Windows 10 reached EOS (end of support) on October 14, 2025. For more information, see this article.

Mozilla サポートの検索

サポート詐欺に注意してください。 私たちはあなたに通話やショートメッセージの送信、個人情報の共有を求めることはありません。疑わしい行為を見つけたら「迷惑行為を報告」からご報告ください。

詳しく学ぶ

このスレッドはアーカイブに保管されました。 必要であれば新たに質問してください。

mozilla.cfg not applying

  • 11 件の返信
  • 1 人がこの問題に困っています
  • 6 回表示
  • 最後の返信者: cor-el

more options

C:\Program Files (x86)\Mozilla Firefox\mozilla.cfg

C:\Program Files (x86)\Mozilla Firefox\Override.ini
C:\Program Files (x86)\Mozilla Firefox\local-setting.js
I can't get the mozilla.cfg file to apply. I went simple and just put
app.update.enable in there. I went back from 40.0.3 to 40.0.2. I have tried
saving the files in UTF-8. I ensured that the file extensions are correct. I
am at the end of my rope. Here are the pics of the file contents.
C:\Program Files (x86)\Mozilla Firefox\mozilla.cfg C:\Program Files (x86)\Mozilla Firefox\Override.ini C:\Program Files (x86)\Mozilla Firefox\local-setting.js I can't get the mozilla.cfg file to apply. I went simple and just put app.update.enable in there. I went back from 40.0.3 to 40.0.2. I have tried saving the files in UTF-8. I ensured that the file extensions are correct. I am at the end of my rope. Here are the pics of the file contents.
添付されたスクリーンショット

すべての返信 (11)

more options

hi, as per http://kb.mozillazine.org/Locking_preferences please try to save those files ANSI-encoded...

more options

Thanks for the help.

They are now and originally were. I tried UTF-8 as a troubleshooting step. ANSI makes no difference.

more options

actually local-setting.js should go into "C:\Program Files (x86)\Mozilla Firefox\defaults\pref"

more options

You need to place a local-settings.js file in the defaults\pref folder where also the channel-prefs.js file is located to specify using mozilla.cfg.

pref("general.config.filename", "mozilla.cfg");
pref("general.config.obscure_value", 0);

These functions can be used in the mozilla.cfg file:

defaultPref();	// set new default value
pref();		// set pref, allow changes in current session
lockPref();	// lock pref, disallow changes

See:


The file name is override.ini with a lowercase 'O'.

more options

Yes, that was a typo. I hand jammed the destination.

Is it true that if there is one error in the Mozilla.cfg file that the whole thing won't work?

more options

Yes. The mozilla.cfg file is run as a JavaScript and not interpreted like the prefs.js and user.js files. Any error in the file throws an exception and abort the execution.

This also means that you can place all kind on JavaScript in the file that runs with chrome privileges. You can also use try and catch blocks as a test to see if things work or comment out lines with a starting //.

more options

Yes, I read all that an d that is how I got here.

Now, I went back to 40.0.2 and resaved the files and now app.update.enabled says false. YAY.

But then this doesn't work:

//

lockPref("browser.startup.homepage", "https://www.google.com");
lockpref("browser.download.useDownloadDir", false);
lockPref("app.update.enabled", false);
lockPref("extensions.update.enabled", false);
lockPref("browser.shell.checkDefaultBrowser", false);
lockPref("browser.search.update", false);
lockPref("browser.formfill.enable", false);
lockPref("signon.autofillForms", false);
lockPref("dom.disable_open_during_load", true);
lockPref("dom.disable_window_move_resize", true);
lockPref("dom.event.contextmenu.enabled", false);
lockPref("dom.disable_window_status_change", true);
lockPref("dom.disable_window_flip", true);
lockPref("dom.disable_window_open_feature.status", true);
lockPref("privacy.sanitize.sanitizeOnShutdown", true);
lockPref("security.default_personal_cert", "Ask Every Time");
lockPref("signon.rememberSignons", false);
lockPref("xpinstall.whitelist.required", true);
lockPref("network.protocol-handler.external.shell",false);
lockPref("security.ssl3.dhe_rsa_aes_128_sha;true",true);
lockPref("security.ssl3.dhe_rsa_aes_256_sha;true",true);
lockPref("security.ssl3.ecdhe_ecdsa_aes_128_gcm_sha256;true",true);
lockPref("security.ssl3.ecdhe_ecdsa_aes_128_sha;true",true);
lockPref("security.ssl3.ecdhe_ecdsa_aes_256_sha;true",true);
lockPref("security.ssl3.ecdhe_ecdsa_rc4_128_sha;true",true);
lockPref("security.ssl3.ecdhe_rsa_aes_128_gcm_sha256;true",true);
lockPref("security.ssl3.ecdhe_rsa_aes_128_sha;true",true);
lockPref("security.ssl3.ecdhe_rsa_aes_256_sha;true",true);
lockPref("security.ssl3.ecdhe_rsa_rc4_128_sha;true",true);
lockPref("security.ssl3.rsa_aes_128_sha;true",true);
lockPref("security.ssl3.rsa_aes_256_sha;true",true);
lockPref("security.ssl3.rsa_des_ede3_sha;true",true);
lockPref("security.ssl3.rsa_rc4_128_md5;true",true);
lockPref("security.ssl3.rsa_rc4_128_sha;true",true);
pref("toolkit.telemetry.unifiedIsOptIn", false);
pref("toolkit.telemetry.enabled", false);


