Commit Graph

453 Commits

Author SHA1 Message Date
d539237fbf
unbound/blocklist.conf: add source 2019-08-17 13:43:11 +03:00
057d42bafd
unbound/dns-over-tls.conf: fix typo 2019-08-17 13:40:39 +03:00
914fe1d26c
unbound/dot: finish adding providers
Ref: #15
2019-08-17 13:37:02 +03:00
410a02a968
unbound/dot: add securedns (both), dnswarden (adblock) 2019-08-17 13:23:28 +03:00
a5ccd88e70
unbound/dns-over-tls.conf: add server locations
Ref: #15
2019-08-17 12:34:03 +03:00
596c18c0e0
etc/unbound: add blocklist.conf
Closes: #13
2019-08-17 12:16:53 +03:00
601bd3ac86
unbound dot: alphabetical order
Ref: #15
2019-08-17 00:52:41 +03:00
39493f3bf9
unbound dot: move things around 2019-08-17 00:26:36 +03:00
b3a7266eb5
unbound.conf.d/dns-over-tls: remove Google 2019-08-17 00:14:41 +03:00
c78eecb547
unbound/dns-over-tls: add two port 443 resolvers 2019-08-17 00:10:32 +03:00
4de337722e
etc/apt/preferences.d: add testing-debug & rename stable.donotuse
Resolves: #124 (see comment)
2019-07-30 01:08:09 +03:00
2112575a98
etc/apt/preferences.d: commit dark magic that shouldn't exist 2019-07-30 00:52:32 +03:00
a01e53171e
grub.d/sedric.cfg: comment that acpi_osi=Linux doesn't work 2019-07-28 10:45:04 +03:00
100d9a7433
dnscrypt-proxy.toml: move cache above & add comments & min cache TTL 300 2019-07-23 16:13:22 +03:00
55050ec0e5
cache.conf: increase NXDOMAIN cache size and set min TTL to 300 2019-07-23 15:09:34 +03:00
2b8a460b63
etc/unbound: add cache.conf 2019-07-23 12:30:53 +03:00
93fa7a003c
etc/default/grub.d: add beep.cfg & sedric.cfg
beep.cfg is the default example on getting a beep on grub startup,
sedric.cfg just contains `acpi_osi=` which fixes the hardware keys for
some reason.
2019-07-22 18:56:38 +03:00
97006ddf9b
unbound.conf.d/logging.conf: quote the fine manual for unbound.conf 2019-07-22 17:18:53 +03:00
222a030cee
unbound/dns-over-tls: note version requirement 1.7.3
Debian 9 has 1.6.0 with which I am stuck for now. Debian 10 has 1.9.0
2019-07-22 16:52:07 +03:00
29eae6f89a
etc/dnscrypt-proxy: note I run Unbound in front of it 2019-07-22 16:25:21 +03:00
eb6315d92f
resolv.conf: add Quad9 and note I am not sure what it tries to be
Public DNS resolver with easy address list for emergency?
2019-07-22 16:22:55 +03:00
430b9b7bfc
resolv.conf: note local resolver separately from dnscrypt-proxy 2019-07-22 16:17:27 +03:00
7b83f84633
unbound/dns-over-tls.conf: add AdGuard DNS
I am surprised it actually works with DNSSEC validation enabled
2019-07-22 16:12:09 +03:00
ffbbe9e522
unbound: replace forwards.conf with dns-over-tls.conf
Simultaneously rm puntcat, their DNS appears to be down at the moment
and I didn't find their own homepage.
2019-07-22 16:05:05 +03:00
6ed44de3d1
unbound.conf.d: clarify logging.conf in a comment 2019-07-22 15:27:27 +03:00
bb14632b9a
unbound: add another Debian default 2019-07-22 15:16:34 +03:00
3b9acff361
etc/unbound add unbound.conf & unbound-control.conf
copy-pastes from Debian & Arch Wiki, however unbound-control in status
no as I guess it can be a hole most of time.
2019-07-22 15:14:11 +03:00
5569a1129c
unbound.conf.d/dnscrypt-proxy.conf: update for dnscrypt-proxy v2
Closes #121
2019-07-22 15:12:49 +03:00
fc5fb4d7bd
b6a511d6a6: add comments 2019-07-20 11:37:28 +03:00
b6a511d6a6
etc: backup some apt.conf.d & preferences.d files 2019-07-20 11:09:42 +03:00
41f44924be
dnscrypt-proxy.toml: note 2.0.24 fastest -> first 2019-07-14 18:36:31 +03:00
117801ec9d
dnscrypt-proxy: fix comments
Resolves: #120
2019-07-14 18:15:35 +03:00
646956b4e0
dnscrypt-proxy.toml: restore Quad9 examples
Rbtpzn was using them for some reason and was hitting less errors than
Zaldaryn in as basic test as "apt update", so I guess it's worth having
it included. I think I am mainly leaving it for family devices.
2019-07-14 13:30:29 +03:00
a5868f6395
etc/sources.list: update testing for bullseye & add note to stable for it
> over the last years we had people getting confused over <suite>-updates
> (recommended updates) and <suite>/updates (security updates).  Starting
> with Debian 11 "bullseye" we have therefore renamed the suite including
> the security updates to <suite>-security.

