Compare commits

..

4 Commits

24 changed files with 54 additions and 3 deletions

View File

@ -112,8 +112,9 @@ pref("reader.parse-on-load.force-enabled", true);
//pref("network.trr.mode", 2); //pref("network.trr.mode", 2);
defaultPref("network.trr.mode", 3); defaultPref("network.trr.mode", 3);
pref("network.trr.early-AAAA", true); pref("network.trr.early-AAAA", true);
defaultPref("network.trr.uri", "https://dns0.eu"); //defaultPref("network.trr.uri", "https://dns0.eu");
//pref("network.trr.uri", "https://dns.adguard-dns.com/dns-query"); defaultPref("network.trr.uri"), "https://dns11.quad9.net/dns-query");
//defaultPref("network.trr.uri", "https://dns.adguard-dns.com/dns-query");
// NOTE: ECH requires TRR, so mode 2 may not use it. // NOTE: ECH requires TRR, so mode 2 may not use it.
defaultPref("network.trr.disable-ECS", false); defaultPref("network.trr.disable-ECS", false);
pref("network.dns.echconfig.enabled", true); pref("network.dns.echconfig.enabled", true);

View File

@ -25,7 +25,7 @@
"DNSOverHTTPS": { "DNSOverHTTPS": {
"Enabled": true, "Enabled": true,
"Locked": false, "Locked": false,
"ProviderURL": "https://dns0.eu" "ProviderURL": "https://dns11.quad9.net/dns-query"
}, },
"DisablePocket": false, "DisablePocket": false,
"EnableTrackingProtection": { "EnableTrackingProtection": {

View File

@ -34,6 +34,7 @@
- [`disable-brave-vpn.json`](#disable-brave-vpnjson) - [`disable-brave-vpn.json`](#disable-brave-vpnjson)
- [`disable-floc.json`](#disable-flocjson) - [`disable-floc.json`](#disable-flocjson)
- [`disable-incognito.json`](#disable-incognitojson) - [`disable-incognito.json`](#disable-incognitojson)
- [`doh-cloudflare-secure.json`](#doh-cloudflare-securejson)
- [`doh-allowed.json`](#doh-allowedjson) - [`doh-allowed.json`](#doh-allowedjson)
- [`doh-dns0.json`](#doh-dns0json) - [`doh-dns0.json`](#doh-dns0json)
- [`doh-forced.json`](#doh-forcedjson) - [`doh-forced.json`](#doh-forcedjson)
@ -233,6 +234,10 @@ Disables floc or ad topics that are against privacy.
Disables incognito mode. I don't recommend this. Disables incognito mode. I don't recommend this.
## `doh-cloudflare-secure.json`
Sets Cloudflare with malware protection as the DNS-over-HTTPS server.
## `doh-allowed.json` ## `doh-allowed.json`
If no DNS over HTTPS policy is used, this unlocks the setting while still allowing downgrade to system DNS If no DNS over HTTPS policy is used, this unlocks the setting while still allowing downgrade to system DNS
@ -240,6 +245,8 @@ If no DNS over HTTPS policy is used, this unlocks the setting while still allowi
Incompatible with `doh-forced.json`. This must be used together with any other `doh-*.json` file, but only one of them. Incompatible with `doh-forced.json`. This must be used together with any other `doh-*.json` file, but only one of them.
**_No ECH._**
## `doh-dns0.json` ## `doh-dns0.json`
Simply enables DNS-over-HTTPS with DNS0.eu. Simply enables DNS-over-HTTPS with DNS0.eu.
@ -250,6 +257,8 @@ Enforces use of DNS-over-HTTPS disabling the downgrade.
Incompatible with `doh-allowed.json`. Use this together with any other `doh-*.json` file, but only one of them. Incompatible with `doh-allowed.json`. Use this together with any other `doh-*.json` file, but only one of them.
**_Required for ECH._**
## `doh-mullvad-base.json` ## `doh-mullvad-base.json`
Enables DNS-over-HTTPS with Mullvad Base, which features ad, malware & tracker blocking. Enables DNS-over-HTTPS with Mullvad Base, which features ad, malware & tracker blocking.

View File

@ -0,0 +1,3 @@
{
"DnsOverHttpsTemplates": "https://security.cloudflare-dns.com/dns-query"
}

1
etc/unbound/.gitignore vendored Normal file
View File

@ -0,0 +1 @@
conf.d

1
etc/unbound/conf.d Symbolic link
View File

@ -0,0 +1 @@
unbound.conf.d

View File

@ -35,3 +35,5 @@ forward-zone:
name: "http.badssl.com" name: "http.badssl.com"
forward-tls-upstream: no forward-tls-upstream: no
forward-addr: 8.8.8.8 forward-addr: 8.8.8.8
# vim: filetype=unbound.conf

View File

@ -23,3 +23,5 @@ server:
# Allow expired results to be served if they are in cache. The cache will # Allow expired results to be served if they are in cache. The cache will
# get updated the next time. # get updated the next time.
serve-expired: yes serve-expired: yes
# vim: filetype=unbound.conf

View File

@ -4,3 +4,5 @@ server:
# The following line will configure unbound to perform cryptographic # The following line will configure unbound to perform cryptographic
# DNSSEC validation using the root trust anchor. # DNSSEC validation using the root trust anchor.
auto-trust-anchor-file: "/var/lib/unbound/root.key" auto-trust-anchor-file: "/var/lib/unbound/root.key"
# vim: filetype=unbound.conf

