652c11391f
unbound/cache.conf: explicitly set serve-expired-reply-ttl to 30
2024-04-27 16:52:39 +03:00
d3773468fa
chromium/policies: add doh-{disabled,google}.json
2024-04-27 16:18:40 +03:00
a083a9d704
unbound/cache: comment cache-min-ttl=900, add commented 3000
2024-04-27 15:42:29 +03:00
30a27f980d
unbound/cache.conf: RFC 8767ish configuration
2024-04-27 15:00:12 +03:00
813878a4de
systemd/{iwd,systemd-networkd}.service.d: add appropiate symlinks
2024-04-27 12:25:00 +03:00
c59fe1ae53
sudoers.d/nordvpnd: also allow restarting tor-client.service
...
I have a suspicion I am adding it to the script sooner or later
2024-04-27 12:21:07 +03:00
ef9c4acfc3
sudoers.d/nordvpnd: also allow restarting Tor
2024-04-27 12:10:15 +03:00
955e52f5af
yum.repos.d: add google-Chrome.repo to workaround their crontab disliking my system
2024-04-27 10:21:20 +03:00
8fe7ff55e6
chromium: add managed black-theme-colour & recommended apps-as-homepage, disable-default-browser-check
2024-04-27 10:08:43 +03:00
b76b7cac5c
systemd/user: review vpn wants, rm transmission-daemon copy-paste
2024-04-27 08:34:46 +03:00
2113b593e7
Chromium & Firefox: force Bitwarden (for passkeys)
2024-04-27 08:32:39 +03:00
da85d0d9c7
firefox & chromium: allow PrivacyPass attestor & Keyoxide.org
2024-04-27 08:31:05 +03:00
61dc3706ab
systemd/{chrony,i2pd,yggdrasil}.service.d/mullvad-exclude.conf: fix mistakes and Requires=
2024-04-26 17:43:37 +03:00
1b64bc5e13
systemd/service.d: fix typo & use Requires= where appropiate
2024-04-26 17:38:33 +03:00
db7de1c3e4
systemd/service.d/unbound-wanted.conf: break circular skipping by removing After=
2024-04-26 17:35:31 +03:00
7f410148e3
aminda-nocron-rebootish.service: repeat that dns should be running
2024-04-26 16:13:39 +03:00
1d7308e74e
unbound: explicitly enable ede and it's log
2024-04-26 13:53:50 +03:00
2f585209e7
matterbridge-cleanup.timer: use more human friendly term minutely on OnCalendar=
2024-04-26 13:21:20 +03:00
65f58dc224
systemd: aminda-nocron-rebootish.{service,timer} is a delayed variant of -ish
2024-04-26 13:16:33 +03:00
c55b20a89a
move systemd user units from conf/systemd/user to etc/systemd/user
...
symlink remains to show what is the correct location
2024-04-26 13:05:08 +03:00
b36fe67bc3
systemd/user: attempt to flatpak-update-user.{service,timer}
2024-04-26 13:03:05 +03:00
b8f720fa7f
aminda-nocron-reboot.timer: fix typo in comment
2024-04-26 12:48:47 +03:00
9e38fdf223
aminda-nocron-reboot.timer: add RemainAfterElapse=false
2024-04-26 12:37:55 +03:00
90b64c9543
systemd: rename aminda-nocron -> aminda-nocron-reboot for clarity
...
also opens up aminda-nocron-hourly etc.
2024-04-26 12:30:58 +03:00
b0ec7cffde
chromium/README: EnableOnlineRevocationChecks does also enable CRL
2024-04-26 11:27:11 +03:00
16d2f74135
systemd/aminda-nocron.service: explicitly start DNS too
2024-04-26 11:08:15 +03:00
def77bc4c3
systemd: add aminmda-nocron.{service,timer} for my @reboot crontabs for cronless systems (SteamOS)
2024-04-26 10:43:08 +03:00
901dbfe138
etc/hosts: attempt to increase legibility by adding leading and trailing #
2024-04-25 19:45:11 +03:00
21b59adfd2
etc/hosts/hostname: copy Debian behaviour as a good practice
2024-04-25 19:40:56 +03:00
fb65f717fc
etc: cleanup symlinks/files handled by init-browser-policies.bash
...
