Commit Graph

1302 Commits

Author SHA1 Message Date
cb5c844e1c
firefox: TRR IPv6 preference & reading /etc/hosts 2024-05-14 09:34:01 +03:00
82bcaa0d80
firefox: disable prediction/prefetching
Interestingly the policy didn't seem to touch the two preferences
2024-05-14 09:25:17 +03:00
88c391fd04
firefox: don't protect any domains from extensions
OK, so this simultaneously hurts security as extensions could modify the page,
but it may improve privacy by blocking analytics and it can improve
accessibility for any accessibility extensions.
2024-05-14 09:18:26 +03:00
fd22af5142
firefox: move DoH excluded domains here 2024-05-14 09:12:21 +03:00
beee380a30
firefox: begin adding security preferences 2024-05-14 09:04:56 +03:00
7f653b52e3
firefox/policies/README: note WebsiteFilter as not that useful for me 2024-05-14 08:49:45 +03:00
7a68117198
firefox policies: go wild 2024-05-13 21:54:05 +03:00
0a0fe39076
note to self: firefox TRR policy lock locks trr.mode to 2 (TRR first) 2024-05-13 19:33:30 +03:00
95d59857eb
policies.json: lock DoH provider so I only have to configure it at one place 2024-05-13 18:07:22 +03:00
9b4cc804e5
browsers: expose to Ecosia that we are using gpo (or policies), remove extraneous PostData from Firefox
The logic here is hope that it will stop offering the addon if I am following their instructions and sending them the information. Oh and I added icons
2024-05-13 17:56:41 +03:00
d93b8eb3d5
firefox policy: disable bookmarks toolbar, default browser checking & add tracking protection exceptions 2024-05-13 06:29:17 +03:00
575332b4ce
firefox: return to Quad9 ECS, disable Pocket (I don't actually use it), fix search engine typo 2024-05-12 21:43:33 +03:00
f6e8c3fb45
chromium/managed: remember I have a README.md and update it 2024-05-12 18:42:50 +03:00
bb84a4ed65
chromium/managed: add generative-ai.json 2024-05-12 18:40:48 +03:00
4a642d3dea
chromium/managed: add amber-theme-colour.json.sample
It looks fancy, while not exactly for me.
2024-05-12 18:34:10 +03:00
87f5c78298
chromium: move safe browsings from managed to recommended
I just don't feel right with them being in managed
2024-05-12 18:27:18 +03:00
e5fc9bfbaf
{firefox,chromium}: add Plasma Integration mainly for family 2024-05-12 15:49:12 +03:00
5ea86f54a7
etc/hosts/dns: add the two other adguard options 2024-05-12 15:36:05 +03:00
c9a4a1c7cc
chromium: add doh-adguard policies 2024-05-12 15:30:52 +03:00
dceb88b272
Revert "chromium/recommended/ecosia: trick Brave into using it as well"
This reverts commit 4835a8c89d.

It's too annoying and impractical compared to my apps page.
2024-05-12 09:26:05 +03:00
4835a8c89d
chromium/recommended/ecosia: trick Brave into using it as well 2024-05-11 22:31:26 +03:00
ef00ae4d90
chromium: set Ecosia's DefaultSearchProviderNewTabURL 2024-05-11 22:24:56 +03:00
a4c35994e8
chromium: rename black-theme-colour.json -> black-theme-colour.json.sample to stop me accidentally applying it 2024-05-11 20:36:08 +03:00
4743efb556
chromium: add enable-google-safebrowsing-less-private.json.sample 2024-05-11 20:34:36 +03:00
e2dd25113a
chromium: ExtensionManifestV2Availability expects 2, not true 2024-05-11 19:49:04 +03:00
0ad28afe47
chromium: allow manifestv2, enable chromecast, safebrowsing, passwordleakdetection, efficiencymode, suggest disabling bookmarks bar and document previously forgotten policies 2024-05-11 19:44:16 +03:00
d6aae8fb9a
browsers: add OISD (big) to AdNauseam 2024-05-11 18:01:05 +03:00
7430dd9e99
{firefox,chromium}: add HTTP Indicator 2024-05-11 17:35:37 +03:00