https://lists.debian.org/debian-devel-announce/2019/07/msg00004.html
2019-07-14 12:40:56 +03:00
2fe92afa26
etc/apt/sources.list: change keyserver
Ref: #119

I am not sure I would advice running that even if it happened to exist.
2019-07-01 11:50:26 +03:00
128f1781f3
torrc-client: add MapAddress for PirateIRC & freenode
Closes #118
2019-06-30 14:27:20 +03:00
a915db9f8a
etc/systemd: tor-services: add ExecReload
I am running `systemctl restart tor-client` too often to be comfortable.
2019-06-30 14:11:34 +03:00
bf3b91d93a
torrc-client: update from running config
Preparation to #118
2019-06-30 13:31:16 +03:00
5128e8646a
ipfs.service: use dht routing instead of dhtclient routing 2019-06-11 01:17:22 +03:00
85bd70f382
etc/systemd/system/ipfs: important notice for VPS/dedi/etc. 2019-06-11 01:12:28 +03:00
6ce553f84e
dnscrypt-proxy: fix cloudflare excluding 2019-06-02 22:30:49 +03:00
540798ed17
dnscrypt-proxy: use Socks Authentication 2019-05-22 12:01:34 +03:00
b96eb372d0
torrc-client: ensure IsolateSOCKSAuth & add HTTPTunnelPort 2019-05-22 11:58:05 +03:00
3eefbaf296
etc/tor/torrc-onehoponion: CookieAuthFile 0 2019-05-17 18:54:34 +03:00
7dbafe4a54
resolv.conf: more comments 2019-05-16 15:28:15 +03:00
21adba9a02
dnscrypt-proxy.toml: update ~~stories~~ comments 2019-05-15 10:48:11 +03:00
e972a47d4a
torrc-client: add SocksPorts and comment on two guards
I need unisolated port for dnscrypt-proxy which I fear would otherwise
generate too many circuits which wouldn't even be used and I guess
there is no harm in sending Yggdrasil to a separate port that only has
access to onions which is a port I may sometimes wish I have otherwise
too.
2019-05-15 10:31:47 +03:00
95bcf095df
VerifyHostKeyByDNS is supposed to be yes
fix previous commit, I imagine I changed it by accident.
2019-05-11 00:58:00 +03:00
e634ee8863
ssh_config: update comment for VerifyHostKeyDNS
OpenSSH is evil and gives you three not-optimal options to this:

A) trust DNSSEC and don't write known_hosts
B) ask whether to trust DNS, but don't bother telling me if it's signed
C) don't even check SSHFP

