diff options
author | tilpner | 2020-06-15 09:53:06 +0200 |
---|---|---|
committer | tilpner | 2020-06-15 09:53:06 +0200 |
commit | 367b0c114f38d5c332f5ee971ad13dd69e302dec (patch) | |
tree | ec0c5ee3e7e1f0a30517599e51bd0c8172635158 /profiles/noTunnels.nix | |
parent | 2992d92e6ce0d7c96ccded0747d8815d8cfed956 (diff) | |
download | firefox-profiles-367b0c114f38d5c332f5ee971ad13dd69e302dec.tar.gz firefox-profiles-367b0c114f38d5c332f5ee971ad13dd69e302dec.tar.xz firefox-profiles-367b0c114f38d5c332f5ee971ad13dd69e302dec.zip |
WIP towards module based configuration
Diffstat (limited to 'profiles/noTunnels.nix')
-rw-r--r-- | profiles/noTunnels.nix | 23 |
1 files changed, 0 insertions, 23 deletions
diff --git a/profiles/noTunnels.nix b/profiles/noTunnels.nix deleted file mode 100644 index 292b034..0000000 --- a/profiles/noTunnels.nix +++ /dev/null @@ -1,23 +0,0 @@ -{ }: { - meta.description = '' - Take reasonable precautions against the use of a proxy, or an encrypted DNS tunnel. - - This can make sense if we do DNS-level filtering, and the user does not have full control - over the device they're using. - - If a motivated user has local write and execution privileges, it is unlikely that we can prevent - them from circumventing these restrictions. - ''; - - policies = { - DNSOverHTTPS = { - Enabled = false; - Locked = true; - }; - - Proxy = { - Mode = "none"; - Locked = true; - }; - }; -} |