Commit Graph

1379 Commits

Author SHA1 Message Date
c55b20a89a
move systemd user units from conf/systemd/user to etc/systemd/user
symlink remains to show what is the correct location
2024-04-26 13:05:08 +03:00
b36fe67bc3
systemd/user: attempt to flatpak-update-user.{service,timer} 2024-04-26 13:03:05 +03:00
b8f720fa7f
aminda-nocron-reboot.timer: fix typo in comment 2024-04-26 12:48:47 +03:00
9e38fdf223
aminda-nocron-reboot.timer: add RemainAfterElapse=false 2024-04-26 12:37:55 +03:00
90b64c9543
systemd: rename aminda-nocron -> aminda-nocron-reboot for clarity
also opens up aminda-nocron-hourly etc.
2024-04-26 12:30:58 +03:00
b0ec7cffde
chromium/README: EnableOnlineRevocationChecks does also enable CRL 2024-04-26 11:27:11 +03:00
16d2f74135
systemd/aminda-nocron.service: explicitly start DNS too 2024-04-26 11:08:15 +03:00
def77bc4c3
systemd: add aminmda-nocron.{service,timer} for my @reboot crontabs for cronless systems (SteamOS) 2024-04-26 10:43:08 +03:00
901dbfe138
etc/hosts: attempt to increase legibility by adding leading and trailing # 2024-04-25 19:45:11 +03:00
21b59adfd2
etc/hosts/hostname: copy Debian behaviour as a good practice 2024-04-25 19:40:56 +03:00
fb65f717fc
etc: cleanup symlinks/files handled by init-browser-policies.bash
They brought no value to me, just confused me in git forges by clicktrapping me and not following the symlinks
2024-04-25 17:31:09 +03:00
6375d55b8f
systemd-resolved/mullvad: default to base for consistency with unbound 2024-04-25 17:27:55 +03:00
17e0b68d20
unbound: add dot-mullvad.conf defalting on base
I found myself missing this on an old family PC that has limited resources and as I didn't have this file at hand, I just went with AdGuard which will work too.
2024-04-25 17:24:41 +03:00
a17ff2903a
unbound/nordvpn-domains.conf: add comments/sources, fix duplicate zone, add missing domains 2024-04-25 15:07:37 +03:00
bbeb1d3e02
unbound/nordvpn: rename, send only their domains to them 2024-04-25 14:34:47 +03:00
046b9c5f1a
systemd: use more descriptive drop-in name unbound-wanted.conf instead of unbound.conf 2024-04-25 14:10:26 +03:00
1ea9fff29a
chromium: declare more things as .badidea 2024-04-25 14:01:54 +03:00
f87c4899b6
chromium: add dns-over-https.json.badidea and declare it as a bad idea 2024-04-25 13:57:01 +03:00
861b35c25f
systemd-resolved: add the other applied-privacy.net port too 2024-04-25 13:47:18 +03:00
342e3116a6
systemd-resolved: another attempt at local resolvers 2024-04-25 13:45:37 +03:00
d17ad34650
unbound/dns-over-tls.conf: note Applied Privacy does no ECS, add 853, add Quad9 unfiltered (ECS commented) 2024-04-25 13:26:01 +03:00
52b0807fcb
systemd/yggdrasil.service.d: rename nordvpnd to restore-ipv6.conf 2024-04-25 12:52:30 +03:00
520470e3dd
systemd: add firewalld-icmpv6.conf as drop-in 2024-04-25 12:51:03 +03:00
45cf5ecf61
opt/chromium/policies/managed: update documentation about working preferred over ECH enforced 2024-04-25 11:00:40 +03:00
32883d5c73
chromium: allow DoH downgrade to at least work. Breaks ECH :( 2024-04-25 08:15:28 +03:00
7c80e2c329
NetworkManager: paws-off-my-resolv.conf 2024-04-24 18:21:33 +03:00
38152ab152
etc/sudoers.d: add vim modelines just in case
I think it autodetected them correctly though
2024-04-24 18:16:42 +03:00
505c6ec74a
etc/hosts: add hosts.steamos 2024-04-24 18:15:50 +03:00
7113fda702
sudoers.d/nordvpnd: add restarting unbound & systemd-resolved 2024-04-24 18:00:00 +03:00
32c5da4422
etc/resolv.conf-generate.bash: also be verbose with chattr & chmod 2024-04-24 12:09:15 +03:00
9b01bc5260
etc/hosts/README.md: add forgotten blocklist and formatting 2024-04-24 11:55:35 +03:00
c00f750d96
etc/resolv.conf-generate.bash: simple resolv.conf writer the way I want 2024-04-24 11:06:35 +03:00
fa9da0901d
etc/hosts/blocklist: initial commit 2024-04-24 09:21:42 +03:00
b36ba70a70
systemd/service.d: add resolv.conf example with warnings 2024-04-24 07:31:10 +03:00
bdcd7249c3
etc/resolv.conf: fix comment 2024-04-23 16:47:03 +03:00
95e17d0a49
resolv.conf: remove rotate comments, attempt to explain the logic behind timeout & attempts 2024-04-23 16:23:36 +03:00
425af3eabf
etc/resolv.conf: specify timeout 1 and attempts 5 2024-04-23 16:03:49 +03:00
70ed890742
dnf/protected.d: add README.md, aminda-{desktop,essentials}.conf 2024-04-23 07:51:29 +03:00
4dac26e46e
dnf: also protect unbound 2024-04-23 07:41:49 +03:00
b0f7876436
etc/dnf/protected.d: add systemd-{networkd,resolved}.conf 2024-04-23 07:29:18 +03:00
f41e80d66a
hosts/dns: comment where it begins and where it ends 2024-04-22 17:11:03 +03:00
97c2e74220
etc/hosts: attempt to perform the bad idea of well-known DNS servers here instead 2024-04-22 16:24:51 +03:00
4560e776df
systemd-{resolved,networkd}: just break things 2024-04-22 15:43:50 +03:00
886b8dbfbd
unbound.conf.d: well-known-dns.conf -> well-known-dns.conf.badidea
This will break DNSSEC and a lot of things.