I see A) as the least evil, but I wish known_hosts was written.
Alternatively B) should tell me whether there is DNSSEC or not, not
only "matching keys found from DNS" or whatever it says always.
2019-05-09 18:44:36 +03:00
9e03598e3f
etc/apt/sources.list: add missing tor+ for Debian 2019-05-09 14:05:54 +03:00
0ce3c5f47a
dnscrypt-proxy: adjust sources, add prefixes 2019-05-07 00:55:07 +03:00
f978853d11
dnscrypt-proxy.toml: add onion resolvers 2019-05-07 00:23:51 +03:00
d2bd2be652
systemd/zeronet.service: use Python 3 & always use Tor 2019-05-05 20:28:14 +03:00
d8ba42bdd1
etc/tor: disable control, document enabling for client 2019-05-04 20:41:18 +03:00
8e01a42c62
etc: systemd & tor: add tor-onehoponion (and torrc-relay) 2019-05-04 17:26:57 +03:00
c726daa62c
etc/tor/torrc-client: add comments 2019-05-04 16:55:08 +03:00
b0ef3a18f6
torrc-client: remove deprecated ClientPreferIPv6DirPort comment
> The ClientPreferIPv6DirPort option is deprecated, and will most likely be removed in a future version of Tor. It has no effect on relays, and has had no effect on clients since 0.2.8. (If you think this is a mistake, please let us know!)
2019-05-04 16:28:58 +03:00
9c8cf613cd
etc/systemd: add tor-client.service & tor: add torrc-client 2019-05-03 12:31:33 +03:00
4c2b21bbfa
ipfs.service: add routing note 2019-05-01 23:30:12 +03:00
ce84c26bcd
ipfs.service: adapt lowpower profile & mention badgerds
If the lowpower option uses values 40 and 20 which are a lot higher than
mine were and considered suitable for laptops and smartphones, I guess
they are the best for me to use and I find content faster.
2019-04-23 13:51:18 +03:00
6981481c77
ipfs.service: add options I forgot before 2019-03-26 22:26:25 +02:00
3ecfc2473d
ipfs.service: document my IPFS config
Closes #111
2019-03-26 22:05:52 +02:00
a90243a55a
dnscrypt-proxy.toml: use Quad9 while waiting for disabled_server_names 2019-03-26 10:12:57 +02:00
466a7bc2c1
etc/systemd/resolved.conf.d: add some configs
These aren't seeing real world usage though as the only host not running
dnscrypt-proxy has too old systemd.
2019-03-25 13:41:23 +02:00
f336393db9
systemd preset: enable pcscd for FINEID 2019-02-28 13:00:42 +02:00
81fcfb539d
systemd preset: Zaldaryn additions 2019-02-28 12:17:07 +02:00
758d4302ac
systemd preset: remove cjdns, enable ssh.service 2019-02-28 12:10:14 +02:00
284a50288c
sysctl.d: document privacy extensions & use double # for comments 2019-02-26 20:32:08 +02:00
cc0f5db3bd
dnscrypt-proxy: use dns.watch#2 as fallback reslver
84.200.70.40
2019-02-25 11:06:49 +02:00
07ae3bbef6
etc/sudoers.d/hibernate: allow suspend & change group to plugdev
It seemed like a suitable one from the default groups Debian creates.
2019-02-18 20:07:36 +02:00
d406334560
systemd preset: enable TTY & cups 2019-02-17 21:07:10 +02:00
5fe9477c55
etc/systemd: add ipfs.service & zeronet.service
Closes #101
2019-02-12 20:32:40 +02:00
993d3f6994
systemd preset: enable yggdrasil-resume 2019-02-08 10:21:14 +02:00
0afc716ccf
Partially revert f7fbf35109
That was just too evil, especially as the line has moved to my i3wm
config where nothing else I have tried works.
2019-02-04 20:33:31 +02:00
518c9fcdaf
i3: add hibernation & sudoers.d: allow passwordless hibernate 2019-01-30 20:12:38 +02:00
f7fbf35109
update setxkbmap and hope no one else is using these files 2019-01-30 19:16:45 +02:00
d29a0532d2
Debian sources.list: disable http security, use https CDN & Tor 2019-01-23 10:18:35 +02:00
d27cc15888
add systemd-preset 2019-01-21 18:41:36 +02:00
3e5e55bf75
etc/apt/sources.list: enable Debian debugsym repos
It seems that I am always going to enable it sooner or later anyway, so
why woulnd't I have it enabled for quick installing when I do need it?