View File

@ -32,3 +32,5 @@ forward-zone:
forward-addr: 2a10:50c0::2:ff@853#unfiltered.adguard-dns.com forward-addr: 2a10:50c0::2:ff@853#unfiltered.adguard-dns.com
forward-addr: 94.140.14.140@853#unfiltered.adguard-dns.com forward-addr: 94.140.14.140@853#unfiltered.adguard-dns.com
forward-addr: 94.140.14.141@853#unfiltered.adguard-dns.com forward-addr: 94.140.14.141@853#unfiltered.adguard-dns.com
# vim: filetype=unbound.conf

View File

@ -27,3 +27,5 @@ forward-zone:
# Cloudflare for 64:ff9b::/96 # Cloudflare for 64:ff9b::/96
forward-addr: 2606:4700:4700::64@853#dns64.cloudflare-dns.com forward-addr: 2606:4700:4700::64@853#dns64.cloudflare-dns.com
forward-addr: 2606:4700:4700::6400@853#dns64.cloudflare-dns.com forward-addr: 2606:4700:4700::6400@853#dns64.cloudflare-dns.com
# vim: filetype=unbound.conf

View File

@ -3,3 +3,5 @@ do-not-query-localhost: no
forward-zone: forward-zone:
name: "." name: "."
forward-addr: 127.0.2.1@53 forward-addr: 127.0.2.1@53
# vim: filetype=unbound.conf

View File

@ -18,3 +18,5 @@ forward-zone:
forward-addr: 94.140.15.15@853#dns.adguard.com forward-addr: 94.140.15.15@853#dns.adguard.com
# Updated for https://adguard.com/en/blog/adguard-dns-new-addresses.html # Updated for https://adguard.com/en/blog/adguard-dns-new-addresses.html
# vim: filetype=unbound.conf

View File

@ -56,3 +56,5 @@ forward-zone:
#forward-addr: 9.9.9.12@853#dns12.quad9.net #forward-addr: 9.9.9.12@853#dns12.quad9.net
#forward-addr: 2620:fe::12@853#dns12.quad9.net #forward-addr: 2620:fe::12@853#dns12.quad9.net
#forward-addr: 149.112.112.12@853#dns12.quad9.net #forward-addr: 149.112.112.12@853#dns12.quad9.net
# vim: filetype=unbound.conf

View File

@ -27,3 +27,5 @@ forward-zone:
# forward-addr: 193.110.81.9@853#zero.dns0.eu # forward-addr: 193.110.81.9@853#zero.dns0.eu
# forward-addr: 2a0f:fc81::9@853#zero.dns0.eu # forward-addr: 2a0f:fc81::9@853#zero.dns0.eu
# forward-addr: 185.253.5.9@853#zero.dns0.eu # forward-addr: 185.253.5.9@853#zero.dns0.eu
# vim: filetype=unbound.conf

View File

@ -29,3 +29,5 @@ forward-zone:
forward-addr: 8.8.4.4@853#dns.google forward-addr: 8.8.4.4@853#dns.google
forward-addr: 2001:4860:4860::8888@853#dns.google forward-addr: 2001:4860:4860::8888@853#dns.google
forward-addr: 2001:4860:4860::8844@853#dns.google forward-addr: 2001:4860:4860::8844@853#dns.google
# vim: filetype=unbound.conf

View File

@ -32,3 +32,5 @@ forward-zone:
#forward-addr: 9.9.9.12@853#dns12.quad9.net #forward-addr: 9.9.9.12@853#dns12.quad9.net
#forward-addr: 2620:fe::12@853#dns12.quad9.net #forward-addr: 2620:fe::12@853#dns12.quad9.net
#forward-addr: 149.112.112.12@853#dns12.quad9.net #forward-addr: 149.112.112.12@853#dns12.quad9.net
# vim: filetype=unbound.conf

View File

@ -4,3 +4,5 @@ server:
local-zone: "local." static local-zone: "local." static
local-zone: "internal." static local-zone: "internal." static
local-zone: "invalid." static local-zone: "invalid." static
# vim: filetype=unbound.conf

View File

@ -8,3 +8,5 @@ server:
verbosity: 2 verbosity: 2
# Print statistics to the log hourly # Print statistics to the log hourly
statistics-interval: 3600 statistics-interval: 3600
# vim: filetype=unbound.conf

View File

@ -16,3 +16,5 @@ forward-zone:
forward-addr: 2a0f:fc81::ffff forward-addr: 2a0f:fc81::ffff
forward-addr: 193.110.81.254 forward-addr: 193.110.81.254
forward-addr: 185.253.5.254 forward-addr: 185.253.5.254
# vim: filetype=unbound.conf

View File

@ -18,3 +18,5 @@ forward-zone:
# Google DNS64 for 64:ff9b::/96 (reserved NAT64 space) # Google DNS64 for 64:ff9b::/96 (reserved NAT64 space)
#forward-addr: 2001:4860:4860::6464 #forward-addr: 2001:4860:4860::6464
#forward-addr: 2001:4860:4860::64 #forward-addr: 2001:4860:4860::64
# vim: filetype=unbound.conf

View File

@ -1,3 +1,5 @@
server: server:
# Prefer IPv6 transport for sending DNS queries to internet nameservers. # Prefer IPv6 transport for sending DNS queries to internet nameservers.
prefer-ip6: yes prefer-ip6: yes
# vim: filetype=unbound.conf

View File

@ -2,3 +2,5 @@ server:
# Use two threads, I think more than 1 threads will help with Firefox # Use two threads, I think more than 1 threads will help with Firefox
# at times telling name resolution failed # at times telling name resolution failed
num-threads: 2 num-threads: 2
# vim: filetype=unbound.conf

View File

@ -23,3 +23,5 @@ control-key-file: "/etc/unbound/unbound_control.key"
# unbound-control certificate file. # unbound-control certificate file.
control-cert-file: "/etc/unbound/unbound_control.pem" control-cert-file: "/etc/unbound/unbound_control.pem"
# vim: filetype=unbound.conf