28542ca06a
firefox policy: clean-up attempt 2024-05-11 17:28:29 +03:00
ba4fb50c76
firefox: set DoH to Quad9 DNS as a more international option, Ecosia Search Engine 2024-05-11 17:26:33 +03:00
fef359500f
firefox: add AdNauseam configuration 2024-05-11 17:24:44 +03:00
ec40dd0250
chromium: initial commit of AdNauseam managed configuration 2024-05-11 17:22:26 +03:00
972c866541
chromium/aminda-extensions cleanup 2024-05-11 16:46:20 +03:00
9a974e7bca
{firefox,chromium,edge}: add Ecosia 2024-05-11 16:16:12 +03:00
97bbaa09a1
dracut.conf.d: fix name recovery to rescue, add yes_rescue counterpart 2024-05-11 10:41:41 +03:00
9fcb0aa289
dnf.conf: note install_only_limit and kernel updates 2024-05-10 19:27:32 +03:00
0cb5b0992b
sudoers.d/nordvpnd: instead of restarting DNS, allow reloading it. Also IPv6 enabling 2024-05-10 18:27:06 +03:00
c81c1dd7d0
unbound: restore dot-dns0-quad9.conf with IPv4 for DNS0 & IPv6 for Quad9 ECS
This partially reverts commit 422ab0de4e
2024-05-09 20:02:23 +03:00
93e2ab81dd
chromium policy: fix doh-cloudflare-secure.json name inconsistency 2024-05-09 17:11:17 +03:00
764073e241
etc/hosts/blocklist: use only ::1, systemd-resolved will fix it automatically to 127.0.0.1 too 2024-05-09 12:05:37 +03:00
dff016aa45
hosts/dns: IPv4 represented as IPv6 is technically valid, but this feels so wrong... 2024-05-09 10:21:23 +03:00
f5223b871f
etc/hosts/dns: attempt to block private ECS providers on IPv6 2024-05-09 09:48:00 +03:00
9f2b75368d
etc/hosts/dns: add dns9.quad9.net alias (note the first 9) 2024-05-09 09:41:03 +03:00
1e807e888c
etc: add NetworkManager-resolv.conf-restore.bash 2024-05-09 09:38:25 +03:00
6567488801
NetworkManager: also add explicit no-systemd-resolved.conf 2024-05-09 09:31:39 +03:00
0566ebbbc2
NetworkManager: add comments on {dns-none,paws-off-my-resolv,systemd-resolved}.conf 2024-05-09 09:29:53 +03:00
8f11f1a512
NetworkManager: fix dns-none.conf (no longer symlink) 2024-05-09 09:26:29 +03:00
c751a61146
NetworkManager: fix no-search-domains.conf & systemd-resolved.conf
Although in systemd-resolved.conf everything is already implied
2024-05-09 09:25:20 +03:00
71582a9b95
NetworkManager/conf.d: add vim modelines 2024-05-09 09:21:21 +03:00
6900a44b4a
NetworkManager/paws-off-my-resolv.conf: actually use rc-manager instead of dns=none (commented) 2024-05-09 09:19:22 +03:00
d7703b6b63
dnf.conf: comment fastestmirror and explain it in a comment 2024-05-08 19:38:00 +03:00
3b5434eb1d
etc: add traditional-resolv.conf-generate.bash which takes three arguments and has no trust-ad 2024-05-07 19:29:05 +03:00
8fe31b9e64
fix edge paths 2024-05-07 11:29:37 +03:00
e7b26cd343
chromium/policies/managed: add non-functional Edge policies 2024-05-07 11:23:30 +03:00
e4d691f2b1
unbound: prefer IPv4 with private ECS using DoT servers 2024-05-07 08:26:20 +03:00
afb0801430
unbound: add doh-local.sample
Works otherwise, but self-signed cert didn't satisfy Chromium I wanted to point at it
2024-05-06 18:55:00 +03:00
10bec4c782
resolv.tsv: use more appropiate link for AdGuard prvate ECS 2024-05-06 09:05:00 +03:00
f5b76c1341
unbound: add .sample to threads.conf, comment to question it's necessity and usage 2024-05-05 11:08:52 +03:00
b18df5462c
unbound: add/rename/fix prefer-ip{4,6}.conf 2024-05-04 09:05:16 +03:00
0063e2409b
etc/dracut.conf.d: add sedric configs 2024-05-03 21:19:32 +03:00
175256d8e4
etc/dnf/protected.d: add systemd-ukify.conf although not yet in use 2024-05-03 20:48:14 +03:00
252f77ab0c
systemd-resolved & unbound: comment ECS servers again.
