ba298f94a5
resolv: increase timeout to 2 (match unbound/RFC 8767), decrease attempts to 2, rotate
2024-05-01 09:54:07 +03:00
447385fdb8
chrony: rename ntppool.sources -> ntp-pool.sources
2024-04-30 21:02:28 +03:00
78136f7437
systemd/timesyncd.conf.d: don't only use ntp pool as a fallback
2024-04-30 21:01:46 +03:00
f6e9aa58da
unbound: add replace-systemd-resolved.conf.sample for listening on systemd-resolved ports
2024-04-30 20:30:15 +03:00
4882cb66be
systemd-resolv.conf-generate.bash: who is going to stop me from specifying the same resolver thrice?
2024-04-30 20:21:12 +03:00
b9daad6a2f
resolv.conf: explain 127.0.0.54
2024-04-30 20:16:46 +03:00
d6e4fd1be7
etc: create systemd-resolv.conf-generate.bash & systemd-resolv.conf-restore.bash, mention them in resolv.conf
2024-04-30 20:05:53 +03:00
fa5462212d
aminda-nocron-reboot.service: add zram-generator just in case
2024-04-30 19:10:28 +03:00
72ea5ca51e
unbound: fix typo in (1)5 minutes cache, apparently a commit once removed the 1
2024-04-30 17:34:01 +03:00
5d4e0e10dd
unbound/min-ttl-hour.conf: also print the stats hourly, not every 15 minutes
2024-04-30 17:26:14 +03:00
437b69bd6e
unbound: apparently rename min-ttl.conf.sample to min-ttl-five-min.conf
2024-04-30 17:17:46 +03:00
9671adf293
unbound: break statistics interval from logging.conf to min-ttl*
2024-04-30 17:11:32 +03:00
819d6a782e
unbound: add mixed-case-queries.conf
2024-04-30 17:11:09 +03:00
08de11b594
unbound/min-ttl-hour.conf: fix comment
2024-04-30 06:52:46 +03:00
87bedac239
unbound: cut cache.conf.SAMPLE into more descriptive files
2024-04-30 06:45:53 +03:00
531cdd82c5
unbound/cache.conf.SAMPLE: fix oversight, logging.conf: reducei nterval to quaterly
2024-04-29 20:48:51 +03:00
0d0be5f9bc
unbound/cache.conf: rename to cache.conf.SAMPLE and add scary warnings there
2024-04-29 20:46:00 +03:00
b54f55a1bc
document Microsoft Edge recommended policy
2024-04-29 12:39:58 +03:00
788143ec01
init-browser-policies.bash: touch Firefox, break LibreWolf, verbose, handle Edge Recommended separately, warn about that too, etc.?
2024-04-29 12:25:17 +03:00
d377157b46
init-browser-policies.bash: manage Edge recommended profiles separately
2024-04-29 12:15:26 +03:00
a14446ed71
unbound/dns-over-tls.conf: add Cloudflare, Mullvad & Control D
...
This is now practically https://www.privacyguides.org/en/dns/ plus Appliedprivacy
2024-04-29 08:29:07 +03:00
0ee83e9a90
chrony/sources: enable xleave with ~everything
...
I was unable to find much information about this, but see the previous commit and Brave Leo said
> Yes, it's generally acceptable to use interleaved mode with a public NTP (Network Time Protocol) server, as long as you comply with the server's usage policies. This mode allows for time synchronization while also providing a fallback if the primary time source fails. However, keep in mind that public NTP servers are often subject to heavy traffic, so they may not provide the most accurate or timely synchronization.
2024-04-29 06:55:16 +03:00
6f0184b519
chrony/sources/ntppool: enable xleave
...
From https://community.ntppool.org/t/chrony-conf-noclientlog-vs-clientloglimit/2263/4 I got the impression it's fine to do and the manual says it's compatible with the basic mode and xleave supporting servers may still reply in basic mode sometimes so this shouldn't break anything
2024-04-29 06:51:27 +03:00
0f66e552c1
Revert "nts-servers.sources: no preferring non-ISP servers"
...
This reverts commit ff1bc7b3ba
.
2024-04-28 20:08:42 +03:00
4081c974bb
unbound/cache.conf: make the min ttl an hour in my quest to break DNS
2024-04-28 19:15:42 +03:00
23672028d5
unbound/ecs.conf: attempt to send larger subnets than default around
2024-04-28 18:02:18 +03:00
d64b4f2001
systemd-resolved: add DNA/Moi & Elisa DNS servers
...
I was unable to find authoritative source for what is Telia's DNS
2024-04-28 16:14:30 +03:00
44e22716f9
chrony sources: make add .sample to local-servers.sources, make it more useful for me
2024-04-28 10:02:31 +03:00
18a04b1351
{firefox,chromium}: disable protections for one.one.one.one
...
For some reason they make connection to 1.1.1.1 appear as no or unreachable.