Example: KDE Connect crashed on login, and asked me to report it, but
the reporter app warned that there is no address to report it and debug
information had one or two stars and said that it's likely bad quality
and I think this is due to missing debug symbols which I then installed.

Naturally after installing them, I am unable to reproduce the issue, but
that is beside the point.
2018-12-19 11:48:32 +02:00
5c6c026226
hosts-mikaela.txt: alternative domain for Korsin 2018-12-15 20:57:43 +02:00
c80591d9a7
hosts-mikaela.txt: add Korsin 2018-12-15 16:56:36 +02:00
08bfdde7c8
etc/dnscrypt-proxy/hosts-mikaela: add two cwinfo servers 2018-12-10 12:10:41 +02:00
7695b26abf
etc/dnscrypt-proxy: update README.md
The situation has changed a bit and I had forgotten to add links.
2018-12-03 12:22:58 +02:00
9be5b35b32
dnscrypt-proxy: use syslog, cert_refresh_delay
I happened to wonder about reload times and think that this is nice to
have visible here.

Syslog is used by default and I am expecting it so it probably won't
hurt being visible.
2018-11-29 11:30:28 +02:00
b7017d7c50
dnscrypt-proxy: update comments, lb_strategy = p2
Removed my weird comment and added refresh_delay to OpenNIC. I am using
p2 instead of ph as per the wiki as apparently they don't consider
balancing queries over multiple services as important as speed, so maybe
I don't have to worry about that either.
2018-11-29 11:23:05 +02:00
b6bb15a198
dnscrypt-proxy.toml: add commented OpenNIC
It's waiting for me to make up my mind about it and whether or not I
support it. I have mixed feelings/thoughts about it and will need to
read more.
2018-11-27 20:04:12 +02:00
2d3b324d9f
dnscrypt-proxy.toml: add mirrors of public-resolvers.md 2018-11-27 20:01:35 +02:00
8497d4fb84
dnscrypt-proxy.toml: enable require_nolog
Learning that I don't have to specify servers there is a lot more
variety even if I start requiring more things, as Sedric says to
see 33 live servers, I guess dnscrypt servers in general respect
privacy. However I guess I still have to trust on what the servers
say as AFAIK dnscrypt-proxy is only that, a proxy, and won't start
validating dnssec by itself.
2018-11-26 23:43:39 +02:00
32b1fd4a9a
dnscrypt-proxy.toml: disable logging & put it where it belongs 2018-11-26 17:01:30 +02:00
397821db0a
dnscrypt-proxy: -empty lines +cloaking_rules
dn#
2018-11-26 16:53:47 +02:00
c8fb2b896a
dnscrypt-proxy.toml: sort the options and add/update/fix comments
Now the options that I am more likely to care about or want to adjust
are on the top.
2018-11-26 16:46:30 +02:00
eecb4a980d
dnscrypt-proxy: add commented not-socket 2018-11-26 16:12:02 +02:00
c3c8a41e43
dnscrypt-proxy.toml: comment server_names 2018-11-26 16:03:02 +02:00
c8c342ec68
hosts-mikaela.txt: add tezagm 2018-11-26 15:46:52 +02:00
4f99f6ebed
syncplay-server.service: ccxcz's endpoints ExecStart just in case 2018-11-24 20:36:17 +02:00
c57d5443ab
add systemd unit for syncplay-server 2018-11-23 17:23:38 +02:00
33db566a27
sources.list: Debian updates repo over Tor 2018-11-22 20:39:22 +02:00
a47018899d
sources.list: rewrite the Debian ones?
Apparently I had been negleceting one important one, if not more.
2018-11-22 20:27:40 +02:00
6419ce29fb
sources.list: add Debian onion repos (commented) 2018-11-22 20:00:33 +02:00
f050ef9550
sources.list: add Debian debug repos (commented) 2018-11-22 19:34:11 +02:00
7983975ba8
etc/apt/sources.list: remove README & scripts
They don't reflect what I am doing in reality and I think they possibly
encouraged bad practices, so it's better that they don't exist here.
2018-11-22 19:14:42 +02:00
b0c6e5ffb2
hosts-mikaela.txt: add itwjyg 2018-11-15 11:54:49 +02:00
6e9af60c0f
hosts-mikaela: add ano & jasan, fix formatting? 2018-11-02 16:02:02 +02:00
fd8b734e56
hosts-mikaela: cleanup 2018-11-01 16:15:23 +02:00
a15ff2e5dc
more hosts-mikaela.txt updates
* add invictus, it's not mine, but neither are roubaix (dnscrypt-proxy
dislikes dashes?) and this file is meant for just my use, so does it
matter what it contains?
2018-10-30 23:39:41 +02:00
f27ce8fd82
hosts-mikaela: add roubaix-fr 2018-10-30 16:19:26 +02:00
c7ffb18523
hosts-mikaela: add rbtpzn 2018-10-30 09:12:33 +02:00
e7d2b312ef
hosts-mikaela: add zaldaryn
TODO: add to DNS
2018-10-29 21:40:31 +02:00
a83e8dce36
etc/resolv.conf: add dnscrypt-proxy & searches
mikaela.internal that I have adopted and I have no idea if I am allowed
to use TLDs here, but I am putting local there anyway.
2018-10-26 22:48:38 +03:00
859cc89436
dnscrypt/hosts: adopt .internal
At the moment I am having problem with mikaela.info being in HSTS
preload list and when I begun this list, I was hoping to use something
conflict free and thought that mikaela.info would be the least bad
choice while reading the reserver domains.

