diff options
author | Moonchild <moonchild@palemoon.org> | 2021-10-12 13:40:33 +0000 |
---|---|---|
committer | Moonchild <moonchild@palemoon.org> | 2021-10-12 13:40:33 +0000 |
commit | b7b8539ec2e155b357f7fc1b7b41aa85f31320f6 (patch) | |
tree | 0571766978f09e679353c38f1837b9230cc6f1f1 /modules | |
parent | 092c7a6e749c2b2495c81c761d5760acda8d8c36 (diff) | |
download | aura-central-b7b8539ec2e155b357f7fc1b7b41aa85f31320f6.tar.gz |
Issue %3019 - Part 1: Remove Google Safebrowsing plumbing
This removes support for querying Google services for reputation data for sites
and downloads.
Diffstat (limited to 'modules')
-rw-r--r-- | modules/libpref/init/all.js | 114 |
1 files changed, 0 insertions, 114 deletions
diff --git a/modules/libpref/init/all.js b/modules/libpref/init/all.js index 1cfc1f162..4b00029c2 100644 --- a/modules/libpref/init/all.js +++ b/modules/libpref/init/all.js @@ -1210,11 +1210,7 @@ pref("privacy.GPCheader.enabled", false); // Enforce tracking protection in all modes pref("privacy.trackingprotection.enabled", false); // Enforce tracking protection in Private Browsing mode -#ifdef MOZ_SAFE_BROWSING -pref("privacy.trackingprotection.pbmode.enabled", true); -#else pref("privacy.trackingprotection.pbmode.enabled", false); -#endif pref("dom.event.contextmenu.enabled", true); pref("dom.event.clipboardevents.enabled", true); @@ -4389,116 +4385,6 @@ pref("dom.mapped_arraybuffer.enabled", true); // Whether <menuitem> is a thing or not. pref("dom.menuitem.enabled", false); -#ifdef MOZ_SAFE_BROWSING -// The tables used for Safebrowsing phishing and malware checks. -pref("urlclassifier.malwareTable", "goog-malware-shavar,goog-unwanted-shavar,test-malware-simple,test-unwanted-simple"); - -#ifdef MOZILLA_OFFICIAL -// In the official build, we are allowed to use google's private -// phishing list "goog-phish-shavar". See Bug 1288840. -pref("urlclassifier.phishTable", "goog-phish-shavar,test-phish-simple"); -#else -pref("urlclassifier.phishTable", "googpub-phish-shavar,test-phish-simple"); -#endif - -// Tables for application reputation. -pref("urlclassifier.downloadBlockTable", "goog-badbinurl-shavar"); - -#ifdef XP_WIN - // Only download the whitelist on Windows, since the whitelist is - // only useful for suppressing remote lookups for signed binaries which we can - // only verify on Windows (Bug 974579). Other platforms always do remote lookups. -pref("urlclassifier.downloadAllowTable", "goog-downloadwhite-digest256"); -#else -pref("urlclassifier.downloadAllowTable", ""); -#endif - -pref("urlclassifier.disallow_completions", "test-malware-simple,test-phish-simple,test-unwanted-simple,test-track-simple,test-trackwhite-simple,test-block-simple,goog-downloadwhite-digest256,base-track-digest256,mozstd-trackwhite-digest256,content-track-digest256,mozplugin-block-digest256,mozplugin2-block-digest256"); - -// The table and update/gethash URLs for Safebrowsing phishing and malware -// checks. -pref("urlclassifier.trackingTable", "test-track-simple,base-track-digest256"); -pref("urlclassifier.trackingWhitelistTable", "test-trackwhite-simple,mozstd-trackwhite-digest256"); - -// The number of random entries to send with a gethash request. -pref("urlclassifier.gethashnoise", 4); - -// Gethash timeout for Safebrowsing. -pref("urlclassifier.gethash.timeout_ms", 5000); - -// If an urlclassifier table has not been updated in this number of seconds, -// a gethash request will be forced to check that the result is still in -// the database. -pref("urlclassifier.max-complete-age", 2700); - -// Name of the about: page contributed by safebrowsing to handle display of error -// pages on phishing/malware hits. (bug 399233) -pref("urlclassifier.alternate_error_page", "blocked"); - -// Enable phishing protection -pref("browser.safebrowsing.phishing.enabled", true); - -// Enable malware protection -pref("browser.safebrowsing.malware.enabled", true); - -pref("browser.safebrowsing.downloads.enabled", true); -pref("browser.safebrowsing.downloads.remote.enabled", true); -pref("browser.safebrowsing.downloads.remote.timeout_ms", 