They brought no value to me, just confused me in git forges by clicktrapping me and not following the symlinks
2024-04-25 17:31:09 +03:00
6375d55b8f
systemd-resolved/mullvad: default to base for consistency with unbound
2024-04-25 17:27:55 +03:00
17e0b68d20
unbound: add dot-mullvad.conf defalting on base
...
I found myself missing this on an old family PC that has limited resources and as I didn't have this file at hand, I just went with AdGuard which will work too.
2024-04-25 17:24:41 +03:00
a17ff2903a
unbound/nordvpn-domains.conf: add comments/sources, fix duplicate zone, add missing domains
2024-04-25 15:07:37 +03:00
bbeb1d3e02
unbound/nordvpn: rename, send only their domains to them
2024-04-25 14:34:47 +03:00
046b9c5f1a
systemd: use more descriptive drop-in name unbound-wanted.conf instead of unbound.conf
2024-04-25 14:10:26 +03:00
1ea9fff29a
chromium: declare more things as .badidea
2024-04-25 14:01:54 +03:00
f87c4899b6
chromium: add dns-over-https.json.badidea and declare it as a bad idea
2024-04-25 13:57:01 +03:00
861b35c25f
systemd-resolved: add the other applied-privacy.net port too
2024-04-25 13:47:18 +03:00
342e3116a6
systemd-resolved: another attempt at local resolvers
2024-04-25 13:45:37 +03:00
d17ad34650
unbound/dns-over-tls.conf: note Applied Privacy does no ECS, add 853, add Quad9 unfiltered (ECS commented)
2024-04-25 13:26:01 +03:00
52b0807fcb
systemd/yggdrasil.service.d: rename nordvpnd to restore-ipv6.conf
2024-04-25 12:52:30 +03:00
520470e3dd
systemd: add firewalld-icmpv6.conf as drop-in
2024-04-25 12:51:03 +03:00
45cf5ecf61
opt/chromium/policies/managed: update documentation about working preferred over ECH enforced
2024-04-25 11:00:40 +03:00
32883d5c73
chromium: allow DoH downgrade to at least work. Breaks ECH :(
2024-04-25 08:15:28 +03:00
7c80e2c329
NetworkManager: paws-off-my-resolv.conf
2024-04-24 18:21:33 +03:00
38152ab152
etc/sudoers.d: add vim modelines just in case
...
I think it autodetected them correctly though
2024-04-24 18:16:42 +03:00
505c6ec74a
etc/hosts: add hosts.steamos
2024-04-24 18:15:50 +03:00
7113fda702
sudoers.d/nordvpnd: add restarting unbound & systemd-resolved
2024-04-24 18:00:00 +03:00
32c5da4422
etc/resolv.conf-generate.bash: also be verbose with chattr & chmod
2024-04-24 12:09:15 +03:00
9b01bc5260
etc/hosts/README.md: add forgotten blocklist and formatting
2024-04-24 11:55:35 +03:00
c00f750d96
etc/resolv.conf-generate.bash: simple resolv.conf writer the way I want
2024-04-24 11:06:35 +03:00
fa9da0901d
etc/hosts/blocklist: initial commit
2024-04-24 09:21:42 +03:00
b36ba70a70
systemd/service.d: add resolv.conf example with warnings
2024-04-24 07:31:10 +03:00
bdcd7249c3
etc/resolv.conf: fix comment
2024-04-23 16:47:03 +03:00
95e17d0a49
resolv.conf: remove rotate comments, attempt to explain the logic behind timeout & attempts
2024-04-23 16:23:36 +03:00
425af3eabf
etc/resolv.conf: specify timeout 1 and attempts 5
2024-04-23 16:03:49 +03:00
70ed890742
dnf/protected.d: add README.md, aminda-{desktop,essentials}.conf
2024-04-23 07:51:29 +03:00
4dac26e46e
dnf: also protect unbound
2024-04-23 07:41:49 +03:00
b0f7876436
etc/dnf/protected.d: add systemd-{networkd,resolved}.conf
2024-04-23 07:29:18 +03:00
f41e80d66a
hosts/dns: comment where it begins and where it ends
2024-04-22 17:11:03 +03:00
97c2e74220
etc/hosts: attempt to perform the bad idea of well-known DNS servers here instead
2024-04-22 16:24:51 +03:00
4560e776df
systemd-{resolved,networkd}: just break things
2024-04-22 15:43:50 +03:00
886b8dbfbd
unbound.conf.d: well-known-dns.conf -> well-known-dns.conf.badidea
...
