555,7 @@ user_pref("browser.tabs.searchclipboardfor.middleclick", false); // [DEFAULT: fa | |
| user_pref("browser.contentanalysis.enabled", false); // [FF121+] [DEFAULT: false] | ||
| user_pref("browser.contentanalysis.default_result", 0); // [FF127+] [DEFAULT: 0] | ||
| /* 2635: disable referrer and storage access for resources injected by content scripts [FF139+] ***/ | ||
| // user_pref("privacy.antitracking.isolateContentScriptResources", true); | ||
| user_pref("privacy.antitracking.isolateContentScriptResources", true); | ||
| /* 2640: disable CSP Level 2 Reporting [FF140+] ***/ | ||
| user_pref("security.csp.reporting.enabled", false); | ||
|
|
||
|
|
@@ -614,13 +597,19 @@ user_pref("_user.js.parrot", "2700 syntax error: the parrot's joined the bleedin | |
| * [SETTING] to add site exceptions: Urlbar>ETP Shield | ||
| * [SETTING] to manage site exceptions: Options>Privacy & Security>Enhanced Tracking Protection>Manage Exceptions ***/ | ||
| user_pref("browser.contentblocking.category", "strict"); // [HIDDEN PREF] | ||
| /* 2702: disable ETP web compat features [FF93+] | ||
| /* 2702: disable ETP web compat features (about:compat) [FF93+] | ||
| * [SETUP-HARDEN] Includes skip lists, heuristics (SmartBlock) and automatic grants | ||
| * Opener and redirect heuristics are granted for 30 days, see [3] | ||
| * [1] https://blog.mozilla.org/security/2021/07/13/smartblock-v2/ | ||
| * [2] https://hg.mozilla.org/mozilla-central/rev/e5483fd469ab#l4.12 | ||
| * [3] https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning#storage_access_heuristics ***/ | ||
| // user_pref("privacy.antitracking.enableWebcompat", false); | ||
| /* 2705: set ETP Strict/Custom exception lists (FF141+) | ||
| [SETTING] Options>Privacy & Security>Enhanced Tracking Protection>Strict/Custom>Fix major [baseline] | minor [convenience] | ||
| [1] https://support.mozilla.org/en-US/kb/manage-enhanced-tracking-protection-exceptions | ||
| [2] https://etp-exceptions.mozilla.org/ ***/ | ||
| user_pref("privacy.trackingprotection.allow_list.baseline.enabled", true); // [DEFAULT: true] | ||
| user_pref("privacy.trackingprotection.allow_list.convenience.enabled", false); // DEFAULT: false when ETP Strict manually chosen] | ||
|
||
|
|
||
| /*** [SECTION 2800]: SHUTDOWN & SANITIZING | ||
| We enable sanitizeOnShutdown to help prevent 1st party website tracking across sessions. | ||
|
|
@@ -662,7 +651,7 @@ user_pref("privacy.clearOnShutdown_v2.cookiesAndStorage", true); | |
| /* 2820: set manual "Clear Data" items [SETUP-CHROME] [FF128+] | ||
| * Firefox remembers your last choices. This will reset them when you start Firefox | ||
| * [SETTING] Privacy & Security>Browser Privacy>Cookies and Site Data>Clear Data ***/ | ||
| user_pref("privacy.clearSiteData.cache", true); | ||
| user_pref("privacy.clearSiteData.cache", true); // [DEFAULT: true] | ||
| user_pref("privacy.clearSiteData.cookiesAndStorage", false); // keep false until it respects "allow" site exceptions | ||
| user_pref("privacy.clearSiteData.historyFormDataAndDownloads", false); | ||
| // user_pref("privacy.clearSiteData.siteSettings", false); | ||
|
|
@@ -698,6 +687,7 @@ user_pref("privacy.sanitize.timeSpan", 0); | |
| on a per site basis for compatibility (4004). | ||
|
|
||
| https://searchfox.org/mozilla-central/source/toolkit/components/resistfingerprinting/RFPTargetsDefault.inc | ||
| https://support.mozilla.org/en-US/kb/firefox-protection-against-fingerprinting#w_how-does-each-protection-work | ||
|
|
||
| [NOTE] RFPTargets + granular overrides are somewhat experimental and may produce unexpected results | ||
| - e.g. FrameRate can only be controlled per process, not per origin | ||
|
|
@@ -1063,6 +1053,9 @@ user_pref("extensions.quarantinedDomains.enabled", true); // [DEFAULT: true] | |
| // user_pref("privacy.cpd.sessions", ""); | ||
| /* 6051: prefsCleaner: reset previously active items removed from arkenfox FF140+ ***/ | ||
| // user_pref("browser.display.use_system_colors", ""); | ||
| // user_pref("browser.urlbar.fakespot.featureGate", ""); | ||
| // user_pref("security.OCSP.enabled", ""); | ||
| // user_pref("security.OCSP.require", ""); | ||
|
|
||
| /*** [SECTION 7000]: DON'T BOTHER ***/ | ||
| user_pref("_user.js.parrot", "7000 syntax error: the parrot's pushing up daisies!"); | ||
|
|
||
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@Thorin-Oakenpants wrong syntax. should be
user_prefrather thanpref.