This partially reverts 85c7fedcb2 and will be explained at https://aminda.eu/n/dns soon
2024-05-03 18:07:51 +03:00
aa865106db
unbound: correct ecs.conf.sample 2024-05-03 17:35:15 +03:00
962817874e
etc/dracut.conf.d: add UKI generation & Lumina cmdline 2024-05-03 16:24:03 +03:00
85c7fedcb2
systemd-resolved, unbound: only ECS IPv6 2024-05-03 06:23:37 +03:00
6cae19ba4f
unbound: more ecs.conf.sample experimentation 2024-05-02 21:32:39 +03:00
32c99a2d43
etc/resolv.conf: fix comment explaining rotate 2024-05-01 13:08:06 +03:00
1aca183f92
aminda-nocron-reboot.service: fix conflict with systemd-zram-setup@zram0.service 2024-05-01 10:38:54 +03:00
6e0f72c7b1
aminda-nocron-reboot.service: split duperemove and sysctl -p --system to aminda-duperemove.service & sysctl-p--system.service 2024-05-01 10:22:57 +03:00
aa6aad28ba
resolv: follow the same order as man resolv.conf 2024-05-01 10:13:30 +03:00
ba298f94a5
resolv: increase timeout to 2 (match unbound/RFC 8767), decrease attempts to 2, rotate 2024-05-01 09:54:07 +03:00
447385fdb8
chrony: rename ntppool.sources -> ntp-pool.sources 2024-04-30 21:02:28 +03:00
78136f7437
systemd/timesyncd.conf.d: don't only use ntp pool as a fallback 2024-04-30 21:01:46 +03:00
f6e9aa58da
unbound: add replace-systemd-resolved.conf.sample for listening on systemd-resolved ports 2024-04-30 20:30:15 +03:00
4882cb66be
systemd-resolv.conf-generate.bash: who is going to stop me from specifying the same resolver thrice? 2024-04-30 20:21:12 +03:00
b9daad6a2f
resolv.conf: explain 127.0.0.54 2024-04-30 20:16:46 +03:00
d6e4fd1be7
etc: create systemd-resolv.conf-generate.bash & systemd-resolv.conf-restore.bash, mention them in resolv.conf 2024-04-30 20:05:53 +03:00
fa5462212d
aminda-nocron-reboot.service: add zram-generator just in case 2024-04-30 19:10:28 +03:00
72ea5ca51e
unbound: fix typo in (1)5 minutes cache, apparently a commit once removed the 1 2024-04-30 17:34:01 +03:00
5d4e0e10dd
unbound/min-ttl-hour.conf: also print the stats hourly, not every 15 minutes 2024-04-30 17:26:14 +03:00
437b69bd6e
unbound: apparently rename min-ttl.conf.sample to min-ttl-five-min.conf 2024-04-30 17:17:46 +03:00
9671adf293
unbound: break statistics interval from logging.conf to min-ttl* 2024-04-30 17:11:32 +03:00
819d6a782e
unbound: add mixed-case-queries.conf 2024-04-30 17:11:09 +03:00
08de11b594
unbound/min-ttl-hour.conf: fix comment 2024-04-30 06:52:46 +03:00
87bedac239
unbound: cut cache.conf.SAMPLE into more descriptive files 2024-04-30 06:45:53 +03:00
531cdd82c5
unbound/cache.conf.SAMPLE: fix oversight, logging.conf: reducei nterval to quaterly 2024-04-29 20:48:51 +03:00
0d0be5f9bc
unbound/cache.conf: rename to cache.conf.SAMPLE and add scary warnings there 2024-04-29 20:46:00 +03:00
b54f55a1bc
document Microsoft Edge recommended policy 2024-04-29 12:39:58 +03:00
788143ec01
init-browser-policies.bash: touch Firefox, break LibreWolf, verbose, handle Edge Recommended separately, warn about that too, etc.? 2024-04-29 12:25:17 +03:00
d377157b46
init-browser-policies.bash: manage Edge recommended profiles separately 2024-04-29 12:15:26 +03:00
a14446ed71
unbound/dns-over-tls.conf: add Cloudflare, Mullvad & Control D
This is now practically https://www.privacyguides.org/en/dns/ plus Appliedprivacy
2024-04-29 08:29:07 +03:00
0ee83e9a90
chrony/sources: enable xleave with ~everything
I was unable to find much information about this, but see the previous commit and Brave Leo said

> Yes, it's generally acceptable to use interleaved mode with a public NTP (Network Time Protocol) server, as long as you comply with the server's usage policies. This mode allows for time synchronization while also providing a fallback if the primary time source fails. However, keep in mind that public NTP servers are often subject to heavy traffic, so they may not provide the most accurate or timely synchronization.