This will break DNSSEC and a lot of things.
2024-04-22 15:39:47 +03:00
4acd22dc37
systemd-networkd: add untested none (Yggdrasil) & wireguard configuration
2024-04-22 15:17:14 +03:00
6ea0a570dd
systemd-networkd: match systemd-resolved configuration
2024-04-22 15:12:07 +03:00
dea732d15b
systemd-resolved: attempt to simplify configuration
2024-04-22 15:08:03 +03:00
f976c9a530
etc/resolv.conf: comment rotate, remove bad search domain comment
2024-04-22 14:51:58 +03:00
895359ff67
etc/resolv.conf: add warning about mixing systemd-resolved & unbound
2024-04-22 14:50:37 +03:00
903e38f307
systemd-networkd: unset other DNS
2024-04-22 13:32:12 +03:00
7be1800002
systemd-networkd: disable DNSSEC/DNSOverTLS by default as localhost
2024-04-22 13:16:14 +03:00
3d58aee508
systemd-networkd/10-ether.network: mention unmanaged/NetworkManager
2024-04-22 13:09:28 +03:00
e56e5e1909
systemd-networkd: remove comment I don't stand behind
2024-04-22 13:05:58 +03:00
02c434b81b
systemd-networkd: list local DNS resolvers
2024-04-22 12:59:38 +03:00
44b6e5b618
systemd-networkd: add DNSSEC & DNSOverTLS & search domains
2024-04-22 12:25:25 +03:00
945ca0462d
Revert "systemd-networkd: attempt to deduplicate by cutting into 10-global.network"
...
This reverts commit 19b6fbef3c
.
2024-04-22 12:21:56 +03:00
06787a38de
resolved/00-no-local-resolver.conf: comment local resolver since I break DNSSEC
2024-04-22 12:14:34 +03:00
19b6fbef3c
systemd-networkd: attempt to deduplicate by cutting into 10-global.network
2024-04-22 12:07:39 +03:00
aac3ccdec3
unbound/well-known-dns.conf: add CNAMEs one.one.one.one & dns.google.com
2024-04-22 11:26:46 +03:00
dc6fc85174
chromium: exclude bittimittari.fi
2024-04-22 10:09:28 +03:00
fe1970cfd9
chromium: add brave IPFS disabling policy
...
IPFS is known for killing routers and having it on two machines while trying to VoIP with a lot of people, it gets a bit too heavy
2024-04-22 10:03:53 +03:00
abd21e008a
well-known-dns.conf: typetransparent subdomains just in case
...
Theoretically the higher level domain affects them too, but in practice I am unsure and I have previously only used always_reject for google-analytics & subdomains blocking. It at least isn't causing warnings or errors.
2024-04-22 07:42:53 +03:00
579e98f27c
unbound/well-known-dns.conf: use typetransparent so non-local queries won't get NODATA
2024-04-22 07:28:55 +03:00
623a9150fd
unbound: merge 00-insecure-domains.conf into blocklist.conf
2024-04-22 07:10:18 +03:00
892feb3c1b
unbound/blocklist: add fritz.box.
2024-04-22 07:06:21 +03:00
c90b551ac4
chromium: merge doh-forced to the doh files due to it being required anyway, update documentation, rename doh-allowed → doh-unlocked-unset
2024-04-21 14:00:39 +03:00
4a47d14069
resolved.conf.d: add dot-trex.conf symlink and explaining comments like in unbound
2024-04-21 13:14:53 +03:00
ce9159e756
unbound/dot-quad9.conf: prettier sorting
2024-04-21 13:13:41 +03:00
7379241a20
chromium: add the rest of Quad9 & update README.md
2024-04-21 11:35:28 +03:00
3540f2442e
chromium/doh-quad9*: add alternative port as Chromium allows multiple
2024-04-21 11:28:07 +03:00
eb47fac4cb
systemd-resolved: add vim modelines
2024-04-21 10:58:45 +03:00
f126e681a2
systemd-resolved: split applied-privacy#443 to its own file as resolved configs don't exclude each other
2024-04-21 10:57:25 +03:00
a0ccd790ab
unbound & systemd-resolved: add Quad9 alternative port
2024-04-21 10:54:22 +03:00
e64e4e7fd0
firefox: DisableEncryptedClientHello: false
...