2024-04-22 15:39:47 +03:00
4acd22dc37
systemd-networkd: add untested none (Yggdrasil) & wireguard configuration 2024-04-22 15:17:14 +03:00
6ea0a570dd
systemd-networkd: match systemd-resolved configuration 2024-04-22 15:12:07 +03:00
dea732d15b
systemd-resolved: attempt to simplify configuration 2024-04-22 15:08:03 +03:00
f976c9a530
etc/resolv.conf: comment rotate, remove bad search domain comment 2024-04-22 14:51:58 +03:00
895359ff67
etc/resolv.conf: add warning about mixing systemd-resolved & unbound 2024-04-22 14:50:37 +03:00
903e38f307
systemd-networkd: unset other DNS 2024-04-22 13:32:12 +03:00
7be1800002
systemd-networkd: disable DNSSEC/DNSOverTLS by default as localhost 2024-04-22 13:16:14 +03:00
3d58aee508
systemd-networkd/10-ether.network: mention unmanaged/NetworkManager 2024-04-22 13:09:28 +03:00
e56e5e1909
systemd-networkd: remove comment I don't stand behind 2024-04-22 13:05:58 +03:00
02c434b81b
systemd-networkd: list local DNS resolvers 2024-04-22 12:59:38 +03:00
44b6e5b618
systemd-networkd: add DNSSEC & DNSOverTLS & search domains 2024-04-22 12:25:25 +03:00
945ca0462d
Revert "systemd-networkd: attempt to deduplicate by cutting into 10-global.network"
This reverts commit 19b6fbef3c.
2024-04-22 12:21:56 +03:00
06787a38de
resolved/00-no-local-resolver.conf: comment local resolver since I break DNSSEC 2024-04-22 12:14:34 +03:00
19b6fbef3c
systemd-networkd: attempt to deduplicate by cutting into 10-global.network 2024-04-22 12:07:39 +03:00
aac3ccdec3
unbound/well-known-dns.conf: add CNAMEs one.one.one.one & dns.google.com 2024-04-22 11:26:46 +03:00
dc6fc85174
chromium: exclude bittimittari.fi 2024-04-22 10:09:28 +03:00
fe1970cfd9
chromium: add brave IPFS disabling policy
IPFS is known for killing routers and having it on two machines while trying to VoIP with a lot of people, it gets a bit too heavy
2024-04-22 10:03:53 +03:00
abd21e008a
well-known-dns.conf: typetransparent subdomains just in case
Theoretically the higher level domain affects them too, but in practice I am unsure and I have previously only used always_reject for google-analytics & subdomains blocking. It at least isn't causing warnings or errors.
2024-04-22 07:42:53 +03:00
579e98f27c
unbound/well-known-dns.conf: use typetransparent so non-local queries won't get NODATA 2024-04-22 07:28:55 +03:00
623a9150fd
unbound: merge 00-insecure-domains.conf into blocklist.conf 2024-04-22 07:10:18 +03:00
892feb3c1b
unbound/blocklist: add fritz.box. 2024-04-22 07:06:21 +03:00
c90b551ac4
chromium: merge doh-forced to the doh files due to it being required anyway, update documentation, rename doh-allowed → doh-unlocked-unset 2024-04-21 14:00:39 +03:00
4a47d14069
resolved.conf.d: add dot-trex.conf symlink and explaining comments like in unbound 2024-04-21 13:14:53 +03:00
ce9159e756
unbound/dot-quad9.conf: prettier sorting 2024-04-21 13:13:41 +03:00
7379241a20
chromium: add the rest of Quad9 & update README.md 2024-04-21 11:35:28 +03:00
3540f2442e
chromium/doh-quad9*: add alternative port as Chromium allows multiple 2024-04-21 11:28:07 +03:00
eb47fac4cb
systemd-resolved: add vim modelines 2024-04-21 10:58:45 +03:00
f126e681a2
systemd-resolved: split applied-privacy#443 to its own file as resolved configs don't exclude each other 2024-04-21 10:57:25 +03:00
a0ccd790ab
unbound & systemd-resolved: add Quad9 alternative port 2024-04-21 10:54:22 +03:00
e64e4e7fd0
firefox: DisableEncryptedClientHello: false
I am not sure if this does anything, I just saw a message in logs and it didn't trigger an error
2024-04-21 10:13:29 +03:00
6a97040386
firefox: add IPvFoo* 2024-04-21 10:08:43 +03:00
069da00a38
Chromium: add IPvFoo* and note that users should go through extensions 2024-04-21 09:58:30 +03:00
e6bd2b13ad
unbound: add TREX upstream configuration 2024-04-20 20:25:48 +03:00
a7cf718453
uncound/well-known-dns.conf: add DNS0 {Zero,Kids,Open} 2024-04-20 17:59:46 +03:00
41c65344f1
chromium: add dot-dns0-{kids,open,zero}.json 2024-04-20 17:53:33 +03:00
437ec3b49c
chromium/doh-dns0.json: add trailing / as Chromium requires it (or fails every DNS request) 2024-04-20 17:50:57 +03:00
422ab0de4e
libreawoo, unbound & resolved: uncomment Quad9 default, comment ECS 2024-04-20 17:50:12 +03:00
bec7f8bbaa
separate local/share/applications & etc/xdg/autostart 2024-04-20 12:14:02 +03:00
ffc4c53615
sudoers/nordvpnd: allow chronyc online 2024-04-20 11:56:14 +03:00
c9cad77caf
move etc/xdg/autostart to more descriptive location of local/share/applications 2024-04-20 11:18:33 +03:00
9bd3a05d5b
clean up old desktop entries I cannot see myself using 2024-04-20 11:13:02 +03:00
cebcec5792
add syncplay.desktop 2024-04-20 11:07:03 +03:00
8e296b5a25
add mpv.desktop that avoids pseudo-gui 2024-04-20 11:04:30 +03:00
24c9209cbe
add/fix desktop entries for wrappers firefox, steam, thunderbird 2024-04-20 10:58:09 +03:00
4c841781b3
add/fix libreawoo & firefox desktop entries 2024-04-20 10:50:09 +03:00
93c60b21b2
finish chromium desktop files? 2024-04-20 10:43:17 +03:00
bbcb37c334
add libreawoo.desktop 2024-04-20 10:32:55 +03:00
816157fc25
add initial desktop files for the scripts wrappers 2024-04-20 10:23:15 +03:00
45f1c1078f
unbound/well-known-dns.conf: add Google DNS 2024-04-20 09:10:36 +03:00
134622edad
unbound/well-known-dns.conf: add missing dots 2024-04-20 09:00:44 +03:00
e319c8aacf
unbound: restore and update blocklist.conf
This reverts commit fe8ac1bbb7.