10000); -pref("browser.safebrowsing.downloads.remote.url", "https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_API_KEY%"); -pref("browser.safebrowsing.downloads.remote.block_dangerous", true); -pref("browser.safebrowsing.downloads.remote.block_dangerous_host", true); -pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", true); -pref("browser.safebrowsing.downloads.remote.block_uncommon", true); -pref("browser.safebrowsing.debug", false); - -// The protocol version we communicate with google server. -pref("browser.safebrowsing.provider.google.pver", "2.2"); -pref("browser.safebrowsing.provider.google.lists", "goog-badbinurl-shavar,goog-downloadwhite-digest256,goog-phish-shavar,googpub-phish-shavar,goog-malware-shavar,goog-unwanted-shavar"); -pref("browser.safebrowsing.provider.google.updateURL", "https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2&key=%GOOGLE_API_KEY%"); -pref("browser.safebrowsing.provider.google.gethashURL", "https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2"); -pref("browser.safebrowsing.provider.google.reportURL", "https://safebrowsing.google.com/safebrowsing/diagnostic?client=%NAME%&hl=%LOCALE%&site="); - -// Prefs for v4. -pref("browser.safebrowsing.provider.google4.pver", "4"); -pref("browser.safebrowsing.provider.google4.lists", "goog-phish-proto,googpub-phish-proto,goog-malware-proto,goog-unwanted-proto"); -pref("browser.safebrowsing.provider.google4.updateURL", "https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGLE_API_KEY%"); -pref("browser.safebrowsing.provider.google4.gethashURL", "https://safebrowsing.googleapis.com/v4/fullHashes:find?$req=%REQUEST_BASE64%&$ct=application/x-protobuf&key=%GOOGLE_API_KEY%"); -pref("browser.safebrowsing.provider.google4.reportURL", "https://safebrowsing.google.com/safebrowsing/diagnostic?client=%NAME%&hl=%LOCALE%&site="); - -pref("browser.safebrowsing.reportPhishMistakeURL", "https://%LOCALE%.phish-error.mozilla.com/?hl=%LOCALE%&url="); -pref("browser.safebrowsing.reportPhishURL", "https://%LOCALE%.phish-report.mozilla.com/?hl=%LOCALE%&url="); -pref("browser.safebrowsing.reportMalwareMistakeURL", "https://%LOCALE%.malware-error.mozilla.com/?hl=%LOCALE%&url="); - -// The table and global pref for blocking plugin content -pref("browser.safebrowsing.blockedURIs.enabled", true); -pref("urlclassifier.blockedTable", "test-block-simple,mozplugin-block-digest256"); - -// The protocol version we communicate with mozilla server. -pref("browser.safebrowsing.provider.mozilla.pver", "2.2"); -pref("browser.safebrowsing.provider.mozilla.lists", "base-track-digest256,mozstd-trackwhite-digest256,content-track-digest256,mozplugin-block-digest256,mozplugin2-block-digest256"); -pref("browser.safebrowsing.provider.mozilla.updateURL", "https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2"); -pref("browser.safebrowsing.provider.mozilla.gethashURL", "https://shavar.services.mozilla.com/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2"); -// Set to a date in the past to force immediate download in new profiles. -pref("browser.safebrowsing.provider.mozilla.nextupdatetime", "1"); -// Block lists for tracking protection. The name values will be used as the keys -// to lookup the localized name in preferences.properties. -pref("browser.safebrowsing.provider.mozilla.lists.base.name", "mozstdName"); -pref("browser.safebrowsing.provider.mozilla.lists.base.description", "mozstdDesc"); -pref("browser.safebrowsing.provider.mozilla.lists.content.name", "mozfullName"); -pref("browser.safebrowsing.provider.mozilla.lists.content.description", "mozfullDesc"); - -// Allow users to ignore Safe Browsing warnings. -pref("browser.safebrowsing.allowOverride", true); - -#ifdef MOZILLA_OFFICIAL -// Normally the "client ID" sent in updates is appinfo.name, but for -// official Firefox releases from Mozilla we use a special identifier. -pref("browser.safebrowsing.id", "navclient-auto-ffox"); -#else -pref("browser.safebrowsing.id", "Firefox"); -#endif -#endif - // Turn off Spatial navigation by default. pref("snav.enabled", false); |