I am not sure if this does anything, I just saw a message in logs and it didn't trigger an error
2024-04-21 10:13:29 +03:00
6a97040386
firefox: add IPvFoo*
2024-04-21 10:08:43 +03:00
069da00a38
Chromium: add IPvFoo* and note that users should go through extensions
2024-04-21 09:58:30 +03:00
e6bd2b13ad
unbound: add TREX upstream configuration
2024-04-20 20:25:48 +03:00
a7cf718453
uncound/well-known-dns.conf: add DNS0 {Zero,Kids,Open}
2024-04-20 17:59:46 +03:00
41c65344f1
chromium: add dot-dns0-{kids,open,zero}.json
2024-04-20 17:53:33 +03:00
437ec3b49c
chromium/doh-dns0.json: add trailing / as Chromium requires it (or fails every DNS request)
2024-04-20 17:50:57 +03:00
422ab0de4e
libreawoo, unbound & resolved: uncomment Quad9 default, comment ECS
2024-04-20 17:50:12 +03:00
bec7f8bbaa
separate local/share/applications & etc/xdg/autostart
2024-04-20 12:14:02 +03:00
ffc4c53615
sudoers/nordvpnd: allow chronyc online
2024-04-20 11:56:14 +03:00
c9cad77caf
move etc/xdg/autostart to more descriptive location of local/share/applications
2024-04-20 11:18:33 +03:00
9bd3a05d5b
clean up old desktop entries I cannot see myself using
2024-04-20 11:13:02 +03:00
cebcec5792
add syncplay.desktop
2024-04-20 11:07:03 +03:00
8e296b5a25
add mpv.desktop that avoids pseudo-gui
2024-04-20 11:04:30 +03:00
24c9209cbe
add/fix desktop entries for wrappers firefox, steam, thunderbird
2024-04-20 10:58:09 +03:00
4c841781b3
add/fix libreawoo & firefox desktop entries
2024-04-20 10:50:09 +03:00
93c60b21b2
finish chromium desktop files?
2024-04-20 10:43:17 +03:00
bbcb37c334
add libreawoo.desktop
2024-04-20 10:32:55 +03:00
816157fc25
add initial desktop files for the scripts wrappers
2024-04-20 10:23:15 +03:00
45f1c1078f
unbound/well-known-dns.conf: add Google DNS
2024-04-20 09:10:36 +03:00
134622edad
unbound/well-known-dns.conf: add missing dots
2024-04-20 09:00:44 +03:00
e319c8aacf
unbound: restore and update blocklist.conf
...
This reverts commit fe8ac1bbb7
.
