47e51ee38b
firefox policy: use Quad9 ECS as TRR
2024-04-19 08:48:57 +03:00
39f2eb4f0f
chromium: add doh-cloudflare-secure.json, ECH notes
2024-04-19 08:24:29 +03:00
b248392e8a
systemd-resolved: think more on local resolvers or not
2024-04-18 14:31:56 +03:00
4c4508ba36
unbound/dot-*quad9.conf: add DNS10 & DNS12 (commented), remove extra spaces
2024-04-18 11:16:20 +03:00
9aa71de638
systemd-resolved/dot-quad9.conf: add commented DNS10 & DNS12
2024-04-18 11:08:23 +03:00
5097076daf
unbound: also disable qname-minimization for DNSo53 forwarders
2024-04-17 16:03:23 +03:00
363be56010
unbound: move to tls-ystem-cert from tls-cert-bundle & disable qname minimization for DoT forward-zones
2024-04-17 16:01:38 +03:00
bbab2f335d
resolv.tsv: sort
2024-04-17 15:42:34 +03:00
9ba083f81f
resolv.tsv: add Quad9 unfiltered variants
2024-04-17 15:42:08 +03:00
c18fe92ad8
etc/resolv.tsv: add Quad9 Apple Mobileconfigs
2024-04-17 15:34:43 +03:00
f10b151a3b
systemd: add firewalld.service.d/never-fail.conf due to failing to timeout on sedric
2024-04-17 11:38:43 +03:00
75c39ddb0d
sudoers.d/nordvpnd: include nordvpnd.socket
2024-04-16 08:39:16 +03:00
419805bc91
chromium/README: add forgotten files, fix description for those moved from recommended
2024-04-16 07:15:30 +03:00
a0456269a1
chromium: move brave feature disabling from recommended to managed for actual effect
2024-04-16 07:11:55 +03:00
36f433f35b
chromium/managed: add enable-labs.json
...
I have decided that I want it anyway and unlike before, now it has its own file so I can decide to leave it alone on shared devices
2024-04-15 21:08:56 +03:00
8c748dd2d6
unbound/dot-dns0-quad9.conf: fix duplicate forward zone
2024-04-14 14:23:58 +03:00
ac922aea86
{firefox,chromium}: add Floccus bookmarks sync so I will remember its existence
2024-04-14 14:10:39 +03:00
cd2ae2c852
etc/resolv.tsv: add Google DNS & DNS64 as they too are Android hard-coded for DoH3
2024-04-14 09:18:05 +03:00
cc25967b22
etc/resolv.tsv: note Cloudflare being DoH3 on Android, add Cloudflare antimalware/family DoT addresses
2024-04-14 09:10:06 +03:00
44c3168a39
chromium policy: strip DnsOverHttpsMode to two different files, rename automatic to allowed for clarity & update README.md on these
2024-04-13 18:38:26 +03:00
46ac8aefd8
unbound: add dot-dns0-quad9.conf
2024-04-12 17:01:32 +03:00
ab74e45a9f
chromium policy/brave-shields-disabled.json: add glowing-bear
2024-04-12 14:29:49 +03:00
b9d8da4df4
chromium policy. add brave-shields-disabled.json based on Privacy Badger
2024-04-12 14:26:31 +03:00
bf1fdc4cff
{firefox,chromium} policy: PB exclude Disroot Mvim, Microsoft {Teams,Learn}
2024-04-12 14:24:31 +03:00
b1a0125674
unbound: add local-tlds.conf
2024-04-12 14:16:10 +03:00
0d4c40ba16
systemd: mark systemd-resolved.conf to be conflicting with avahi-daemon
2024-04-12 10:58:15 +03:00
73865c747d
root-auto-trust-anchor-file.conf -> debian-root-auto-trust-anchor-file.conf
...
Let's not overwrite files accidentally
2024-04-12 10:56:51 +03:00
0bac3a8ab0
chromium: add doh-quad9.json
2024-04-12 10:42:51 +03:00
e88c2a8067
etc: attempt to enable mDNS/LLMNR for systemd-{networkd,resolved} & NetworkManager
...
