From 4df049c729223da4b993b8a8dea3f7f389bce504 Mon Sep 17 00:00:00 2001 From: Wraaath <mads@wraaath.com> Date: Fri, 19 Jul 2024 23:10:12 +0200 Subject: [PATCH] ocsp require = false --- user-overrides.js | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/user-overrides.js b/user-overrides.js index e5a9850..901feb9 100644 --- a/user-overrides.js +++ b/user-overrides.js @@ -446,7 +446,7 @@ user_pref("security.OCSP.enabled", 1); // [DEFAULT: 1] * could have been revoked) and/or you could be under attack (e.g. malicious blocking of OCSP servers) * [1] https://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox/ * [2] https://www.imperialviolet.org/2014/04/19/revchecking.html ***/ -user_pref("security.OCSP.require", true); +user_pref("security.OCSP.require", false); /** CERTS / HPKP (HTTP Public Key Pinning) ***/ /* 1223: enable strict PKP (Public Key Pinning)