summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 09:30:23 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 09:30:23 +0000
commitfb2733efc081f98e767512e6cad3b31d721b9943 (patch)
treec78aac1614606fb6fc581b0499a2375906c433ba
parentuser.js: Disabling safe browsing. (diff)
downloadfirefox-fb2733efc081f98e767512e6cad3b31d721b9943.tar.xz
firefox-fb2733efc081f98e767512e6cad3b31d721b9943.zip
user.js: Enabling IPv6.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to '')
-rw-r--r--debian/local/pref/user.js12
1 files changed, 0 insertions, 12 deletions
diff --git a/debian/local/pref/user.js b/debian/local/pref/user.js
index c79ccb74ff..ca5a22ba1a 100644
--- a/debian/local/pref/user.js
+++ b/debian/local/pref/user.js
@@ -249,18 +249,6 @@ user_pref("browser.places.speculativeConnect.enabled", false);
/*** [SECTION 0700]: DNS / DoH / PROXY / SOCKS / IPv6 ***/
user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost!");
-/* 0701: disable IPv6
- * IPv6 can be abused, especially with MAC addresses, and can leak with VPNs: assuming
- * your ISP and/or router and/or website is IPv6 capable. Most sites will fall back to IPv4
- * [SETUP-WEB] PR_CONNECT_RESET_ERROR: this pref *might* be the cause
- * [STATS] Firefox telemetry (Sept 2022) shows ~8% of successful connections are IPv6
- * [NOTE] This is an application level fallback. Disabling IPv6 is best done at an
- * OS/network level, and/or configured properly in VPN setups. If you are not masking your IP,
- * then this won't make much difference. If you are masking your IP, then it can only help.
- * [NOTE] PHP defaults to IPv6 with "localhost". Use "php -S 127.0.0.1:PORT"
- * [TEST] https://ipleak.org/
- * [1] https://www.internetsociety.org/tag/ipv6-security/ (Myths 2,4,5,6) ***/
-user_pref("network.dns.disableIPv6", true);
/* 0702: set the proxy server to do any DNS lookups when using SOCKS
* e.g. in Tor, this stops your local DNS server from knowing your Tor destination
* as a remote Tor node will handle the DNS request