From 4df049c729223da4b993b8a8dea3f7f389bce504 Mon Sep 17 00:00:00 2001
From: Wraaath <mads@wraaath.com>
Date: Fri, 19 Jul 2024 23:10:12 +0200
Subject: [PATCH] ocsp require = false

---
 user-overrides.js | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/user-overrides.js b/user-overrides.js
index e5a9850..901feb9 100644
--- a/user-overrides.js
+++ b/user-overrides.js
@@ -446,7 +446,7 @@ user_pref("security.OCSP.enabled", 1); // [DEFAULT: 1]
  * could have been revoked) and/or you could be under attack (e.g. malicious blocking of OCSP servers)
  * [1] https://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox/
  * [2] https://www.imperialviolet.org/2014/04/19/revchecking.html ***/
-user_pref("security.OCSP.require", true);
+user_pref("security.OCSP.require", false);
 
 /** CERTS / HPKP (HTTP Public Key Pinning) ***/
 /* 1223: enable strict PKP (Public Key Pinning)