Some boolean fixing slipped in as well
2024-04-12 09:52:32 +03:00
4d4dc026fd
unbound: ipv6.conf -> prefer-ipv6.conf
...
more descriptive name
2024-04-12 09:19:02 +03:00
a7bb2f5ec8
etc/iwd/main.conf: update comments on DNS
2024-04-11 10:16:21 +03:00
80ac65acd1
systemd-resolved/README.md: enable doctoc
2024-04-11 10:06:18 +03:00
cce932960e
systemd-resolved/README.md: mention nordvpn.conf
2024-04-11 10:05:18 +03:00
a2e36f2a3b
systemd-resolved/README.md: remove EOL Ubuntu, fix booleans, note my actual DNS config
2024-04-11 10:03:53 +03:00
da6eab8dfc
systemd-resolved: use true/false as booleans (not yes/no) & remove repeated localhost
2024-04-11 10:02:49 +03:00
3009af55a6
resolved.conf.d/README.md: mention 00-defaults and dot-something being supposed to be used together
2024-04-10 15:09:31 +03:00
9a210c4bba
systemd-resolved: further decrease repeating, comment DNS-Over-TLS since it's in 00-defaults.conf already (+ local resolver)
2024-04-10 15:06:14 +03:00
f12d0ceb8a
systemd-resolved: don't repeat cache
2024-04-10 15:02:30 +03:00
241405c776
systemd-resolved: merge unbound.conf into 00-defaults.conf
2024-04-10 11:59:36 +03:00
f885dcd73a
chromium/recommended: disable Tor in Brave
2024-04-10 11:21:52 +03:00
4cfd7ab75f
chromium: add recommendation of disabling Brave rewards & wallet
2024-04-10 11:18:42 +03:00
2282429f94
brave: use boolean for disabling vpn
2024-04-10 11:16:55 +03:00
149cadfa41
firefox & chromium: add IPFS Companion
2024-04-10 11:03:19 +03:00
d7879eeb6b
chromium: update README with the two new files
2024-04-10 10:53:37 +03:00
450aac4c32
chromium: add disable-brave-vpn.json
2024-04-10 10:51:38 +03:00
35e1faaabc
chromium: add doh-quad9-ecs.json
2024-04-10 10:51:15 +03:00
4a08068634
unbound/cache: serve-expired: yes
...
I am unsure on whether this actually affects anything without setting the other expired options too
2024-04-07 19:44:10 +03:00
b03218c78b
unbound/cache.conf: add prefetch & prefetch-key
2024-04-07 17:34:36 +03:00
c034e016e8
firefox policy: add search engine suggestion urls
2024-04-05 14:04:14 +03:00
99c63d25fe
{firefox,chromium} policy: add OpenDyslexic
2024-04-04 14:27:43 +03:00
08ae59ed99
firefox policy: configure Homepage
2024-03-31 08:46:12 +03:00
a581ee2dd5
rm etc/sysctl.d/99-enable-ipv6.conf
...
Refer to crontab, yggdrasil.service.d and nordvpn.service.d
2024-03-29 08:57:35 +02:00
323dde1545
{firefox, chromium}: force install privacy pass
...
This is in hopes of reducing family member frustation with captchas should they happen
2024-03-29 08:32:44 +02:00
1d05061bb4
hack nordvpnd to work with yggdrasil
2024-03-29 07:58:44 +02:00
9fb90d4b30
chromium/README: mention fix-edge-search.json
2024-03-28 18:57:29 +02:00
80df53aa6a
chromium: move edge policy from recommended searches to managed/fix-edge-search.json
2024-03-28 18:53:15 +02:00
c5dd75077d
chromium: throw home enabling & search engines into recommended policy instead
2024-03-27 16:51:29 +02:00
860970df78
etc/init-browser-policies.bash: note recommended policies
2024-03-27 16:43:17 +02:00
58df0709f4
firefox policy README.md: note that search engines also work on nightly
2024-03-24 08:17:31 +02:00
e823810723
firefox: add search engine aliases
2024-03-24 08:16:20 +02:00
4bab0cbb6a
firefox: default to Brave Search
2024-03-24 08:15:43 +02:00
7b80c2bbc2
chromium/aminda-extensions.json: remove DuckDuckGo Privacy Essentials
2024-03-23 12:46:49 +02:00
d241993c0a
chromium/aminda-extensions.json: remove blank new tab
2024-03-23 12:40:23 +02:00
4a2fc137db
chromium: handle Microsoft Edge new tab page Bing search
