|
e88c2a8067
|
etc: attempt to enable mDNS/LLMNR for systemd-{networkd,resolved} & NetworkManager
Some boolean fixing slipped in as well
|
2024-04-12 09:52:32 +03:00 |
|
|
80ac65acd1
|
systemd-resolved/README.md: enable doctoc
|
2024-04-11 10:06:18 +03:00 |
|
|
cce932960e
|
systemd-resolved/README.md: mention nordvpn.conf
|
2024-04-11 10:05:18 +03:00 |
|
|
a2e36f2a3b
|
systemd-resolved/README.md: remove EOL Ubuntu, fix booleans, note my actual DNS config
|
2024-04-11 10:03:53 +03:00 |
|
|
da6eab8dfc
|
systemd-resolved: use true/false as booleans (not yes/no) & remove repeated localhost
|
2024-04-11 10:02:49 +03:00 |
|
|
3009af55a6
|
resolved.conf.d/README.md: mention 00-defaults and dot-something being supposed to be used together
|
2024-04-10 15:09:31 +03:00 |
|
|
9a210c4bba
|
systemd-resolved: further decrease repeating, comment DNS-Over-TLS since it's in 00-defaults.conf already (+ local resolver)
|
2024-04-10 15:06:14 +03:00 |
|
|
f12d0ceb8a
|
systemd-resolved: don't repeat cache
|
2024-04-10 15:02:30 +03:00 |
|
|
241405c776
|
systemd-resolved: merge unbound.conf into 00-defaults.conf
|
2024-04-10 11:59:36 +03:00 |
|
|
c55b2a6aed
|
{systemd-resolved,unbound}: utilize unfiltered dns0 since nordvpn is unlikely to filter either
|
2024-02-11 13:37:32 +02:00 |
|
|
13a8956758
|
{resolved,unbound}/nordvpn: add dns0 in case it helps with automatic connection issues
|
2024-02-02 08:51:52 +02:00 |
|
|
7a2b36864b
|
systemd-resolved/nordvpn.conf: add what appears to be their IPv6
|
2024-01-20 12:41:21 +02:00 |
|
|
62fc911835
|
systemd-resolved: accidentally rewrit nordvpn.conf
Now accounting for precense of unbound as a maybe fallback resolver
|
2024-01-20 12:35:23 +02:00 |
|
|
aa97b82e31
|
systemd-resolved: add nordvpn.conf
|
2024-01-04 12:25:53 +02:00 |
|
|
0327162daa
|
systemd-resolved: double dnssec
|
2023-12-25 15:48:23 +02:00 |
|
|
91428c51af
|
systemd-resolved: git rm dot-nextdns.conf
|
2023-11-26 16:23:31 +02:00 |
|
|
1abfd94f01
|
systemd-resolved/dot-dns0: merge lines
|
2023-11-26 16:23:12 +02:00 |
|
|
b583b8a6d4
|
systemd-resolved/*.conf: add appliedprivacy DoTo443 as a comment
|
2023-11-26 16:19:55 +02:00 |
|
|
dee168e287
|
systemd-resolved: merge provider configs
|
2023-11-26 16:18:15 +02:00 |
|
|
fa3fc72afb
|
systemd-resolved: cleanup configs I don't recommend
|
2023-11-26 16:12:38 +02:00 |
|
|
e825c1dac3
|
systemd-resolved: dot-mullvad.conf: update domains, add commented other server options
|
2023-11-12 12:51:07 +02:00 |
|
|
60b3c620fb
|
systemd-resolved: rm dot-mullvad-adblock.conf
|
2023-11-12 12:46:35 +02:00 |
|
|
b6ecd1b173
|
systemd-resolved: keep DNSSEC enabled
|
2023-10-21 11:27:07 +03:00 |
|
|
90edac262a
|
resolved.conf.d: add dot-dns0-appliedprivacy.conf in style of quad9-ecs-appliedprivacy
|
2023-10-14 19:18:45 +03:00 |
|
|
1eeef2f511
|
resolved: add dot-quad9-ecs-appliedprivacy.conf for Steam Deck purposes
|
2023-10-01 19:06:46 +03:00 |
|
|
24eb3890c2
|
systemd-resolved: prefer IPv6 over IPv4
|
2023-09-10 11:16:57 +03:00 |
|
|
1e3a7f8fa3
|
systemd-resolved/dns-over-tls.conf: drop appliedprivacy#443 to the bottom of the list
Apparently systemd-resolved wants to go in strict order and thus it's always sending my queries to distant Austria instead of neighbouring regions
|
2023-09-10 11:10:39 +03:00 |
|
|
c7b5330dfb
|
systemd/resolved/dot: add missing bracket, remove extra ones
Apparently IPv6 must only be surrounded by brackets, otherwise it's invalid syntax
|
2023-09-10 09:52:59 +03:00 |
|
|
1d8e457f97
|
systemd-resolved: add dns-over-tls.conf mimicing unbound's equivalent
|
2023-09-10 09:31:35 +03:00 |
|
|
9bdc67dd29
|
unbound & systmed-resolved: add DNS0 open
Ref: #153
|
2023-02-23 10:11:03 +02:00 |
|
|
b39b5db0d4
|
run prettier on markdown again?
