diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 09:30:23 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 09:30:23 +0000 |
commit | fb2733efc081f98e767512e6cad3b31d721b9943 (patch) | |
tree | c78aac1614606fb6fc581b0499a2375906c433ba /debian/local | |
parent | user.js: Disabling safe browsing. (diff) | |
download | firefox-fb2733efc081f98e767512e6cad3b31d721b9943.tar.xz firefox-fb2733efc081f98e767512e6cad3b31d721b9943.zip |
user.js: Enabling IPv6.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'debian/local')
-rw-r--r-- | debian/local/pref/user.js | 12 |
1 files changed, 0 insertions, 12 deletions
diff --git a/debian/local/pref/user.js b/debian/local/pref/user.js index c79ccb74ff..ca5a22ba1a 100644 --- a/debian/local/pref/user.js +++ b/debian/local/pref/user.js @@ -249,18 +249,6 @@ user_pref("browser.places.speculativeConnect.enabled", false); /*** [SECTION 0700]: DNS / DoH / PROXY / SOCKS / IPv6 ***/ user_pref("_user.js.parrot", "0700 syntax error: the parrot's given up the ghost!"); -/* 0701: disable IPv6 - * IPv6 can be abused, especially with MAC addresses, and can leak with VPNs: assuming - * your ISP and/or router and/or website is IPv6 capable. Most sites will fall back to IPv4 - * [SETUP-WEB] PR_CONNECT_RESET_ERROR: this pref *might* be the cause - * [STATS] Firefox telemetry (Sept 2022) shows ~8% of successful connections are IPv6 - * [NOTE] This is an application level fallback. Disabling IPv6 is best done at an - * OS/network level, and/or configured properly in VPN setups. If you are not masking your IP, - * then this won't make much difference. If you are masking your IP, then it can only help. - * [NOTE] PHP defaults to IPv6 with "localhost". Use "php -S 127.0.0.1:PORT" - * [TEST] https://ipleak.org/ - * [1] https://www.internetsociety.org/tag/ipv6-security/ (Myths 2,4,5,6) ***/ -user_pref("network.dns.disableIPv6", true); /* 0702: set the proxy server to do any DNS lookups when using SOCKS * e.g. in Tor, this stops your local DNS server from knowing your Tor destination * as a remote Tor node will handle the DNS request |