Now I have searched on the issues more and encountered .internal TLD
that seems to be what I am after and I hope it will become official.

https://github.com/wkumari/draft-wkumari-dnsop-internal

I think I can change these addresses safely as I am not using them
anywhere as I worry about accidentally sending them to the internet and
that opening new problems. This will mainly benefit me with web
browsers, I hope.

I will still have to link other people to direct IPv6 addresses that
won't change with the platforms I use or mikaela.info will not be in the
HSTS preload lists at time I need it. I wouldn't memorize IPv4 addresses
though or start telling them someone in quick chat.
2018-10-26 22:38:59 +03:00
5ac7dc9670
hosts-mikaela: add y.silta.piraatit.fi 2018-10-23 11:32:20 +03:00
3d6dccbfc0
hosts-mikaela.txt: add y.vietnam.mikaela.info 2018-10-22 18:43:50 +03:00
87f4305e71
etc/dnscrypt-proxy: add hosts-mikaela.txt
Closes #93
2018-10-18 19:57:00 +03:00
534f34a5bc
add override.conf for tor.service for allowing binding to 80/443
It took me some time a few days ago to figure out this (and notice that
port 80 was already used by automatically installed Apache that was
doing nothing).

I have understood that ports 443 (Orport) and 80 (Dirport) are the best
for users behind strict firewalls especially if they aren't needed for
anything else on the system running Tor relay.
2018-10-12 23:10:48 +03:00
492cac7158
Revert "ssh_config: controlpersist auto instead of on"
This reverts commit 330e8a80ad.

I got complaining about bad value
2018-10-11 13:45:31 +03:00
fa007ee830
dnscrypt-proxy: add quad9 nofilters, lb ph
See that #92
2018-10-09 14:08:38 +03:00
5d2b138b3e
dnscrypt-proxy: more thinking for #92
* Comment that the fastest server is automatically picked.
* Explicitly don't filter AAAA requests.
* Require provider to not do filtering
    * which is implied by DNSSEC which would get broken.
* Use Google DNS B as fallback resolver and explain what it does in
  comment.
* Add commented options for using Tor.
2018-10-08 20:43:30 +03:00
4e52673b7d
etc: rm -r polipo/
Polipo is no longer maintained and it seems that I am doing the same
thing with Privoxy except censoring accept-language which I need to
investigate. I think Privoxy warned about changing headers possibly
making ones fingerprint more unique and thus trackable? But aren't those
also going inside https so maybe there is no point?
2018-10-08 20:27:17 +03:00
d1151aaf8c
etc/systemd: rm -r dnscrypt/
Dnscrypt-proxy appears to handle multiple servers by itself nowadays and
does it in the config file. The servers listed may also be down.