2024-04-28 09:21:29 +03:00
55dcb2f2cd
systemd-resolved/98-local-resolver.conf: fix comment talking about alphabet while everything is now numerals
2024-04-28 09:17:07 +03:00
35b99a6bc0
systemd-resolved: add 99-lan-resolver.conf.sample for trusted LANs
2024-04-28 09:13:46 +03:00
5ab33c154e
systemd-resolved: rename conf files to have a number prefix
2024-04-28 09:13:20 +03:00
9375b3c2b2
unbound: add dot-cloudflare.conf
2024-04-27 21:22:28 +03:00
2aa221b77f
unbound/cache: take the cache-min-ttl: 3000 challenge
...
It will not affect web browsers which are using DoH for ECH eliminating most of breakage and I am just curious on will anything outside of web browser suffer that.
2024-04-27 18:35:22 +03:00
652c11391f
unbound/cache.conf: explicitly set serve-expired-reply-ttl to 30
2024-04-27 16:52:39 +03:00
d3773468fa
chromium/policies: add doh-{disabled,google}.json
2024-04-27 16:18:40 +03:00
a083a9d704
unbound/cache: comment cache-min-ttl=900, add commented 3000
2024-04-27 15:42:29 +03:00
30a27f980d
unbound/cache.conf: RFC 8767ish configuration
2024-04-27 15:00:12 +03:00
813878a4de
systemd/{iwd,systemd-networkd}.service.d: add appropiate symlinks
2024-04-27 12:25:00 +03:00
c59fe1ae53
sudoers.d/nordvpnd: also allow restarting tor-client.service
...
I have a suspicion I am adding it to the script sooner or later
2024-04-27 12:21:07 +03:00
ef9c4acfc3
sudoers.d/nordvpnd: also allow restarting Tor
2024-04-27 12:10:15 +03:00
955e52f5af
yum.repos.d: add google-Chrome.repo to workaround their crontab disliking my system
2024-04-27 10:21:20 +03:00
8fe7ff55e6
chromium: add managed black-theme-colour & recommended apps-as-homepage, disable-default-browser-check
2024-04-27 10:08:43 +03:00
b76b7cac5c
systemd/user: review vpn wants, rm transmission-daemon copy-paste
2024-04-27 08:34:46 +03:00
2113b593e7
Chromium & Firefox: force Bitwarden (for passkeys)
2024-04-27 08:32:39 +03:00
da85d0d9c7
firefox & chromium: allow PrivacyPass attestor & Keyoxide.org
2024-04-27 08:31:05 +03:00
61dc3706ab
systemd/{chrony,i2pd,yggdrasil}.service.d/mullvad-exclude.conf: fix mistakes and Requires=
2024-04-26 17:43:37 +03:00
1b64bc5e13
systemd/service.d: fix typo & use Requires= where appropiate
2024-04-26 17:38:33 +03:00
db7de1c3e4
systemd/service.d/unbound-wanted.conf: break circular skipping by removing After=
2024-04-26 17:35:31 +03:00
7f410148e3
aminda-nocron-rebootish.service: repeat that dns should be running
2024-04-26 16:13:39 +03:00
1d7308e74e
unbound: explicitly enable ede and it's log
2024-04-26 13:53:50 +03:00
2f585209e7
matterbridge-cleanup.timer: use more human friendly term minutely on OnCalendar=
2024-04-26 13:21:20 +03:00
65f58dc224
systemd: aminda-nocron-rebootish.{service,timer} is a delayed variant of -ish
2024-04-26 13:16:33 +03:00
c55b20a89a
move systemd user units from conf/systemd/user to etc/systemd/user
...
symlink remains to show what is the correct location
2024-04-26 13:05:08 +03:00
b36fe67bc3
systemd/user: attempt to flatpak-update-user.{service,timer}
2024-04-26 13:03:05 +03:00
b8f720fa7f
aminda-nocron-reboot.timer: fix typo in comment
2024-04-26 12:48:47 +03:00
9e38fdf223
aminda-nocron-reboot.timer: add RemainAfterElapse=false
2024-04-26 12:37:55 +03:00
90b64c9543
systemd: rename aminda-nocron -> aminda-nocron-reboot for clarity
...
also opens up aminda-nocron-hourly etc.
2024-04-26 12:30:58 +03:00
b0ec7cffde
chromium/README: EnableOnlineRevocationChecks does also enable CRL
2024-04-26 11:27:11 +03:00
16d2f74135
systemd/aminda-nocron.service: explicitly start DNS too
2024-04-26 11:08:15 +03:00
def77bc4c3
systemd: add aminmda-nocron.{service,timer} for my @reboot crontabs for cronless systems (SteamOS)
2024-04-26 10:43:08 +03:00
901dbfe138
etc/hosts: attempt to increase legibility by adding leading and trailing #
2024-04-25 19:45:11 +03:00
21b59adfd2
etc/hosts/hostname: copy Debian behaviour as a good practice
2024-04-25 19:40:56 +03:00
fb65f717fc
etc: cleanup symlinks/files handled by init-browser-policies.bash
...