2024-03-23 12:36:30 +02:00
3d038bf826
chromium policy README.md: add missing/renamed files
2024-03-23 12:15:21 +02:00
b7acf2daaa
chromium policy: add brave-search.json
2024-03-23 12:08:07 +02:00
c8ece6032a
chromium/duckduckgo.json: policy for using start.duckduckgo.com for searching
2024-03-23 11:55:06 +02:00
405d407c2a
firefox: add Brave Search Goggles
2024-03-21 17:21:30 +02:00
3e56346be0
firefox: add Brave Search
2024-03-20 18:53:18 +02:00
cc6dbceaff
{firefox,chromium} policy: add UpdateSWH
2024-03-14 20:25:06 +02:00
39b0f1d19a
{firefox,chromium} policy: disable PrivacyBadger on Element Web instances
2024-03-13 11:45:19 +02:00
c2c7d401dd
sudoers.d: add teamviewerd
2024-03-13 09:07:25 +02:00
a6c2c28727
etc/yum.repos.d: add teamviewer.repo
2024-03-13 09:02:40 +02:00
0729b8b681
chromium policy: add Chrome Remote Desktop
2024-03-13 08:46:10 +02:00
be8e2d655e
aminda-extensions.json: fix allowed_url paths (paths unsupported, must not contain /*
2024-03-13 08:45:30 +02:00
7d48ac8a1a
sysctl.d/99-enable-ipv6.conf: workaround NordVPN
2024-03-12 17:55:32 +02:00
5c1dce8d36
{firefox,chromium} policy: explicitly configure PrivacyBadger
...
I think all of these default to true anyway, but explicit is better than implicit is what they say
2024-03-12 10:15:15 +02:00
cfe02d26be
chromiun: allow wayback machine to function on archive.org by default
2024-03-10 07:59:27 +02:00
e4304fd641
chromium: block uBlock Origin from Chrome/Edge stores to avoid conflict with AdNauseam force_install
2024-03-09 15:54:13 +02:00
e35c477a71
firefox policy: block uBlock & uMatrix to avoid conflict with force_install AdNauseam
2024-03-09 15:45:02 +02:00
685b14c2f6
firefox policy: block wayback machine
2024-03-09 15:41:39 +02:00
26ecc69156
chromium policy: add doh-mullvad-base.json
2024-03-09 10:52:54 +02:00
ee36e24997
Chromium policy: add blank new tab
2024-03-09 10:52:31 +02:00
3eb921f212
chromium: adjust runtime_allowed_hosts for DDG as per Edge's behaviour
2024-03-09 10:30:22 +02:00
d7244eefc5
aminda-extensions.json: click to run wbm
2024-03-08 11:19:07 +02:00
5149b23598
browser policies: add wayback machine
2024-03-08 08:41:41 +02:00
16d6a3df09
browser policies: install Bias Finder
2024-03-08 08:29:54 +02:00
0f23d25647
firefox policy: add offline-qr-code-generator
2024-03-04 12:29:45 +02:00
f2e8b86665
browser policies: remove AdNauseam advancedSettings
2024-03-02 16:26:47 +02:00
6029869230
browsers: force_install Privacy Badger again
...
While this isn't the recommended configuration, Privacy Badger has the
widget replacements, automatic learning (enabled by default as per
this policy), canvas protection etc.
AdNauseam again can replace NoScript (that I previously removed from
the policies for too aggressive for basic users) and fails to click ads
for me anyway, so I think this is the best option for me.
2024-02-29 11:22:29 +02:00
d242b05e76
browser policies: ship AdNauseam in filterAuthorMode
2024-02-29 08:56:59 +02:00
e343e80858
Weaken protection for Ad Nauseam since I am already so unique/fingerprintable
2024-02-28 20:55:46 +02:00
2d7539b0ed
browser policies: install AdNauseam
2024-02-28 20:04:08 +02:00
2e4744bc90
Don't install NoScript on browsers automatically due to being a bit extreme on unsuspecting family members after self-reflection.
2024-02-27 09:44:28 +02:00
5c3e5e29b3
browser policies: add Terms of Service;Didn't Read
2024-02-26 12:20:47 +02:00
8b0e28f417
firefox policies: also keep sidebery installed
2024-02-24 11:08:48 +02:00
2620f975fc
add etc/dnf/protected.d/
...