Ref: #92 where I remembered these files still being here.
2018-10-08 20:25:09 +03:00
44cbf89582
etc/dnscrypt-proxy: prefer CF-v6, add G, fallback OpenDNS
This still needs more thinking... #92
2018-10-08 20:18:48 +03:00
44ac6ff573
resolv.conf: add single-request-reopen to options
It's in dnscrypt-proxy documentation for putting into resolv.conf
2018-10-07 21:20:41 +03:00
330e8a80ad
ssh_config: controlpersist auto instead of on
just in case that would be used for tracking and hoping that SSH is
clever enough.
2018-10-07 21:12:08 +03:00
b8bda9cf49
ssh_config: use more private ControlPath 2018-10-07 20:54:41 +03:00
ae04839807
add etc/dnscrypt-proxy.toml (WIP!) 2018-10-07 13:45:45 +03:00
63027a97a7
etc/privoxy/config: example to Torify everything 2018-10-06 16:41:20 +03:00
06d5ff55d0
etc/systemd/system: add cjdns/ 2018-10-05 13:27:35 +03:00
35f12ae35c
etc/privoxy/config: toggle 0, buffer-limit 51200 2018-10-03 16:18:27 +03:00
c2fda6d7fc
etc/privoxy: add minimalistic config 2018-10-03 13:37:52 +03:00
930be20983
etc/sources.list/: use https://deb.debian.org
Apparently they have deprecated httpredir while I wasn't looking.
2018-09-20 13:39:51 +03:00
55018ef7ef
etc/sources.list: remove Debian codenames 2018-09-20 13:37:32 +03:00
b2f590f357
etc/sources.list: rm EOL distributions 2018-09-20 13:35:59 +03:00
4877b2e45b
etc/resolv.conf: add notes for nm-connection-editor 2018-08-10 17:18:33 +03:00
9f13a96513
sources.list: add 18.04 (copy from 16.04) 2018-04-30 17:25:48 +03:00
446c5c14ab
sysctl: don't touch vm.swappiness
I think my distribution is more capable of choosing a reasonable value
and I am not confident in understanding it enough.
2018-04-20 12:32:46 +03:00
537fc06dd7
etc/resolv.conf: update based on note to self
I have no idea why I even have this file :(

I guess the number four has something to do with Windows as resolv.conf
actually doesn't take more than three, am I preparing for situation
where there is no network, but ISP DNS is down or something? Why? When has
that actually happened?
2018-04-19 14:46:25 +03:00
73d3d51377
move compose key to menu (from lwin)
Closes #90
2017-09-18 22:06:11 +03:00
36b1544606
dnsmasq: I don't care about breaking OpenDNS
OpenDNS should care about breaking me.
2017-01-12 12:54:52 +02:00
61296f1cea
NetworkManager: mess .conf more, add .conf.arch 2016-12-14 12:04:35 +02:00
d17a1d936b
NetworkManager: add dnsmasq.d/mikaela.conf
I want DNSMasq to behave a little differently from the NetworkManager
defaults.

The default cache size of 150/400 seems a little small and 10 000 probably
won't be full soon and I am sure modern systems at least at home where I
am using dnsmasq again won't suffer from it.

By default dnsmasq started by NEtworkManager only listens on 127.0.0.1
while ::1 also exists, I want it to be also listened on in case anything
decides to try querying with it.

DNSSEC is not checked by default while I want that behaviour, but as I
am using OpenDNS I cannot make it verify unsigned zones are unsigned :(

Also add symlink to trust-anchors.conf that should ship with DNSSEC to
avoid having to deal with it manually. It should work as a reminder that
it's also needed.
2016-12-14 11:54:48 +02:00
1ba8dd4137
systemd: snapd.refresh.service override
It fails on laptops thanks to not being able to do DNS resolution thanks
to network connection not existing during boot.