2024-04-29 06:55:16 +03:00
6f0184b519
chrony/sources/ntppool: enable xleave
From https://community.ntppool.org/t/chrony-conf-noclientlog-vs-clientloglimit/2263/4 I got the impression it's fine to do and the manual says it's compatible with the basic mode and xleave supporting servers may still reply in basic mode sometimes so this shouldn't break anything
2024-04-29 06:51:27 +03:00
0f66e552c1
Revert "nts-servers.sources: no preferring non-ISP servers"
This reverts commit ff1bc7b3ba.
2024-04-28 20:08:42 +03:00
4081c974bb
unbound/cache.conf: make the min ttl an hour in my quest to break DNS 2024-04-28 19:15:42 +03:00
23672028d5
unbound/ecs.conf: attempt to send larger subnets than default around 2024-04-28 18:02:18 +03:00
d64b4f2001
systemd-resolved: add DNA/Moi & Elisa DNS servers
I was unable to find authoritative source for what is Telia's DNS
2024-04-28 16:14:30 +03:00
44e22716f9
chrony sources: make add .sample to local-servers.sources, make it more useful for me 2024-04-28 10:02:31 +03:00
18a04b1351
{firefox,chromium}: disable protections for one.one.one.one
For some reason they make connection to 1.1.1.1 appear as no or unreachable.
2024-04-28 09:21:29 +03:00
55dcb2f2cd
systemd-resolved/98-local-resolver.conf: fix comment talking about alphabet while everything is now numerals 2024-04-28 09:17:07 +03:00
35b99a6bc0
systemd-resolved: add 99-lan-resolver.conf.sample for trusted LANs 2024-04-28 09:13:46 +03:00
5ab33c154e
systemd-resolved: rename conf files to have a number prefix 2024-04-28 09:13:20 +03:00
9375b3c2b2
unbound: add dot-cloudflare.conf 2024-04-27 21:22:28 +03:00
2aa221b77f
unbound/cache: take the cache-min-ttl: 3000 challenge
It will not affect web browsers which are using DoH for ECH eliminating most of breakage and I am just curious on will anything outside of web browser suffer that.
2024-04-27 18:35:22 +03:00
652c11391f
unbound/cache.conf: explicitly set serve-expired-reply-ttl to 30 2024-04-27 16:52:39 +03:00
d3773468fa
chromium/policies: add doh-{disabled,google}.json 2024-04-27 16:18:40 +03:00
a083a9d704
unbound/cache: comment cache-min-ttl=900, add commented 3000 2024-04-27 15:42:29 +03:00
30a27f980d
unbound/cache.conf: RFC 8767ish configuration 2024-04-27 15:00:12 +03:00
813878a4de
systemd/{iwd,systemd-networkd}.service.d: add appropiate symlinks 2024-04-27 12:25:00 +03:00
c59fe1ae53
sudoers.d/nordvpnd: also allow restarting tor-client.service
I have a suspicion I am adding it to the script sooner or later
2024-04-27 12:21:07 +03:00
ef9c4acfc3
sudoers.d/nordvpnd: also allow restarting Tor 2024-04-27 12:10:15 +03:00
955e52f5af
yum.repos.d: add google-Chrome.repo to workaround their crontab disliking my system 2024-04-27 10:21:20 +03:00
8fe7ff55e6
chromium: add managed black-theme-colour & recommended apps-as-homepage, disable-default-browser-check 2024-04-27 10:08:43 +03:00
b76b7cac5c
systemd/user: review vpn wants, rm transmission-daemon copy-paste 2024-04-27 08:34:46 +03:00
2113b593e7
Chromium & Firefox: force Bitwarden (for passkeys) 2024-04-27 08:32:39 +03:00
da85d0d9c7
firefox & chromium: allow PrivacyPass attestor & Keyoxide.org 2024-04-27 08:31:05 +03:00
61dc3706ab
systemd/{chrony,i2pd,yggdrasil}.service.d/mullvad-exclude.conf: fix mistakes and Requires= 2024-04-26 17:43:37 +03:00
1b64bc5e13
systemd/service.d: fix typo & use Requires= where appropiate 2024-04-26 17:38:33 +03:00
db7de1c3e4
systemd/service.d/unbound-wanted.conf: break circular skipping by removing After= 2024-04-26 17:35:31 +03:00
7f410148e3
aminda-nocron-rebootish.service: repeat that dns should be running 2024-04-26 16:13:39 +03:00
1d7308e74e
unbound: explicitly enable ede and it's log 2024-04-26 13:53:50 +03:00
2f585209e7
matterbridge-cleanup.timer: use more human friendly term minutely on OnCalendar= 2024-04-26 13:21:20 +03:00
65f58dc224
systemd: aminda-nocron-rebootish.{service,timer} is a delayed variant of -ish 2024-04-26 13:16:33 +03:00
c55b20a89a
move systemd user units from conf/systemd/user to etc/systemd/user
symlink remains to show what is the correct location
2024-04-26 13:05:08 +03:00
b36fe67bc3
systemd/user: attempt to flatpak-update-user.{service,timer} 2024-04-26 13:03:05 +03:00
b8f720fa7f
aminda-nocron-reboot.timer: fix typo in comment 2024-04-26 12:48:47 +03:00
9e38fdf223
aminda-nocron-reboot.timer: add RemainAfterElapse=false 2024-04-26 12:37:55 +03:00
90b64c9543
systemd: rename aminda-nocron -> aminda-nocron-reboot for clarity
also opens up aminda-nocron-hourly etc.