2024-04-20 08:57:26 +03:00
c7633838de
unbound: fill well-known-dns.conf some more
2024-04-20 08:52:49 +03:00
dda5f2c110
chromium/enable-ech-ocsp.json: remove not strictly releated policies
2024-04-20 07:47:31 +03:00
4a889dd9b4
sudoers.d/nordvpnd: add restarting of iwd & systemd-networkd
2024-04-20 07:42:40 +03:00
6a87111f8b
unbound/well-known-dns.conf: initial commit
2024-04-19 19:58:23 +03:00
1e22108950
unbound/00-insecure-domains.conf: qname minimization is not relevant here
2024-04-19 09:17:01 +03:00
1a1bf9adb9
unbound/conf.d: add vim modelines/filetypes
2024-04-19 09:14:32 +03:00
b3eb6e06e7
unbound: add symlink for the Fedora name as I keep tab failing
2024-04-19 09:09:36 +03:00
47e51ee38b
firefox policy: use Quad9 ECS as TRR
2024-04-19 08:48:57 +03:00
39f2eb4f0f
chromium: add doh-cloudflare-secure.json, ECH notes
2024-04-19 08:24:29 +03:00
b248392e8a
systemd-resolved: think more on local resolvers or not
2024-04-18 14:31:56 +03:00
4c4508ba36
unbound/dot-*quad9.conf: add DNS10 & DNS12 (commented), remove extra spaces
2024-04-18 11:16:20 +03:00
9aa71de638
systemd-resolved/dot-quad9.conf: add commented DNS10 & DNS12
2024-04-18 11:08:23 +03:00
5097076daf
unbound: also disable qname-minimization for DNSo53 forwarders
2024-04-17 16:03:23 +03:00
363be56010
unbound: move to tls-ystem-cert from tls-cert-bundle & disable qname minimization for DoT forward-zones
2024-04-17 16:01:38 +03:00
bbab2f335d
resolv.tsv: sort
2024-04-17 15:42:34 +03:00
9ba083f81f
resolv.tsv: add Quad9 unfiltered variants
2024-04-17 15:42:08 +03:00
c18fe92ad8
etc/resolv.tsv: add Quad9 Apple Mobileconfigs
2024-04-17 15:34:43 +03:00
f10b151a3b
systemd: add firewalld.service.d/never-fail.conf due to failing to timeout on sedric
2024-04-17 11:38:43 +03:00
75c39ddb0d
sudoers.d/nordvpnd: include nordvpnd.socket
2024-04-16 08:39:16 +03:00
419805bc91
chromium/README: add forgotten files, fix description for those moved from recommended
2024-04-16 07:15:30 +03:00
a0456269a1
chromium: move brave feature disabling from recommended to managed for actual effect
2024-04-16 07:11:55 +03:00
36f433f35b
chromium/managed: add enable-labs.json
...
I have decided that I want it anyway and unlike before, now it has its own file so I can decide to leave it alone on shared devices
2024-04-15 21:08:56 +03:00
8c748dd2d6
unbound/dot-dns0-quad9.conf: fix duplicate forward zone
2024-04-14 14:23:58 +03:00
ac922aea86
{firefox,chromium}: add Floccus bookmarks sync so I will remember its existence
2024-04-14 14:10:39 +03:00
cd2ae2c852
etc/resolv.tsv: add Google DNS & DNS64 as they too are Android hard-coded for DoH3
2024-04-14 09:18:05 +03:00
cc25967b22
etc/resolv.tsv: note Cloudflare being DoH3 on Android, add Cloudflare antimalware/family DoT addresses
2024-04-14 09:10:06 +03:00
44c3168a39
chromium policy: strip DnsOverHttpsMode to two different files, rename automatic to allowed for clarity & update README.md on these
2024-04-13 18:38:26 +03:00
46ac8aefd8
unbound: add dot-dns0-quad9.conf
2024-04-12 17:01:32 +03:00
ab74e45a9f
chromium policy/brave-shields-disabled.json: add glowing-bear
2024-04-12 14:29:49 +03:00
b9d8da4df4
chromium policy. add brave-shields-disabled.json based on Privacy Badger
2024-04-12 14:26:31 +03:00
bf1fdc4cff
{firefox,chromium} policy: PB exclude Disroot Mvim, Microsoft {Teams,Learn}
2024-04-12 14:24:31 +03:00
b1a0125674
unbound: add local-tlds.conf
2024-04-12 14:16:10 +03:00
0d4c40ba16
systemd: mark systemd-resolved.conf to be conflicting with avahi-daemon
2024-04-12 10:58:15 +03:00
73865c747d
root-auto-trust-anchor-file.conf -> debian-root-auto-trust-anchor-file.conf
...
Let's not overwrite files accidentally
2024-04-12 10:56:51 +03:00
0bac3a8ab0
chromium: add doh-quad9.json
2024-04-12 10:42:51 +03:00
e88c2a8067
etc: attempt to enable mDNS/LLMNR for systemd-{networkd,resolved} & NetworkManager
...
Some boolean fixing slipped in as well
2024-04-12 09:52:32 +03:00