2024-04-20 08:57:26 +03:00
c7633838de
unbound: fill well-known-dns.conf some more 2024-04-20 08:52:49 +03:00
dda5f2c110
chromium/enable-ech-ocsp.json: remove not strictly releated policies 2024-04-20 07:47:31 +03:00
4a889dd9b4
sudoers.d/nordvpnd: add restarting of iwd & systemd-networkd 2024-04-20 07:42:40 +03:00
6a87111f8b
unbound/well-known-dns.conf: initial commit 2024-04-19 19:58:23 +03:00
1e22108950
unbound/00-insecure-domains.conf: qname minimization is not relevant here 2024-04-19 09:17:01 +03:00
1a1bf9adb9
unbound/conf.d: add vim modelines/filetypes 2024-04-19 09:14:32 +03:00
b3eb6e06e7
unbound: add symlink for the Fedora name as I keep tab failing 2024-04-19 09:09:36 +03:00
47e51ee38b
firefox policy: use Quad9 ECS as TRR 2024-04-19 08:48:57 +03:00
39f2eb4f0f
chromium: add doh-cloudflare-secure.json, ECH notes 2024-04-19 08:24:29 +03:00
b248392e8a
systemd-resolved: think more on local resolvers or not 2024-04-18 14:31:56 +03:00
4c4508ba36
unbound/dot-*quad9.conf: add DNS10 & DNS12 (commented), remove extra spaces 2024-04-18 11:16:20 +03:00
9aa71de638
systemd-resolved/dot-quad9.conf: add commented DNS10 & DNS12 2024-04-18 11:08:23 +03:00
5097076daf
unbound: also disable qname-minimization for DNSo53 forwarders 2024-04-17 16:03:23 +03:00
363be56010
unbound: move to tls-ystem-cert from tls-cert-bundle & disable qname minimization for DoT forward-zones 2024-04-17 16:01:38 +03:00
bbab2f335d
resolv.tsv: sort 2024-04-17 15:42:34 +03:00
9ba083f81f
resolv.tsv: add Quad9 unfiltered variants 2024-04-17 15:42:08 +03:00
c18fe92ad8
etc/resolv.tsv: add Quad9 Apple Mobileconfigs 2024-04-17 15:34:43 +03:00
f10b151a3b
systemd: add firewalld.service.d/never-fail.conf due to failing to timeout on sedric 2024-04-17 11:38:43 +03:00
75c39ddb0d
sudoers.d/nordvpnd: include nordvpnd.socket 2024-04-16 08:39:16 +03:00
419805bc91
chromium/README: add forgotten files, fix description for those moved from recommended 2024-04-16 07:15:30 +03:00
a0456269a1
chromium: move brave feature disabling from recommended to managed for actual effect 2024-04-16 07:11:55 +03:00
36f433f35b
chromium/managed: add enable-labs.json
I have decided that I want it anyway and unlike before, now it has its own file so I can decide to leave it alone on shared devices
2024-04-15 21:08:56 +03:00
8c748dd2d6
unbound/dot-dns0-quad9.conf: fix duplicate forward zone 2024-04-14 14:23:58 +03:00
ac922aea86
{firefox,chromium}: add Floccus bookmarks sync so I will remember its existence 2024-04-14 14:10:39 +03:00
cd2ae2c852
etc/resolv.tsv: add Google DNS & DNS64 as they too are Android hard-coded for DoH3 2024-04-14 09:18:05 +03:00
cc25967b22
etc/resolv.tsv: note Cloudflare being DoH3 on Android, add Cloudflare antimalware/family DoT addresses 2024-04-14 09:10:06 +03:00
44c3168a39
chromium policy: strip DnsOverHttpsMode to two different files, rename automatic to allowed for clarity & update README.md on these 2024-04-13 18:38:26 +03:00
46ac8aefd8
unbound: add dot-dns0-quad9.conf 2024-04-12 17:01:32 +03:00
ab74e45a9f
chromium policy/brave-shields-disabled.json: add glowing-bear 2024-04-12 14:29:49 +03:00
b9d8da4df4
chromium policy. add brave-shields-disabled.json based on Privacy Badger 2024-04-12 14:26:31 +03:00
bf1fdc4cff
{firefox,chromium} policy: PB exclude Disroot Mvim, Microsoft {Teams,Learn} 2024-04-12 14:24:31 +03:00
b1a0125674
unbound: add local-tlds.conf 2024-04-12 14:16:10 +03:00
0d4c40ba16
systemd: mark systemd-resolved.conf to be conflicting with avahi-daemon 2024-04-12 10:58:15 +03:00
73865c747d
root-auto-trust-anchor-file.conf -> debian-root-auto-trust-anchor-file.conf
Let's not overwrite files accidentally
2024-04-12 10:56:51 +03:00
0bac3a8ab0
chromium: add doh-quad9.json 2024-04-12 10:42:51 +03:00
e88c2a8067
