From 380a88ee57a3af1fd3accf023b31e7e46f9ea855 Mon Sep 17 00:00:00 2001 From: Thorin-Oakenpants Date: Tue, 5 Oct 2021 11:14:16 +0000 Subject: [PATCH] oophs --- user.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/user.js b/user.js index f64d4a4..7fcd110 100644 --- a/user.js +++ b/user.js @@ -503,7 +503,7 @@ user_pref("security.tls.enable_0rtt_data", false); * [NOTE] This pref only controls OCSP fetching and does not affect OCSP stapling * [SETTING] Privacy & Security>Security>Certificates>Query OCSP responder servers... * [1] https://en.wikipedia.org/wiki/Ocsp ***/ -user_pref("security.OCSP.enabled", 1); // [DEFAULT: true] +user_pref("security.OCSP.enabled", 1); // [DEFAULT: 1] /* 1212: set OCSP fetch failures (non-stapled, see 1211) to hard-fail [SETUP-WEB] * When a CA cannot be reached to validate a cert, Firefox just continues the connection (=soft-fail) * Setting this pref to true tells Firefox to instead terminate the connection (=hard-fail)