major cleaning

This commit is contained in:
Aminda Suomalainen 2015-08-20 15:22:22 +03:00
parent baff3f7dd1
commit c8dcba24a3
14 changed files with 0 additions and 336 deletions

View File

@ -1,10 +0,0 @@
[main]
plugins=ifupdown,keyfile,ofono
#dns=dnsmasq
[ifupdown]
managed=true
## Disable NM for this MAC address
#[keyfile]
#unmanaged-devices=mac:XX:XX:XX:XX:XX:XX

View File

@ -1,3 +0,0 @@
Package: dnsmasq
Pin: release *
Pin-Priority: -1

View File

@ -1,7 +0,0 @@
DNSCRYPT_LOCALIP=127.0.0.2
DNSCRYPT_LOCALPORT=53
DNSCRYPT_USER=nobody
DNSCRYPT_PROVIDER_NAME=2.dnscrypt-cert.opendns.com
DNSCRYPT_PROVIDER_KEY=B735:1140:206F:225D:3E2B:D822:D7FD:691E:A1C3:3CC8:D666:8D0C:BE04:BFAB:CA43:FB79
DNSCRYPT_RESOLVERIP=208.67.220.220
DNSCRYPT_RESOLVERPORT=443

View File

@ -1,111 +0,0 @@
#
# Sample configuration file for ISC dhcpd for Debian
#
#
# The ddns-updates-style parameter controls whether or not the server will
# attempt to do a DNS update when a lease is confirmed. We default to the
# behavior of the version 2 packages ('none', since DHCP v2 didn't
# have support for DDNS.)
#ddns-update-style none;
# option definitions common to all supported networks...
#option dhcp6.domain-name "mikaela.info";
#option dhcp6.domain-name-servers 2001:4860:4860::8888, 2001:4860:4860::8844;
#option dhcp6.domain-search "mikaela.info";
option domain-name "example.org";
option domain-name-servers 2001:4860:4860::8888, 2001:4860:4860::8844;
option domain-search "mikaela.info"
#default-lease-time 600;
#max-lease-time 7200;
# If this DHCP server is the official DHCP server for the local
# network, the authoritative directive should be uncommented.
#authoritative;
# Use this to send dhcp log messages to a different log file (you also
# have to hack syslog.conf to complete the redirection).
log-facility local7;
# No service will be given on this subnet, but declaring it helps the
# DHCP server to understand the network topology.
#subnet 10.152.187.0 netmask 255.255.255.0 {
#}
# This is a very basic subnet declaration.
#subnet 10.254.239.0 netmask 255.255.255.224 {
# range 10.254.239.10 10.254.239.20;
# option routers rtr-239-0-1.example.org, rtr-239-0-2.example.org;
#}
# This declaration allows BOOTP clients to get dynamic addresses,
# which we don't really recommend.
#subnet 10.254.239.32 netmask 255.255.255.224 {
# range dynamic-bootp 10.254.239.40 10.254.239.60;
# option broadcast-address 10.254.239.31;
# option routers rtr-239-32-1.example.org;
#}
# A slightly different configuration for an internal subnet.
#subnet 10.5.5.0 netmask 255.255.255.224 {
# range 10.5.5.26 10.5.5.30;
# option domain-name-servers ns1.internal.example.org;
# option domain-name "internal.example.org";
# option routers 10.5.5.1;
# option broadcast-address 10.5.5.31;
# default-lease-time 600;
# max-lease-time 7200;
#}
# Hosts which require special configuration options can be listed in
# host statements. If no address is specified, the address will be
# allocated dynamically (if possible), but the host-specific information
# will still come from the host declaration.
#host passacaglia {
# hardware ethernet 0:0:c0:5d:bd:95;
# filename "vmunix.passacaglia";
# server-name "toccata.fugue.com";
#}
# Fixed IP addresses can also be specified for hosts. These addresses
# should not also be listed as being available for dynamic assignment.
# Hosts for which fixed IP addresses have been specified can boot using
# BOOTP or DHCP. Hosts for which no fixed address is specified can only
# be booted with DHCP, unless there is an address range on the subnet
# to which a BOOTP client is connected which has the dynamic-bootp flag
# set.
#host fantasia {
# hardware ethernet 08:00:07:26:c0:a5;
# fixed-address fantasia.fugue.com;
#}
# You can declare a class of clients and then do address allocation
# based on that. The example below shows a case where all clients
# in a certain class get addresses on the 10.17.224/24 subnet, and all
# other clients get addresses on the 10.0.29/24 subnet.
#class "foo" {
# match if substring (option vendor-class-identifier, 0, 4) = "SUNW";
#}
#shared-network 224-29 {
# subnet 10.17.224.0 netmask 255.255.255.0 {
# option routers rtr-224.example.org;
# }
# subnet 10.0.29.0 netmask 255.255.255.0 {
# option routers rtr-29.example.org;
# }
# pool {
# allow members of "foo";
# range 10.17.224.10 10.17.224.250;
# }
# pool {
# deny members of "foo";
# range 10.0.29.10 10.0.29.230;
# }
#}