etc: attempt to enable mDNS/LLMNR for systemd-{networkd,resolved} & NetworkManager
Some boolean fixing slipped in as well
2024-04-12 09:52:32 +03:00
4d4dc026fd
unbound: ipv6.conf -> prefer-ipv6.conf
more descriptive name
2024-04-12 09:19:02 +03:00
a7bb2f5ec8
etc/iwd/main.conf: update comments on DNS 2024-04-11 10:16:21 +03:00
80ac65acd1
systemd-resolved/README.md: enable doctoc 2024-04-11 10:06:18 +03:00
cce932960e
systemd-resolved/README.md: mention nordvpn.conf 2024-04-11 10:05:18 +03:00
a2e36f2a3b
systemd-resolved/README.md: remove EOL Ubuntu, fix booleans, note my actual DNS config 2024-04-11 10:03:53 +03:00
da6eab8dfc
systemd-resolved: use true/false as booleans (not yes/no) & remove repeated localhost 2024-04-11 10:02:49 +03:00
3009af55a6
resolved.conf.d/README.md: mention 00-defaults and dot-something being supposed to be used together 2024-04-10 15:09:31 +03:00
9a210c4bba
systemd-resolved: further decrease repeating, comment DNS-Over-TLS since it's in 00-defaults.conf already (+ local resolver) 2024-04-10 15:06:14 +03:00
f12d0ceb8a
systemd-resolved: don't repeat cache 2024-04-10 15:02:30 +03:00
241405c776
systemd-resolved: merge unbound.conf into 00-defaults.conf 2024-04-10 11:59:36 +03:00
f885dcd73a
chromium/recommended: disable Tor in Brave 2024-04-10 11:21:52 +03:00
4cfd7ab75f
chromium: add recommendation of disabling Brave rewards & wallet 2024-04-10 11:18:42 +03:00
2282429f94
brave: use boolean for disabling vpn 2024-04-10 11:16:55 +03:00
149cadfa41
firefox & chromium: add IPFS Companion 2024-04-10 11:03:19 +03:00
d7879eeb6b
chromium: update README with the two new files 2024-04-10 10:53:37 +03:00
450aac4c32
chromium: add disable-brave-vpn.json 2024-04-10 10:51:38 +03:00
35e1faaabc
chromium: add doh-quad9-ecs.json 2024-04-10 10:51:15 +03:00
4a08068634
unbound/cache: serve-expired: yes
I am unsure on whether this actually affects anything without setting the other expired options too
2024-04-07 19:44:10 +03:00
b03218c78b
unbound/cache.conf: add prefetch & prefetch-key 2024-04-07 17:34:36 +03:00
c034e016e8
firefox policy: add search engine suggestion urls 2024-04-05 14:04:14 +03:00
99c63d25fe
{firefox,chromium} policy: add OpenDyslexic 2024-04-04 14:27:43 +03:00
08ae59ed99
firefox policy: configure Homepage 2024-03-31 08:46:12 +03:00
a581ee2dd5
rm etc/sysctl.d/99-enable-ipv6.conf
Refer to crontab, yggdrasil.service.d and nordvpn.service.d
2024-03-29 08:57:35 +02:00
323dde1545
{firefox, chromium}: force install privacy pass
This is in hopes of reducing family member frustation with captchas should they happen
2024-03-29 08:32:44 +02:00
1d05061bb4
hack nordvpnd to work with yggdrasil 2024-03-29 07:58:44 +02:00
9fb90d4b30
chromium/README: mention fix-edge-search.json 2024-03-28 18:57:29 +02:00
80df53aa6a
chromium: move edge policy from recommended searches to managed/fix-edge-search.json 2024-03-28 18:53:15 +02:00
c5dd75077d
chromium: throw home enabling & search engines into recommended policy instead 2024-03-27 16:51:29 +02:00
860970df78
etc/init-browser-policies.bash: note recommended policies 2024-03-27 16:43:17 +02:00
58df0709f4
firefox policy README.md: note that search engines also work on nightly 2024-03-24 08:17:31 +02:00
e823810723
firefox: add search engine aliases 2024-03-24 08:16:20 +02:00
4bab0cbb6a
firefox: default to Brave Search 2024-03-24 08:15:43 +02:00
7b80c2bbc2
chromium/aminda-extensions.json: remove DuckDuckGo Privacy Essentials 2024-03-23 12:46:49 +02:00
d241993c0a
chromium/aminda-extensions.json: remove blank new tab 2024-03-23 12:40:23 +02:00
4a2fc137db
chromium: handle Microsoft Edge new tab page Bing search 2024-03-23 12:36:30 +02:00
3d038bf826
chromium policy README.md: add missing/renamed files 2024-03-23 12:15:21 +02:00
b7acf2daaa
chromium policy: add brave-search.json 2024-03-23 12:08:07 +02:00