Now it fails to `Download snap "ubuntu-core" (423) from channel "stable"
(cannot authenticate to snap store: Provided email/password is not
correct.)` which is process and appears to not be my issue.
2016-12-13 19:30:32 +02:00
56de53ee30
systemd: only override issues with stock units
Only oidentd.socket and miredo.service were copied instead of being
units that exist in the system and they don't need to do anything
else than fix the issue I have with the stock units.

* oidentd.socket is IPv6-only on my systems unless is BindIPv6Only=both.
  because of net.ipv6.bindv6only=1
* miredo.service is here because it starts before there is network
  connection (network-online.target) and there is never network
  connection with laptops before they are connected to WLAN even if
  NetworkManager might be up seeking/connecting to network.
2016-12-13 19:22:26 +02:00
0925e0d23e
somewhat rewrite etc/resolv.conf 2016-12-08 11:13:22 +02:00
2151d9b602
etc/resolv.conf: add commented OpenDNS just in case
And possibly helpful comments, I wish they started doing DNSSEC.
2016-11-29 10:44:25 +02:00
314a03ee24
sysctl: increase vm.swappiness to 10 2016-07-25 17:01:12 +03:00
299b5ce108
redshift: use coordinates of Lauttasaari 2016-05-17 21:28:43 +03:00
6b6cefb9cd
export XCURSOR_DISCOVER=1
Workarounds invisible cursor issue and I think it doesn't hurt even when
that issue isn't encountered.
2016-04-15 21:15:06 +03:00
e99cffb130
sources.list: 16.04.archive.ubuntu.com
This shouldn't be used, but this is the only working way through "hash
sum mismatch".
2016-04-14 09:05:38 +03:00
f91e9c6a2b
ydns-simple --> ydns6 2016-04-11 15:34:28 +03:00
bdc742b728 NetworkManager.conf: add captive portal check 2016-03-31 15:41:37 +03:00
070f879946 etc/xdg/autostart: add chromium & chrome 2016-03-15 11:13:23 +02:00
36b99e8679 sysctl: enable Magic SysRq key 2016-03-03 16:12:33 +02:00
f2451906ce etc/NetworkManaer/NetworkManager.conf 2016-02-04 12:00:25 +02:00
c772dd308f sysctl.d: 40-ipv6.conf 2016-02-04 11:45:03 +02:00
9a662594d2 Fix #87 (explain ssh_config UseRoaming no) 2016-01-14 20:37:51 +02:00
bbfb63dabd unify the two ssh_config files (fix typos) 2016-01-14 16:59:18 +02:00
9d5db7ee3c ssh_config: add "UseRoaming no"
https://twitter.com/msfriedl/status/687635945642967040
2016-01-14 16:47:30 +02:00
e80dbd29fe etc/nginx/host: enable http2 2016-01-13 12:05:35 +02:00
d903ba5985 sshd_config: no instead of No
Permitrootlogin had it for some reason and Jolla's sshd didn't like it.
2016-01-06 10:17:33 +02:00
f1817f4014 sources.list: I don't maintain devel 2015-12-28 14:50:21 +02:00
c0503fab51 sources.list/ubuntu: fix apt-key command 2015-12-28 14:48:31 +02:00
fb9961be7b unbound.d/logging.conf: I need verbosity 2
1 doesn't seem to tell me when things start randomly failing.
2015-12-18 11:37:47 +02:00
8804f7e9f6 etc/unbound/unbound.conf.d: logging.conf
Logging to systemd-journald (journalct) with verbosity 1.
2015-12-18 09:52:18 +02:00
a187ae584d profile: numlockx on 2015-12-15 20:06:23 +02:00
2dce923a56 etc/apt/sources.list: commented Ubuntu MATE 2015-12-15 18:11:50 +02:00
8342c97bc2 git rm 15.04 2015-12-15 18:07:34 +02:00
9431381b93 sources.list: add Ubuntu 16.04 2015-11-06 09:14:27 +02:00