View File

@ -1,65 +0,0 @@
# Configuration for getaddrinfo(3).
#
# So far only configuration for the destination address sorting is needed.
# RFC 3484 governs the sorting. But the RFC also says that system
# administrators should be able to overwrite the defaults. This can be
# achieved here.
#
# All lines have an initial identifier specifying the option followed by
# up to two values. Information specified in this file replaces the
# default information. Complete absence of data of one kind causes the
# appropriate default information to be used. The supported commands include:
#
# reload <yes|no>
# If set to yes, each getaddrinfo(3) call will check whether this file
# changed and if necessary reload. This option should not really be
# used. There are possible runtime problems. The default is no.
#
# label <mask> <value>
# Add another rule to the RFC 3484 label table. See section 2.1 in
# RFC 3484. The default is:
#
label ::1/128 0
label ::/0 1
label 2002::/16 2
label ::/96 3
label ::ffff:0:0/96 4
label fec0::/10 5
label fc00::/7 6
#label 2001:0::/32 7
#
# This default differs from the tables given in RFC 3484 by handling
# (now obsolete) site-local IPv6 addresses and Unique Local Addresses.
# The reason for this difference is that these addresses are never
# NATed while IPv4 site-local addresses most probably are. Given
# the precedence of IPv6 over IPv4 (see below) on machines having only
# site-local IPv4 and IPv6 addresses a lookup for a global address would
# see the IPv6 be preferred. The result is a long delay because the
# site-local IPv6 addresses cannot be used while the IPv4 address is
# (at least for the foreseeable future) NATed. We also treat Teredo
# tunnels special.
#
# precedence <mask> <value>
# Add another rule to the RFC 3484 precedence table. See section 2.1
# and 10.3 in RFC 3484. The default is:
#
#precedence ::1/128 50
#precedence ::/0 40
#precedence 2002::/16 30
#precedence ::/96 20
#precedence ::ffff:0:0/96 10
#
# For sites which prefer IPv4 connections change the last line to
#
#precedence ::ffff:0:0/96 100
#
# scopev4 <mask> <value>
# Add another rule to the RFC 6724 scope table for IPv4 addresses.
# By default the scope IDs described in section 3.2 in RFC 6724 are
# used. Changing these defaults should hardly ever be necessary.
# The defaults are equivalent to:
#
#scopev4 ::ffff:169.254.0.0/112 2
#scopev4 ::ffff:127.0.0.0/104 2
#scopev4 ::ffff:0.0.0.0/96 14

View File

@ -1,41 +0,0 @@
# interfaces(5) file used by ifup(8) and ifdown(8)
auto lo
iface lo inet loopback
auto eth0
allow-hotplug eth0
iface eth0 inet static
address 172.16.1.
netmask 255.255.0.0
gateway 172.16.0.1
## dns-nameservers is provided by resolvconf so you can specify nameservers
## there. Remember to install dnsmasq to get over the limit of being able
## to use only three DNS servers at time!
dns-nameservers ::1 8.8.8.8 8.8.4.4
dns-search DOMAIN.TLD
iface eth0 inet6 auto
## if radvd is announcing prefixes, IPs from them must be in this file
## see also https://www.sixxs.net/tools/grh/ula/
## radvd globally routable address
#iface eth0 inet6 static
#address RANGE::1
#netmask 64
## radvd ULA
#iface eth0 inet6 static
#address RANGE::1
#netmask64
## Manually adding IPv6 addresses: ip -6 addr add IPv6_ADDREsS/64 dev eth0
## REMEMBER TO CHANGE
## managed=false
## to
## managed=true
## in /etc/NetworkManager/NetworkManager.conf under "[ifupdown]" !
## And restart it!
## service network-manager restart