c8ece6032a
chromium/duckduckgo.json: policy for using start.duckduckgo.com for searching 2024-03-23 11:55:06 +02:00
405d407c2a
firefox: add Brave Search Goggles 2024-03-21 17:21:30 +02:00
3e56346be0
firefox: add Brave Search 2024-03-20 18:53:18 +02:00
cc6dbceaff
{firefox,chromium} policy: add UpdateSWH 2024-03-14 20:25:06 +02:00
39b0f1d19a
{firefox,chromium} policy: disable PrivacyBadger on Element Web instances 2024-03-13 11:45:19 +02:00
c2c7d401dd
sudoers.d: add teamviewerd 2024-03-13 09:07:25 +02:00
a6c2c28727
etc/yum.repos.d: add teamviewer.repo 2024-03-13 09:02:40 +02:00
0729b8b681
chromium policy: add Chrome Remote Desktop 2024-03-13 08:46:10 +02:00
be8e2d655e
aminda-extensions.json: fix allowed_url paths (paths unsupported, must not contain /* 2024-03-13 08:45:30 +02:00
7d48ac8a1a
sysctl.d/99-enable-ipv6.conf: workaround NordVPN 2024-03-12 17:55:32 +02:00
5c1dce8d36
{firefox,chromium} policy: explicitly configure PrivacyBadger
I think all of these default to true anyway, but explicit is better than implicit is what they say
2024-03-12 10:15:15 +02:00
cfe02d26be
chromiun: allow wayback machine to function on archive.org by default 2024-03-10 07:59:27 +02:00
e4304fd641
chromium: block uBlock Origin from Chrome/Edge stores to avoid conflict with AdNauseam force_install 2024-03-09 15:54:13 +02:00
e35c477a71
firefox policy: block uBlock & uMatrix to avoid conflict with force_install AdNauseam 2024-03-09 15:45:02 +02:00
685b14c2f6
firefox policy: block wayback machine 2024-03-09 15:41:39 +02:00
26ecc69156
chromium policy: add doh-mullvad-base.json 2024-03-09 10:52:54 +02:00
ee36e24997
Chromium policy: add blank new tab 2024-03-09 10:52:31 +02:00
3eb921f212
chromium: adjust runtime_allowed_hosts for DDG as per Edge's behaviour 2024-03-09 10:30:22 +02:00
d7244eefc5
aminda-extensions.json: click to run wbm 2024-03-08 11:19:07 +02:00
5149b23598
browser policies: add wayback machine 2024-03-08 08:41:41 +02:00
16d6a3df09
browser policies: install Bias Finder 2024-03-08 08:29:54 +02:00
0f23d25647
firefox policy: add offline-qr-code-generator 2024-03-04 12:29:45 +02:00
f2e8b86665
browser policies: remove AdNauseam advancedSettings 2024-03-02 16:26:47 +02:00
6029869230
browsers: force_install Privacy Badger again
While this isn't the recommended configuration, Privacy Badger has the
widget replacements, automatic learning (enabled by default as per
this policy), canvas protection etc.

AdNauseam again can replace NoScript (that I previously removed from
the policies for too aggressive for basic users) and fails to click ads
for me anyway, so I think this is the best option for me.
2024-02-29 11:22:29 +02:00
d242b05e76
browser policies: ship AdNauseam in filterAuthorMode 2024-02-29 08:56:59 +02:00
e343e80858
Weaken protection for Ad Nauseam since I am already so unique/fingerprintable 2024-02-28 20:55:46 +02:00
2d7539b0ed
browser policies: install AdNauseam 2024-02-28 20:04:08 +02:00
2e4744bc90
Don't install NoScript on browsers automatically due to being a bit extreme on unsuspecting family members after self-reflection. 2024-02-27 09:44:28 +02:00
5c3e5e29b3
browser policies: add Terms of Service;Didn't Read 2024-02-26 12:20:47 +02:00
8b0e28f417
firefox policies: also keep sidebery installed 2024-02-24 11:08:48 +02:00
2620f975fc
add etc/dnf/protected.d/
I am plotting switching to systemd-bootd in hopes of getting my kernel version unfrozen
2024-02-23 11:37:48 +02:00
3498e0d830
firefox. fix peertube-companion ID 2024-02-23 08:59:50 +02:00
4ff3705df0
firefox: force install peertube companion as a stronger stance against youtube centralization 2024-02-22 19:55:17 +02:00
6afb099d1c
chromium: don't enable the labs button
It has nothing that interesting and is just distraction.