I am plotting switching to systemd-bootd in hopes of getting my kernel version unfrozen
2024-02-23 11:37:48 +02:00
3498e0d830
firefox. fix peertube-companion ID
2024-02-23 08:59:50 +02:00
4ff3705df0
firefox: force install peertube companion as a stronger stance against youtube centralization
2024-02-22 19:55:17 +02:00
6afb099d1c
chromium: don't enable the labs button
...
It has nothing that interesting and is just distraction.
2024-02-21 09:52:00 +02:00
c6304ca36a
chromium/doh-dns0: allow fallback to system dns
2024-02-21 09:51:20 +02:00
04be9339d5
Chromium: restrict DuckDuckGo to itself and google.com
2024-02-20 14:59:56 +02:00
4dbfd94d90
{chromium,firefox}: force install (& pin in Chromium) Snowflake too
2024-02-19 18:00:06 +02:00
303f69a671
firefox: actually force_install tab suspender
2024-02-19 16:45:36 +02:00
0f95863ea2
systemd/earlyoom.service.d: conflicts, never-fail & dynamicuser=false
2024-02-18 19:44:32 +02:00
52b2dd1e69
Chromium policy README.md: linkify extensions
2024-02-17 18:25:37 +02:00
11baf2e142
Chromium README.md: add TODO/Inconsistencies
2024-02-16 19:47:58 +02:00
a1056807bf
firefox: add peertubeify
...
as indiewiki buddy kind of opened the door for it
2024-02-16 19:41:45 +02:00
67ddd26f71
browser policies: include indiewiki buddy
2024-02-16 17:13:33 +02:00
fe8ac1bbb7
unbound: remove blocklists, deprecated by Browser Policy
2024-02-15 20:47:34 +02:00
398cf45bdf
add etc/systemd/oomd.conf.d/
2024-02-14 20:26:10 +02:00
f4423b251f
etc: add firefox-esr for Debian
2024-02-14 11:25:44 +02:00
22426e858c
firefox & chromium policy READMEs: links to upstream on top
2024-02-12 17:10:51 +02:00
c55b2a6aed
{systemd-resolved,unbound}: utilize unfiltered dns0 since nordvpn is unlikely to filter either
2024-02-11 13:37:32 +02:00
75d8833b03
firefox/policies.json: fix DDG Start Description & Method
2024-02-11 13:33:27 +02:00
75b938f3ce
firefox policies: restore pocket, searchengines
2024-02-11 13:23:04 +02:00
3b99fd30b7
Chromium policy README.md: note the PrivacyPass domains
2024-02-11 13:13:13 +02:00
2b45c13960
Chromium policy README.md: add forgotten NoScript
2024-02-11 13:11:37 +02:00
121aedd2ff
chromium: add noscript
2024-02-10 12:39:19 +02:00
d37d9e8019
firefox policies: add noscript
2024-02-10 12:34:52 +02:00
e4d223ab42
chromium: default unpin snowflake & silk
2024-02-08 10:54:05 +02:00
da0ab06fdf
chromium: install DuckDuckGo by default
2024-02-08 10:46:30 +02:00
7afdc0e046
firefox: install DuckDuckGo by default
2024-02-08 10:42:34 +02:00
6bd2acac6b
firefox policies.json: clean up advertisements
2024-02-08 10:31:31 +02:00
963f266dad
firefox: note that search engine policy is ESR-only
2024-02-08 10:15:26 +02:00
fa4395def9
firefox policies.json: add new tab suspender
2024-02-08 10:06:57 +02:00
3cd94522df
firefox policies.json: add extensions based on the Chromium one
2024-02-08 10:03:07 +02:00
e71446363b
firefox policy README.md: add link to documentation
2024-02-08 09:37:06 +02:00
4a849a8811
chromium: add Silk (Privacy Pass) & Snowflake
2024-02-07 17:07:54 +02:00
e7f137f282
chromium: rename policies to be in line with my unbound/resolved naming
2024-02-07 10:51:12 +02:00
c1af586c26
chromium README: quick explanations
2024-02-07 10:46:57 +02:00
5eab48fcd5
chromium README: sort aminda-extensions.json
2024-02-07 10:38:15 +02:00
0e26c96b39
chromium: add privacy-manager
2024-02-07 10:34:43 +02:00
ce175c5645
etc/init-browser-policies.bash: ln -siv
2024-02-06 11:43:45 +02:00
f4c796c5ed
etc: add quick script init-browser-policies.bash
2024-02-05 20:54:17 +02:00
e672d04d46
rm etc/install
...