Anything pop out at you?

more options

HAHAHA I see it...:true" true

What was I thinking...let me see if it works.

more options

Nope, I am going to have to go through each line. None of the settings apply.

more options

Yes, that won't work :wink:

Any special reason to set these to true? Those were disabled because of the logjan vulnerability.

  • security.ssl3.dhe_rsa_aes_128_sha
  • security.ssl3.dhe_rsa_aes_256_sha

Locking this pref will prevent users from getting a special context menu on web pages, so you may want to reconsider and use pref() instead to only initialize the pref. lockPref("dom.event.contextmenu.enabled", false);

more options

Hmm, I'm not sure how I missed this lockpref instead of lockPref:

lockpref("browser.download.useDownloadDir", false);
lockPref("browser.download.useDownloadDir", false);
//

lockPref("browser.startup.homepage", "https://www.google.com");
lockPref("browser.download.useDownloadDir", false);
lockPref("app.update.enabled", false);
lockPref("extensions.update.enabled", false);
lockPref("browser.shell.checkDefaultBrowser", false);
lockPref("browser.search.update", false);
lockPref("browser.formfill.enable", false);
lockPref("signon.autofillForms", false);
lockPref("dom.disable_open_during_load", true);
lockPref("dom.disable_window_move_resize", true);
lockPref("dom.event.contextmenu.enabled", false);
lockPref("dom.disable_window_status_change", true);
lockPref("dom.disable_window_flip", true);
lockPref("dom.disable_window_open_feature.status", true);
lockPref("privacy.sanitize.sanitizeOnShutdown", true);
lockPref("security.default_personal_cert", "Ask Every Time");
lockPref("signon.rememberSignons", false);
lockPref("xpinstall.whitelist.required", true);
lockPref("network.protocol-handler.external.shell",false);
lockPref("security.ssl3.dhe_rsa_aes_128_sha",true);
lockPref("security.ssl3.dhe_rsa_aes_256_sha",true);
lockPref("security.ssl3.ecdhe_ecdsa_aes_128_gcm_sha256",true);
lockPref("security.ssl3.ecdhe_ecdsa_aes_128_sha",true);
lockPref("security.ssl3.ecdhe_ecdsa_aes_256_sha",true);
lockPref("security.ssl3.ecdhe_ecdsa_rc4_128_sha",true);
lockPref("security.ssl3.ecdhe_rsa_aes_128_gcm_sha256",true);
lockPref("security.ssl3.ecdhe_rsa_aes_128_sha",true);
lockPref("security.ssl3.ecdhe_rsa_aes_256_sha",true);
lockPref("security.ssl3.ecdhe_rsa_rc4_128_sha",true);
lockPref("security.ssl3.rsa_aes_128_sha",true);
lockPref("security.ssl3.rsa_aes_256_sha",true);
lockPref("security.ssl3.rsa_des_ede3_sha",true);
lockPref("security.ssl3.rsa_rc4_128_md5",true);
lockPref("security.ssl3.rsa_rc4_128_sha",true);
pref("toolkit.telemetry.unifiedIsOptIn", false);
pref("toolkit.telemetry.enabled", false);

この投稿は cor-el により に変更されました