2024-02-21 09:52:00 +02:00
c6304ca36a
chromium/doh-dns0: allow fallback to system dns 2024-02-21 09:51:20 +02:00
04be9339d5
Chromium: restrict DuckDuckGo to itself and google.com 2024-02-20 14:59:56 +02:00
4dbfd94d90
{chromium,firefox}: force install (& pin in Chromium) Snowflake too 2024-02-19 18:00:06 +02:00
303f69a671
firefox: actually force_install tab suspender 2024-02-19 16:45:36 +02:00
0f95863ea2
systemd/earlyoom.service.d: conflicts, never-fail & dynamicuser=false 2024-02-18 19:44:32 +02:00
52b2dd1e69
Chromium policy README.md: linkify extensions 2024-02-17 18:25:37 +02:00
11baf2e142
Chromium README.md: add TODO/Inconsistencies 2024-02-16 19:47:58 +02:00
a1056807bf
firefox: add peertubeify
as indiewiki buddy kind of opened the door for it
2024-02-16 19:41:45 +02:00
67ddd26f71
browser policies: include indiewiki buddy 2024-02-16 17:13:33 +02:00
fe8ac1bbb7
unbound: remove blocklists, deprecated by Browser Policy 2024-02-15 20:47:34 +02:00
398cf45bdf
add etc/systemd/oomd.conf.d/ 2024-02-14 20:26:10 +02:00
f4423b251f
etc: add firefox-esr for Debian 2024-02-14 11:25:44 +02:00
22426e858c
firefox & chromium policy READMEs: links to upstream on top 2024-02-12 17:10:51 +02:00
c55b2a6aed
{systemd-resolved,unbound}: utilize unfiltered dns0 since nordvpn is unlikely to filter either 2024-02-11 13:37:32 +02:00
75d8833b03
firefox/policies.json: fix DDG Start Description & Method 2024-02-11 13:33:27 +02:00
75b938f3ce
firefox policies: restore pocket, searchengines 2024-02-11 13:23:04 +02:00
3b99fd30b7
Chromium policy README.md: note the PrivacyPass domains 2024-02-11 13:13:13 +02:00
2b45c13960
Chromium policy README.md: add forgotten NoScript 2024-02-11 13:11:37 +02:00
121aedd2ff
chromium: add noscript 2024-02-10 12:39:19 +02:00
d37d9e8019
firefox policies: add noscript 2024-02-10 12:34:52 +02:00
e4d223ab42
chromium: default unpin snowflake & silk 2024-02-08 10:54:05 +02:00
da0ab06fdf
chromium: install DuckDuckGo by default 2024-02-08 10:46:30 +02:00
7afdc0e046
firefox: install DuckDuckGo by default 2024-02-08 10:42:34 +02:00
6bd2acac6b
firefox policies.json: clean up advertisements 2024-02-08 10:31:31 +02:00
963f266dad
firefox: note that search engine policy is ESR-only 2024-02-08 10:15:26 +02:00
fa4395def9
firefox policies.json: add new tab suspender 2024-02-08 10:06:57 +02:00
3cd94522df
firefox policies.json: add extensions based on the Chromium one 2024-02-08 10:03:07 +02:00
e71446363b
firefox policy README.md: add link to documentation 2024-02-08 09:37:06 +02:00
4a849a8811
chromium: add Silk (Privacy Pass) & Snowflake 2024-02-07 17:07:54 +02:00
e7f137f282
chromium: rename policies to be in line with my unbound/resolved naming 2024-02-07 10:51:12 +02:00
c1af586c26
chromium README: quick explanations 2024-02-07 10:46:57 +02:00
5eab48fcd5
chromium README: sort aminda-extensions.json 2024-02-07 10:38:15 +02:00
0e26c96b39
chromium: add privacy-manager 2024-02-07 10:34:43 +02:00
ce175c5645
etc/init-browser-policies.bash: ln -siv 2024-02-06 11:43:45 +02:00
f4c796c5ed
etc: add quick script init-browser-policies.bash 2024-02-05 20:54:17 +02:00
e672d04d46
rm etc/install
Obsolete script that I don't ever remember using
2024-02-05 20:34:45 +02:00
8c11a1afce
brave policies 2024-02-05 19:06:35 +02:00
f0ee77fa05
add symlinks and README for Vivaldi policies as well 2024-02-05 18:58:50 +02:00
3c9a97ed2f
chromium/enable-ech-ocsp.json: additionally enable AdditionalDnsQueryTypesEnabled & BuiltInDnsClientEnabled 2024-02-04 10:29:41 +02:00
902f011468
chromium: add multiple mutually incompatible policy files 2024-02-04 10:21:10 +02:00
13a8956758
{resolved,unbound}/nordvpn: add dns0 in case it helps with automatic connection issues 2024-02-02 08:51:52 +02:00
8e1f947591
etc/opt: edge is chromium 2024-02-01 19:58:11 +02:00
82014c0c0c
etc/firefox/policies: add README.md 2024-02-01 19:48:27 +02:00
738ddcbfaf
firefox policies: add EnableTrackingProtection 2024-02-01 19:43:03 +02:00
f0fe1a93b2
firefox policies: add DoH 2024-02-01 19:36:26 +02:00
2c67c85786
rm etc/librewolf: it's not read and overrides LibreWolf customizations 2024-02-01 19:07:40 +02:00
f37ec89f3f
etc/firefox/policies/policies.json: initial commit (just PrivacyBadger and LibreAwoo symlink so far) 2024-02-01 18:50:13 +02:00
b53f8f6f52
chroium policy: default_unpin fedora user agent 2024-01-31 18:49:16 +02:00
e1eae5dd48
chromium policies: throw in Dark Reader and Bitwarden 2024-01-31 14:28:14 +02:00
7cb754def8
chrome policies: force_enable HttpsOnlyMode 2024-01-31 14:12:21 +02:00
23bcc0e908
test managed chrome profilies 2024-01-31 13:43:10 +02:00
bc39daa2ed
unbound/insecure-domains: add norwegianwifi.com
while it's unlikely for me to run unbound on flight
2024-01-27 13:09:14 +02:00
57ac0a8c7a
systemd: add nordvpnd.service.d 2024-01-27 10:20:55 +02:00
7c9aaef375
systemd/service.d: add iwd.conf & network-online.conf 2024-01-27 10:19:08 +02:00
58bc1dd726
systemd-networkd/wlan: comments for when iwd doesn't manage network 2024-01-27 10:18:18 +02:00
e9b77cbc05
etc/iwd/main.conf: disable network configuration 2024-01-27 10:15:54 +02:00
73604ae80f
systmed-timesyncd: add {google,facebook}.conf commented 2024-01-26 10:47:18 +02:00
cc76eb7d5c
timesyncd.conf.d/finland: add ntp.miuku.net
It would have NTS and this is hoping for systemd-timesyncd to support it one day
2024-01-26 10:44:55 +02:00
e3381049b5
systemd-timesyncd/hetzner: replace with individual servers 2024-01-26 10:43:07 +02:00
3b3f1c5193
chrony/ntppool.sources: add zone links to comments 2024-01-25 09:40:34 +02:00
e2e130ea5d
chrony/sources.d/hetzner.sources: replace pool with individual servers 2024-01-24 20:32:23 +02:00
ff1bc7b3ba
nts-servers.sources: no preferring non-ISP servers 2024-01-24 20:00:22 +02:00
e246d21038
chrony/sources: add the ntppool.sources although commented 2024-01-24 18:04:15 +02:00
48976cacce
chrony/sources.d: prefer ISP and CF
The ISP should be closest server to sync to and Cloudflare is anycast with
potentially lower stratum than the other nts servers. 'nts' implies 'require'
and 'trust' already and other servers get picked over lower stratum although
higher distance.