|
2023-02-21 19:33:31 +02:00 |
|
|
2e6a03d402
|
sastisfy editorconfig check
|
2023-02-21 19:08:54 +02:00 |
|
|
19994e3286
|
run prettier
|
2023-02-21 17:54:39 +02:00 |
|
|
4a20f75d3c
|
etc/systemd/resolved.conf.d: add DNS0 DoT configs
Their website already had the correct syntax for the entries
Ref: #153
|
2023-02-20 11:49:31 +02:00 |
|
|
82ef806e9f
|
systemd-resolved README: add quickstart, remove extra h-levels
|
2022-03-28 20:43:03 +03:00 |
|
|
17da76e484
|
systemd/resolved/README.md: add the ArchWiki DNSSEC issue links
|
2022-03-28 20:37:37 +03:00 |
|
|
f55c00dae6
|
systemd/resolved/README.md: add missing word, improve formatting
|
2022-03-28 20:36:11 +03:00 |
|
|
8c532e3ef8
|
etc…resolved…: add/clarify links in/to comments
Courtesy of https://wiki.archlinux.org/title/Systemd-resolved#DNSSEC
|
2022-03-28 20:34:37 +03:00 |
|
|
d47c374706
|
etc/ststemd/resolved…: aggressive cleanup/rewriting
|
2022-03-28 20:28:17 +03:00 |
|
|
4f50f4a367
|
systemd-resolved: don't DNSSEC with adblocking
|
2021-11-21 11:37:03 +02:00 |
|
|
12fe7a59a8
|
etc/systemd/resolved: add configuration for Mullvad DoT
|
2021-11-21 11:16:11 +02:00 |
|
|
a0c61231f4
|
systemd/resolved.conf.d: add snopyta-strict.conf
While posting an example how I would do it I might as well put it here
|
2021-02-10 16:12:42 +02:00 |
|
|
993759577e
|
Bind systemd-resolved to Unbound
|
2020-10-25 09:05:07 +02:00 |
|
|
1e70d7d4d7
|
etc/systemd-resolved&unbound: add Quad9 ECS configs
Untested. The last time I saw the documentation, they didn't mention
DoT.
|
2020-10-21 17:09:20 +03:00 |
|
|
31a15a9abc
|
systemd-resolved & unbound: update AdGuard IPs
Resolves: #81
|
2020-09-27 14:34:54 +03:00 |
|
|
82cf5e7742
|
systemd/resolved.conf.d: add generic NextDNS confs
|
2020-08-09 00:07:06 +03:00 |
|
|
73fb88e11d
|
systemd-resolved.conf.d: everywhere -> 00-everywhere
|
2020-07-24 12:16:31 +03:00 |
|
|
69f55cd724
|
systemd/resolved: adguard-strict -> adguard-dot
|
2020-07-18 14:05:36 +03:00 |
|
|
550b68d149
|
etc/systemd/resolved: add [adguard,cloudflare}-strict.conf
I am not actually using either though and I am not sure if I will,
but maybe they are nice to have as a backup here just in case.
|
2020-07-18 02:20:56 +03:00 |
|
|
b3cb953b9c
|
systemd/resolved: add a comment to everywhere.conf too
as every other file explains who it is for, why not this
|
2020-07-04 19:09:26 +03:00 |
|