From: Michael Kaply <345868+mkaply@users.noreply.github.com> Date: Wed, 10 May 2023 19:23:15 +0000 (-0400) Subject: Add new security prefs. X-Git-Tag: v4.11~3 X-Git-Url: https://git.p6c8.net/policy-templates.git/commitdiff_plain/a55a57c7b6748276b477861958b7a028ed9e3ab2 Add new security prefs. --- diff --git a/README.md b/README.md index 2be59fc..efde516 100644 --- a/README.md +++ b/README.md @@ -4606,12 +4606,16 @@ as well as the following security preferences: |     If set to true, adds the words "Not Secure" for insecure sites. | security.insecure_connection_text.pbmode.enabled | bool | false |     If set to true, adds the words "Not Secure" for insecure sites in private browsing. -| security.insecure_field_warning.contextual.enabled | bool | true -|     If set to false, remove the warning for inscure login fields. | security.mixed_content.block_active_content | boolean | true |     If false, mixed active content (HTTP and HTTPS) is not blocked. | security.osclientcerts.autoload | boolean | false |     If true, client certificates are loaded from the operating system certificate store. +| security.OCSP.enabled | integer | 1 +|     If 0, do not fetch OCSP. If 1, fetch OCSP for DV and EV certificates. If 2, fetch OCSP only for EV certificates +| security.OCSP.require | boolean | false +|      If true, if an OCSP request times out, the connection fails. +| security.ssl.enable_ocsp_stapling | boolean | true +|      If false, OCSP stapling is not enabled. | security.ssl.errorReporting.enabled | boolean | true |     If false, SSL errors cannot be sent to Mozilla. | security.tls.enable_0rtt_data | boolean | true