Obsolete script that I don't ever remember using
2024-02-05 20:34:45 +02:00
8c11a1afce
brave policies
2024-02-05 19:06:35 +02:00
f0ee77fa05
add symlinks and README for Vivaldi policies as well
2024-02-05 18:58:50 +02:00
3c9a97ed2f
chromium/enable-ech-ocsp.json: additionally enable AdditionalDnsQueryTypesEnabled & BuiltInDnsClientEnabled
2024-02-04 10:29:41 +02:00
902f011468
chromium: add multiple mutually incompatible policy files
2024-02-04 10:21:10 +02:00
13a8956758
{resolved,unbound}/nordvpn: add dns0 in case it helps with automatic connection issues
2024-02-02 08:51:52 +02:00
8e1f947591
etc/opt: edge is chromium
2024-02-01 19:58:11 +02:00
82014c0c0c
etc/firefox/policies: add README.md
2024-02-01 19:48:27 +02:00
738ddcbfaf
firefox policies: add EnableTrackingProtection
2024-02-01 19:43:03 +02:00
f0fe1a93b2
firefox policies: add DoH
2024-02-01 19:36:26 +02:00
2c67c85786
rm etc/librewolf: it's not read and overrides LibreWolf customizations
2024-02-01 19:07:40 +02:00
f37ec89f3f
etc/firefox/policies/policies.json: initial commit (just PrivacyBadger and LibreAwoo symlink so far)
2024-02-01 18:50:13 +02:00
b53f8f6f52
chroium policy: default_unpin fedora user agent
2024-01-31 18:49:16 +02:00
e1eae5dd48
chromium policies: throw in Dark Reader and Bitwarden
2024-01-31 14:28:14 +02:00
7cb754def8
chrome policies: force_enable HttpsOnlyMode
2024-01-31 14:12:21 +02:00
23bcc0e908
test managed chrome profilies
2024-01-31 13:43:10 +02:00
bc39daa2ed
unbound/insecure-domains: add norwegianwifi.com
...
while it's unlikely for me to run unbound on flight
2024-01-27 13:09:14 +02:00
57ac0a8c7a
systemd: add nordvpnd.service.d
2024-01-27 10:20:55 +02:00
7c9aaef375
systemd/service.d: add iwd.conf & network-online.conf
2024-01-27 10:19:08 +02:00
58bc1dd726
systemd-networkd/wlan: comments for when iwd doesn't manage network
2024-01-27 10:18:18 +02:00
e9b77cbc05
etc/iwd/main.conf: disable network configuration
2024-01-27 10:15:54 +02:00
73604ae80f
systmed-timesyncd: add {google,facebook}.conf commented
2024-01-26 10:47:18 +02:00
cc76eb7d5c
timesyncd.conf.d/finland: add ntp.miuku.net
...
It would have NTS and this is hoping for systemd-timesyncd to support it one day
2024-01-26 10:44:55 +02:00
e3381049b5
systemd-timesyncd/hetzner: replace with individual servers
2024-01-26 10:43:07 +02:00
3b3f1c5193
chrony/ntppool.sources: add zone links to comments
2024-01-25 09:40:34 +02:00
e2e130ea5d
chrony/sources.d/hetzner.sources: replace pool with individual servers
2024-01-24 20:32:23 +02:00
ff1bc7b3ba
nts-servers.sources: no preferring non-ISP servers
2024-01-24 20:00:22 +02:00
e246d21038
chrony/sources: add the ntppool.sources although commented
2024-01-24 18:04:15 +02:00
48976cacce
chrony/sources.d: prefer ISP and CF
...
The ISP should be closest server to sync to and Cloudflare is anycast with
potentially lower stratum than the other nts servers. 'nts' implies 'require'
and 'trust' already and other servers get picked over lower stratum although
higher distance.
2024-01-24 10:57:52 +02:00
8a93a2a9ac
unbound: another accidental rewrite of nordvpn.conf, now with IPv6
2024-01-23 09:20:13 +02:00
e5fb27a15e
nts-servers.sources: System76 is actually not an NTS pool
2024-01-22 12:56:20 +02:00
9e0333908d
nts-servers.sources: bring the uncommented Finnish server closer to top
2024-01-22 12:53:53 +02:00
9c90a36069
chrony/nts-servers.sources: update System76 entries, increase their line numbers
2024-01-22 12:52:44 +02:00
7a2b36864b
systemd-resolved/nordvpn.conf: add what appears to be their IPv6
2024-01-20 12:41:21 +02:00
62fc911835
systemd-resolved: accidentally rewrit nordvpn.conf
...