f58977d151 unbound forwards.conf: add commented trex dns64 2015-10-26 08:58:36 +02:00
50d27ca7b6 etc/xdg/autostart: add clipit 2015-10-25 14:30:42 +02:00
4257dcfb37 etc/xdg/autostart/redshift: add comment on Kotka 2015-10-25 14:27:06 +02:00
2154ee9b01 etx/xdg/autostart: cleaning 2015-10-25 14:26:24 +02:00
a5ca47e88d nginx: X-Xss-Protectio & -Content-Type-Options
via https://securityheaders.io/ via znc/znc#1168
2015-10-25 09:18:34 +02:00
47eac3b6eb sources.list README: add wget method 2015-10-17 14:31:48 +03:00
650829aea9 nginx: add Upgrade Insecure Requests
http://caniuse.com/#feat=upgradeinsecurerequests
2015-09-23 17:50:11 +03:00
02f4f2f0d4 profile.d/mikaela.sh: set TZ to $(date +%Z)
Also remove the commented Steam thing as it's Antergos-only issue.
2015-09-13 10:46:38 +03:00
c42ae8eb43 ssh: also send EDITOR 2015-09-12 11:45:42 +03:00
fdf8255372 ssh: send/accept also TZ TERM 2015-09-12 11:42:44 +03:00
0f00443a7b sshd_config: mention the LC_ALL anyway
my config files are horrible, too many comments.
2015-09-06 18:42:36 +03:00
96ca38818f sshd_config: don't talk so much about locales 2015-09-06 18:40:02 +03:00
801e3e0941 sshd_config: AcceptEnv LANG, LANGUAGE LC_*
but not LC_ALL and there is no asterisk, the varibles are allowed
separately. It's very unlikely that someone invents a new locale type.
2015-09-06 18:36:48 +03:00
a3d5fbd9d7 sshd_config: http://serverfault.com/a/660325 2015-09-06 18:27:50 +03:00
a0352630fd sshd_config: verbose logging of sftp 2015-09-06 17:37:34 +03:00
8d55bc53db sshd_config: use internal sftp & fixes
thanks again @grawity
2015-09-06 17:20:12 +03:00
c82b706942 fix 7470403158
thanks @DarthGandalf and @grawity on #znc
2015-09-06 17:13:21 +03:00
7470403158 sshd_config: add Fedora & Gentoo sftp-server
thanks Conjuro and @DarthGandalf on #znc
2015-09-06 17:09:55 +03:00
774346c8d0 fix sshd_config 2015-09-06 08:42:29 +03:00
68c6da5aec ssh_config: fix comments 2015-09-06 08:15:17 +03:00
dc9f8b0ab5 sort sshd_config 2015-09-06 08:12:41 +03:00
c3f351d21f sshd_config: add commented AcceptEnv
and reason why it's commented, security, ShellShock worked with remotely
sent environent variables even with restricted accounts.
2015-09-06 07:33:32 +03:00
90c86466dd ssh_config: also sendenv LANGUAGE 2015-09-06 07:30:41 +03:00
6fc4b6a29b ssh_config: add missing dot 2015-09-05 23:50:31 +03:00
28c2f0b8d8 ssh_config: SendEnv LANG LC_* 2015-09-05 23:46:00 +03:00
c50516ced3 etc/xdg/autostart: add redshift-gtk 2015-09-05 22:57:45 +03:00
c2b93abe27 relevant systemd services: after network-online 2015-09-05 09:07:41 +03:00
bd3ee60e61 ssh_config: fix paste fail 2015-09-02 08:33:02 +03:00
66f604a6dd ssh_config: add UpdateHostKeys yes 2015-09-02 08:15:16 +03:00
c05b52354f sshd_config: restore Client*
I am sure I committed them already, but they have disappeared somewhere.
Maybe I accidentally overwrote them.
2015-09-01 17:37:33 +03:00
888686ef48 etc/ssh/copy: add verbosity 2015-09-01 17:32:56 +03:00
c2c0c4fa08 etc/ssh: add copy script 2015-09-01 17:31:42 +03:00
25bf96e30a ssh_config: my ssh key is not system-wide 2015-09-01 17:16:37 +03:00
96dfc06668 ssh_config: remove unrelated comments 2015-09-01 17:06:33 +03:00