2024-01-24 10:57:52 +02:00
8a93a2a9ac
unbound: another accidental rewrite of nordvpn.conf, now with IPv6 2024-01-23 09:20:13 +02:00
e5fb27a15e
nts-servers.sources: System76 is actually not an NTS pool 2024-01-22 12:56:20 +02:00
9e0333908d
nts-servers.sources: bring the uncommented Finnish server closer to top 2024-01-22 12:53:53 +02:00
9c90a36069
chrony/nts-servers.sources: update System76 entries, increase their line numbers 2024-01-22 12:52:44 +02:00
7a2b36864b
systemd-resolved/nordvpn.conf: add what appears to be their IPv6 2024-01-20 12:41:21 +02:00
62fc911835
systemd-resolved: accidentally rewrit nordvpn.conf
Now accounting for precense of unbound as a maybe fallback resolver
2024-01-20 12:35:23 +02:00
7ec7937d2f
chrony: add ntp.miuku.net 2024-01-17 13:16:37 +02:00
ddbd1acca0
ssh: disable RSA host key 2024-01-12 13:50:49 +02:00
53c78384e0
etc/apt/sources.list: rm ubuntu*
Seems pretty outdated and I cannot see the purpose.
2024-01-07 12:33:53 +02:00
2b4487fccb
etc/sources.list.d: add untested nordvpn.list for the only Debian around 2024-01-07 12:29:49 +02:00
7748d64ad7
systemd: deduplicate qbittorrent, add qbittorrent-nox@.service overrides 2024-01-06 12:34:44 +02:00
86575ddd37
etc/sudoers.d/lecture: rewrite comment including superuser & serverfault links 2024-01-05 13:17:22 +02:00
0f5dceed49
etc/sudoers.d: add nordvpn 2024-01-05 12:56:06 +02:00
39dffa8939
systemd service.d: move common explanations from never-fail.conf to README.md 2024-01-04 12:35:48 +02:00
d99566d26f
systemd/service.d: add nordvpn.conf 2024-01-04 12:31:11 +02:00
8a73d0fd63
unbound.conf.d: add nordvpn.conf 2024-01-04 12:28:38 +02:00
aa97b82e31
systemd-resolved: add nordvpn.conf 2024-01-04 12:25:53 +02:00
8771c98645
etc/yum.repos.d/brave-*: remove unknown option autorefresh 2024-01-04 07:45:11 +02:00
09b64835f7
etc/yum.repos.d/nordvpn.repo: initial commit
I don't want to use their curlbash and I am considering a Revolut plan that would include their standard plan as well
2024-01-03 16:54:59 +02:00
bb60cbe8e6
yum/repos.d/librewolf-repo.repo: correct repo name 2024-01-03 16:53:38 +02:00
e4c6ff7569
etc/sudoers.d: add lecture for always giving the first time lecture 2024-01-02 10:54:53 +02:00
9a0895e412
unbound: merge dot-quad9-ecs.conf into dot-quad9.conf 2023-12-31 16:38:05 +02:00
dba9d4c908
unbound/dot-dns0-*.conf: merge to dot-dns0.conf 2023-12-30 15:46:22 +02:00
a6dd953817
etc/dracut.conf.d/10-asahi.conf: workaround F40 kernel update failures 2023-12-29 13:26:25 +02:00
feef4cbba5
bluetooth.service.d: clarify comments on tested distros & ponder name 2023-12-28 21:30:26 +02:00
be618810c5
bluetooth.service.d: drop fedora- from experimental.conf 2023-12-28 21:28:27 +02:00
f31cb882a5
practically rewrite etc/resolv.conf 2023-12-26 10:51:30 +02:00
9d69584103
Revert "systemd/service.d: add for-network-online.conf so the service is enabled for that"
This reverts commit 0dc32a525a.
2023-12-25 21:26:10 +02:00
fc91247cd1
Revert "yggdrasil.service.d: also allow yggdrasil to start before network-online"
This reverts commit fbc82b81f4.
2023-12-25 21:25:44 +02:00
68fc6be7b9
Revert "unbound.service.d: add the for-network-online.conf"
This reverts commit 6ba99feb58.