Now accounting for precense of unbound as a maybe fallback resolver
2024-01-20 12:35:23 +02:00
7ec7937d2f
chrony: add ntp.miuku.net
2024-01-17 13:16:37 +02:00
ddbd1acca0
ssh: disable RSA host key
2024-01-12 13:50:49 +02:00
53c78384e0
etc/apt/sources.list: rm ubuntu*
...
Seems pretty outdated and I cannot see the purpose.
2024-01-07 12:33:53 +02:00
2b4487fccb
etc/sources.list.d: add untested nordvpn.list for the only Debian around
2024-01-07 12:29:49 +02:00
7748d64ad7
systemd: deduplicate qbittorrent, add qbittorrent-nox@.service overrides
2024-01-06 12:34:44 +02:00
86575ddd37
etc/sudoers.d/lecture: rewrite comment including superuser & serverfault links
2024-01-05 13:17:22 +02:00
0f5dceed49
etc/sudoers.d: add nordvpn
2024-01-05 12:56:06 +02:00
39dffa8939
systemd service.d: move common explanations from never-fail.conf to README.md
2024-01-04 12:35:48 +02:00
d99566d26f
systemd/service.d: add nordvpn.conf
2024-01-04 12:31:11 +02:00
8a73d0fd63
unbound.conf.d: add nordvpn.conf
2024-01-04 12:28:38 +02:00
aa97b82e31
systemd-resolved: add nordvpn.conf
2024-01-04 12:25:53 +02:00
8771c98645
etc/yum.repos.d/brave-*: remove unknown option autorefresh
2024-01-04 07:45:11 +02:00
09b64835f7
etc/yum.repos.d/nordvpn.repo: initial commit
...
I don't want to use their curlbash and I am considering a Revolut plan that would include their standard plan as well
2024-01-03 16:54:59 +02:00
bb60cbe8e6
yum/repos.d/librewolf-repo.repo: correct repo name
2024-01-03 16:53:38 +02:00
e4c6ff7569
etc/sudoers.d: add lecture for always giving the first time lecture
2024-01-02 10:54:53 +02:00
9a0895e412
unbound: merge dot-quad9-ecs.conf into dot-quad9.conf
2023-12-31 16:38:05 +02:00
dba9d4c908
unbound/dot-dns0-*.conf: merge to dot-dns0.conf
2023-12-30 15:46:22 +02:00
a6dd953817
etc/dracut.conf.d/10-asahi.conf: workaround F40 kernel update failures
2023-12-29 13:26:25 +02:00
feef4cbba5
bluetooth.service.d: clarify comments on tested distros & ponder name
2023-12-28 21:30:26 +02:00
be618810c5
bluetooth.service.d: drop fedora- from experimental.conf
2023-12-28 21:28:27 +02:00
f31cb882a5
practically rewrite etc/resolv.conf
2023-12-26 10:51:30 +02:00
9d69584103
Revert "systemd/service.d: add for-network-online.conf so the service is enabled for that"
...
This reverts commit 0dc32a525a
.
2023-12-25 21:26:10 +02:00
fc91247cd1
Revert "yggdrasil.service.d: also allow yggdrasil to start before network-online"
...
This reverts commit fbc82b81f4
.
2023-12-25 21:25:44 +02:00
68fc6be7b9
Revert "unbound.service.d: add the for-network-online.conf"
...
This reverts commit 6ba99feb58
.
2023-12-25 21:25:22 +02:00
85dbc413f0
systemd/system: write tlp-masker.bash instead of having symlinks to /dev/null
2023-12-25 17:27:30 +02:00
7d8fe8c1fa
systemd/system/README: attempt to fix formatting
2023-12-25 17:03:14 +02:00
0327162daa
systemd-resolved: double dnssec
2023-12-25 15:48:23 +02:00
f8f71d77a2
resolv.conf: add systemd-resolved default as a comment too
2023-12-25 15:40:41 +02:00
4286b4a22f
systemd: add start-unbound.service
2023-12-25 15:39:35 +02:00
fbc82b81f4
yggdrasil.service.d: also allow yggdrasil to start before network-online
2023-12-25 12:41:46 +02:00