They brought no value to me, just confused me in git forges by clicktrapping me and not following the symlinks
2024-04-25 17:31:09 +03:00
6375d55b8f
systemd-resolved/mullvad: default to base for consistency with unbound
2024-04-25 17:27:55 +03:00
17e0b68d20
unbound: add dot-mullvad.conf defalting on base
...
I found myself missing this on an old family PC that has limited resources and as I didn't have this file at hand, I just went with AdGuard which will work too.
2024-04-25 17:24:41 +03:00
a17ff2903a
unbound/nordvpn-domains.conf: add comments/sources, fix duplicate zone, add missing domains
2024-04-25 15:07:37 +03:00
bbeb1d3e02
unbound/nordvpn: rename, send only their domains to them
2024-04-25 14:34:47 +03:00
046b9c5f1a
systemd: use more descriptive drop-in name unbound-wanted.conf instead of unbound.conf
2024-04-25 14:10:26 +03:00
1ea9fff29a
chromium: declare more things as .badidea
2024-04-25 14:01:54 +03:00
f87c4899b6
chromium: add dns-over-https.json.badidea and declare it as a bad idea
2024-04-25 13:57:01 +03:00
861b35c25f
systemd-resolved: add the other applied-privacy.net port too
2024-04-25 13:47:18 +03:00
342e3116a6
systemd-resolved: another attempt at local resolvers
2024-04-25 13:45:37 +03:00
d17ad34650
unbound/dns-over-tls.conf: note Applied Privacy does no ECS, add 853, add Quad9 unfiltered (ECS commented)
2024-04-25 13:26:01 +03:00
52b0807fcb
systemd/yggdrasil.service.d: rename nordvpnd to restore-ipv6.conf
2024-04-25 12:52:30 +03:00
520470e3dd
systemd: add firewalld-icmpv6.conf as drop-in
2024-04-25 12:51:03 +03:00
45cf5ecf61
opt/chromium/policies/managed: update documentation about working preferred over ECH enforced
2024-04-25 11:00:40 +03:00
32883d5c73
chromium: allow DoH downgrade to at least work. Breaks ECH :(
2024-04-25 08:15:28 +03:00
7c80e2c329
NetworkManager: paws-off-my-resolv.conf
2024-04-24 18:21:33 +03:00
38152ab152
etc/sudoers.d: add vim modelines just in case
...
I think it autodetected them correctly though
2024-04-24 18:16:42 +03:00
505c6ec74a
etc/hosts: add hosts.steamos
2024-04-24 18:15:50 +03:00
7113fda702
sudoers.d/nordvpnd: add restarting unbound & systemd-resolved
2024-04-24 18:00:00 +03:00
32c5da4422
etc/resolv.conf-generate.bash: also be verbose with chattr & chmod
2024-04-24 12:09:15 +03:00
9b01bc5260
etc/hosts/README.md: add forgotten blocklist and formatting
2024-04-24 11:55:35 +03:00
c00f750d96
etc/resolv.conf-generate.bash: simple resolv.conf writer the way I want
2024-04-24 11:06:35 +03:00
fa9da0901d
etc/hosts/blocklist: initial commit
2024-04-24 09:21:42 +03:00
b36ba70a70
systemd/service.d: add resolv.conf example with warnings
2024-04-24 07:31:10 +03:00
bdcd7249c3
etc/resolv.conf: fix comment
2024-04-23 16:47:03 +03:00
95e17d0a49
resolv.conf: remove rotate comments, attempt to explain the logic behind timeout & attempts
2024-04-23 16:23:36 +03:00
425af3eabf
etc/resolv.conf: specify timeout 1 and attempts 5
2024-04-23 16:03:49 +03:00
70ed890742
dnf/protected.d: add README.md, aminda-{desktop,essentials}.conf
2024-04-23 07:51:29 +03:00
4dac26e46e
dnf: also protect unbound
2024-04-23 07:41:49 +03:00
b0f7876436
etc/dnf/protected.d: add systemd-{networkd,resolved}.conf
2024-04-23 07:29:18 +03:00
f41e80d66a
hosts/dns: comment where it begins and where it ends
2024-04-22 17:11:03 +03:00
97c2e74220
etc/hosts: attempt to perform the bad idea of well-known DNS servers here instead
2024-04-22 16:24:51 +03:00
4560e776df
systemd-{resolved,networkd}: just break things
2024-04-22 15:43:50 +03:00
886b8dbfbd
unbound.conf.d: well-known-dns.conf -> well-known-dns.conf.badidea
...
This will break DNSSEC and a lot of things.
2024-04-22 15:39:47 +03:00
4acd22dc37
systemd-networkd: add untested none (Yggdrasil) & wireguard configuration
2024-04-22 15:17:14 +03:00
6ea0a570dd
systemd-networkd: match systemd-resolved configuration
2024-04-22 15:12:07 +03:00
dea732d15b
systemd-resolved: attempt to simplify configuration
2024-04-22 15:08:03 +03:00