2023-12-25 21:25:22 +02:00
85dbc413f0
systemd/system: write tlp-masker.bash instead of having symlinks to /dev/null 2023-12-25 17:27:30 +02:00
7d8fe8c1fa
systemd/system/README: attempt to fix formatting 2023-12-25 17:03:14 +02:00
0327162daa
systemd-resolved: double dnssec 2023-12-25 15:48:23 +02:00
f8f71d77a2
resolv.conf: add systemd-resolved default as a comment too 2023-12-25 15:40:41 +02:00
4286b4a22f
systemd: add start-unbound.service 2023-12-25 15:39:35 +02:00
fbc82b81f4
yggdrasil.service.d: also allow yggdrasil to start before network-online 2023-12-25 12:41:46 +02:00
214966ae54
unbound.service.d: rm WRONG fedora-network-pre.conf 2023-12-25 12:40:40 +02:00
6ba99feb58
unbound.service.d: add the for-network-online.conf 2023-12-25 12:39:58 +02:00
0dc32a525a
systemd/service.d: add for-network-online.conf so the service is enabled for that 2023-12-25 12:38:05 +02:00
5f6e07f353
etc/…/dnf.conf: note RPMCoW plugin in comment on delta RPMs 2023-12-18 09:00:49 +02:00
3f0557b1d0
move & update pipewire-media-session notes to wireplumber 2023-12-17 21:56:45 +02:00
2222ebd249
wireplumber: note package pipewire-codec-aptx 2023-12-17 21:48:57 +02:00
e9fe061b2c
etc/sudoers.d: add insults 2023-12-15 13:04:08 +02:00
dc1fa5e65d
wireplumber/61-more-codecs.lua: note that all disables HQ playback 2023-11-30 10:43:01 +02:00
b770e2f51d
etc/wireplumber: don't artificially restrict codecs 2023-11-30 10:38:06 +02:00
90556db965
bluetooth.service.d: add steamos-experimental.conf 2023-11-29 09:54:28 +02:00
88bfa88985
experimental wireplumber configuration 2023-11-29 09:44:35 +02:00
9853513f01
dnf: disable DeltaRPMs 2023-11-27 09:12:45 +02:00
91428c51af
systemd-resolved: git rm dot-nextdns.conf 2023-11-26 16:23:31 +02:00
1abfd94f01
systemd-resolved/dot-dns0: merge lines 2023-11-26 16:23:12 +02:00
b583b8a6d4
systemd-resolved/*.conf: add appliedprivacy DoTo443 as a comment 2023-11-26 16:19:55 +02:00
dee168e287
systemd-resolved: merge provider configs 2023-11-26 16:18:15 +02:00
fa3fc72afb
systemd-resolved: cleanup configs I don't recommend 2023-11-26 16:12:38 +02:00
16ddfd92e8
chrony/sources.d: rethink yggdrasil.sources 2023-11-22 11:28:21 +02:00
865e816384
chrony/finland.sources: enable xleave for the known Chrony 2023-11-22 10:17:32 +02:00
88f443911f
chrony/yggdrasil.sources: comment kincarron, unlikely to return in near future 2023-11-22 08:38:40 +02:00
b9bc665e07
chrony/nts-servers.sources: comment sources not in Finland 2023-11-22 08:38:12 +02:00
6918ac27d4
yum.repos.d: add mullvad.repo 2023-11-20 21:27:48 +02:00
da99ce785f
chrony/conf.d: add .FIXME suffix to ca-certificates.conf, clarifying comments 2023-11-16 20:19:39 +02:00
428802a4fd
unbound: rm mullvad configuration
It's wrong and I am not currently using it
2023-11-12 12:51:54 +02:00
e825c1dac3
systemd-resolved: dot-mullvad.conf: update domains, add commented other server options 2023-11-12 12:51:07 +02:00
60b3c620fb
systemd-resolved: rm dot-mullvad-adblock.conf 2023-11-12 12:46:35 +02:00
f64b94894c
resolv.tsv: update Mullvad addresses 2023-11-12 12:45:43 +02:00
4f2f41762c
etc/yum.repos.d: note LibreWolf upstream documentation 2023-11-11 18:27:55 +02:00
35b90b6d06
resolv.tsv: update/add/fix Mullvad offering 2023-11-10 15:14:42 +02:00
d2c6f99401
ssh_config: remove deprecated option useroaming
Even Debian Bookworm mentions it as deprecated in ssh -vvv and I seriously doubt I have such old SSH running anywhere
2023-10-28 22:27:06 +03:00
4f87dd6221
samba/playstation2.conf: specify hosts allow 2023-10-28 20:35:08 +03:00
ad59c45eb3
yum.repos.d/README.md: update Yggdrasil address 2023-10-28 18:12:51 +03:00
b6ecd1b173
systemd-resolved: keep DNSSEC enabled 2023-10-21 11:27:07 +03:00
7b4d791d07
flatpak-update.timer: increase frequency 2023-10-19 10:43:55 +03:00
94c23e2f7d
etc/nginx: fix line endings and indentation
UNTESTED! TODO WIP etc.?
2023-10-19 09:27:55 +03:00
90edac262a
resolved.conf.d: add dot-dns0-appliedprivacy.conf in style of quad9-ecs-appliedprivacy 2023-10-14 19:18:45 +03:00
79210446ed
local/share/applications: add SteamOS-kscreenlocker.desktop symlink 2023-10-09 12:54:34 +03:00
5419ff1bc7
move submodule to submodules/ 2023-10-09 12:50:52 +03:00
b8f1aa69dd
unbound/00-insecure-domains.conf: add router.asus.com 2023-10-07 13:10:07 +03:00
1eeef2f511
resolved: add dot-quad9-ecs-appliedprivacy.conf for Steam Deck purposes 2023-10-01 19:06:46 +03:00
5297140958
systemd/limnoria.service: place limit on memory, commented cpuquote 2023-10-01 10:47:06 +03:00
024fd40e87
git rm etc/hosts.append
https://gitea.blesmrt.net/mikaela/gist/src/branch/master/DNS/blocklist.txt
2023-09-30 17:39:47 +03:00
d7acebbe45
chrony/sources.d/yggdrasil: remove Teknologia Avoimeksi 2023-09-30 17:38:45 +03:00
10a841acfe
systemd/journald.conf.d: add 00-journal-size.conf 2023-09-29 15:06:41 +03:00
c32910df57
systemd/syncplay-server.service: use venv
Resolves: #145

Thanks again @EchedeyLR
2023-09-29 10:57:06 +03:00
a4b7bdb51a
systemd/limnoria: use venv & update Ergo's name
Thanks @EchedeyLR (ref: mikaela/shell-things#145)
2023-09-29 10:39:44 +03:00
2c47aaae48
sshd_config.d/README.md: fix formatting, note priority 2023-09-28 14:35:21 +03:00
c0fcc82c4d
sshd_config: add 00- prefix to basic-security.conf as apparently first wins in ssh 2023-09-28 14:34:13 +03:00