View File

@ -1,4 +0,0 @@
# https://wiki.archlinux.org/index.php/Avahi#Hostname_resolution
# hosts: files dns myhostname
hosts: files mdns_minimal [NOTFOUND=return] dns myhostname

View File

@ -1,38 +0,0 @@
# https://wiki.archlinux.org/index.php?title=DNSCrypt&oldid=373568#Example:_configuration_for_pdnsd
global {
perm_cache=16384;
cache_dir="/var/cache/pdnsd";
run_as="pdnsd";
server_ip = 127.0.0.1;
status_ctl = on;
query_method=udp_tcp;
min_ttl=15m; # Retain cached entries at least 15 minutes.
max_ttl=1w; # One week.
timeout=10; # Global timeout option (10 seconds).
neg_domain_pol=on;
udpbufsize=1024; # Upper limit on the size of UDP messages.
}
server {
label = "dnscrypt-proxy";
ip = 127.0.0.2;
port = 53;
timeout = 4;
uptest = query;
interval = 15m;
proxy_only=on;
}
source {
owner=localhost;
file="/etc/hosts";
}
rr {
name=localhost;
reverse=on;
a=127.0.0.1;
owner=localhost;
soa=localhost,root.localhost,42,86400,900,86400,86400;
}

View File

@ -1,5 +0,0 @@
## Dynamic resolv.conf(5) file for glibc resolver(3) generated by resolvconf(8)
## DO NOT EDIT THIS FILE BY HAND -- YOUR CHANGES WILL BE OVERWRITTEN
## Local DNS cache (dnsmasq)
nameserver ::1

View File

@ -1,3 +0,0 @@
# According to manual page for resolv.conf, the last search/domain entry
# wins
search DOMAIN.TLD

View File

@ -1 +0,0 @@
This has been only tested with Pidora 2014

View File

@ -1,26 +0,0 @@
server:
use-syslog: yes
username: "unbound"
directory: "/etc/unbound"
trust-anchor-file: trusted-key.key
access-control: 127.0.0.0/8 allow
access-control: ::1 allow
forward-zone:
name: "."
# Google
forward-addr: 2001:4860:4860::8888
forward-addr: 2001:4860:4860::8844
forward-addr: 8.8.8.8
forward-addr: 8.8.4.4
# censurfridns.dk
forward-addr: 2001:67c:28a4::
forward-addr: 91.239.100.100
# DNS.WATCH
forward-addr: 2001:1608:10:25::1c04:b12f
forward-addr: 2001:1608:10:25::9249:d69b
forward-addr: 84.200.69.80
forward-addr: 84.200.70.40
# puntCAT
forward-addr: 2a00:1508:0:4::9
forward-addr: 109.69.8.51

View File

@ -1,21 +0,0 @@
# When there is no dnsmasq
server:
# perform cryptographic DNSSEC validation using the root trust anchor.
# this should be in /etc/unbound/unbound.conf.d/root-auto-trust-anchor-file.conf
auto-trust-anchor-file: "/var/lib/unbound/root.key"
#interface: 127.0.0.1
access-control: 127.0.0.0/8 allow
#interface: ::1
access-control: ::1 allow
port: 53
# logging
chroot: ""
use-syslog: yes
log-time-ascii: yes
log-queries: yes
# 0 - 5, default 1, query information 3
verbosity: 1
# more cache memory, rrset=msg*2
rrset-cache-size: 500m
msg-cache-size: 250m

View File

@ -1 +0,0 @@
../../forwards.conf