2024-04-26 12:30:58 +03:00
b0ec7cffde
chromium/README: EnableOnlineRevocationChecks does also enable CRL 2024-04-26 11:27:11 +03:00
16d2f74135
systemd/aminda-nocron.service: explicitly start DNS too 2024-04-26 11:08:15 +03:00
def77bc4c3
systemd: add aminmda-nocron.{service,timer} for my @reboot crontabs for cronless systems (SteamOS) 2024-04-26 10:43:08 +03:00
901dbfe138
etc/hosts: attempt to increase legibility by adding leading and trailing # 2024-04-25 19:45:11 +03:00
21b59adfd2
etc/hosts/hostname: copy Debian behaviour as a good practice 2024-04-25 19:40:56 +03:00
fb65f717fc
etc: cleanup symlinks/files handled by init-browser-policies.bash
They brought no value to me, just confused me in git forges by clicktrapping me and not following the symlinks
2024-04-25 17:31:09 +03:00
6375d55b8f
systemd-resolved/mullvad: default to base for consistency with unbound 2024-04-25 17:27:55 +03:00
17e0b68d20
unbound: add dot-mullvad.conf defalting on base
I found myself missing this on an old family PC that has limited resources and as I didn't have this file at hand, I just went with AdGuard which will work too.
2024-04-25 17:24:41 +03:00
a17ff2903a
unbound/nordvpn-domains.conf: add comments/sources, fix duplicate zone, add missing domains 2024-04-25 15:07:37 +03:00
bbeb1d3e02
unbound/nordvpn: rename, send only their domains to them 2024-04-25 14:34:47 +03:00
046b9c5f1a
systemd: use more descriptive drop-in name unbound-wanted.conf instead of unbound.conf 2024-04-25 14:10:26 +03:00
1ea9fff29a
chromium: declare more things as .badidea 2024-04-25 14:01:54 +03:00
f87c4899b6
chromium: add dns-over-https.json.badidea and declare it as a bad idea 2024-04-25 13:57:01 +03:00
861b35c25f
systemd-resolved: add the other applied-privacy.net port too 2024-04-25 13:47:18 +03:00
342e3116a6
systemd-resolved: another attempt at local resolvers 2024-04-25 13:45:37 +03:00
d17ad34650
unbound/dns-over-tls.conf: note Applied Privacy does no ECS, add 853, add Quad9 unfiltered (ECS commented) 2024-04-25 13:26:01 +03:00
52b0807fcb
systemd/yggdrasil.service.d: rename nordvpnd to restore-ipv6.conf 2024-04-25 12:52:30 +03:00
520470e3dd
systemd: add firewalld-icmpv6.conf as drop-in 2024-04-25 12:51:03 +03:00
45cf5ecf61
opt/chromium/policies/managed: update documentation about working preferred over ECH enforced 2024-04-25 11:00:40 +03:00
32883d5c73
chromium: allow DoH downgrade to at least work. Breaks ECH :( 2024-04-25 08:15:28 +03:00
7c80e2c329
NetworkManager: paws-off-my-resolv.conf 2024-04-24 18:21:33 +03:00
38152ab152
etc/sudoers.d: add vim modelines just in case
I think it autodetected them correctly though
2024-04-24 18:16:42 +03:00