aboutsummaryrefslogtreecommitdiff
path: root/profiles/noTunnels.nix
diff options
context:
space:
mode:
authortilpner2020-06-15 09:53:06 +0200
committertilpner2020-06-15 09:53:06 +0200
commit367b0c114f38d5c332f5ee971ad13dd69e302dec (patch)
treeec0c5ee3e7e1f0a30517599e51bd0c8172635158 /profiles/noTunnels.nix
parent2992d92e6ce0d7c96ccded0747d8815d8cfed956 (diff)
downloadfirefox-profiles-367b0c114f38d5c332f5ee971ad13dd69e302dec.tar.gz
firefox-profiles-367b0c114f38d5c332f5ee971ad13dd69e302dec.tar.xz
firefox-profiles-367b0c114f38d5c332f5ee971ad13dd69e302dec.zip
WIP towards module based configuration
Diffstat (limited to 'profiles/noTunnels.nix')
-rw-r--r--profiles/noTunnels.nix23
1 files changed, 0 insertions, 23 deletions
diff --git a/profiles/noTunnels.nix b/profiles/noTunnels.nix
deleted file mode 100644
index 292b034..0000000
--- a/profiles/noTunnels.nix
+++ /dev/null
@@ -1,23 +0,0 @@
-{ }: {
- meta.description = ''
- Take reasonable precautions against the use of a proxy, or an encrypted DNS tunnel.
-
- This can make sense if we do DNS-level filtering, and the user does not have full control
- over the device they're using.
-
- If a motivated user has local write and execution privileges, it is unlikely that we can prevent
- them from circumventing these restrictions.
- '';
-
- policies = {
- DNSOverHTTPS = {
- Enabled = false;
- Locked = true;
- };
-
- Proxy = {
- Mode = "none";
- Locked = true;
- };
- };
-}