Compare commits

...

50 Commits

Author SHA1 Message Date
2ba91b0558
browsers: mark DarkReader as allowed, rename Ecosia on Chromium, update comments, pre-commit 2025-03-28 10:21:05 +02:00
1ad38a09b3
firefox: allow unloading Ecosia since unrequired on ESR/Nightly. Anyway no longer conflicts with policy 2025-03-27 20:03:31 +02:00
e1f7db3a7e
firefox: force Ecosia and rename it as an experiment 2025-03-27 19:55:15 +02:00
7370ab30e1
firefox: quickly consider extension private_browsing permissions and install status (do as I say, not as I do?) 2025-03-27 19:50:39 +02:00
bd0dd51936
Address woke alerts 2025-03-27 15:19:34 +02:00
930ef6d048
firefox: self-sabotage by allowing unloading of grayscale bro 2025-03-27 14:44:45 +02:00
a4cb1b9707
init-browser-policies.bash: don't pretend I have other Firefox policies 2025-03-27 14:43:54 +02:00
7f1bdce856
autoconfig.js.online: remove prettier breakage 2025-03-27 14:39:39 +02:00
29d4dbb9bd
firefox: restore online autoconfig 2025-03-27 14:29:42 +02:00
8be3b805f0
init-browser-policies.bash: fix firefox autoconfig handling although online 2025-03-27 14:25:23 +02:00
308a20c693
init-browser-policies.bash: fix setfacl, uncomment Firefox flatpaks 2025-03-27 14:11:55 +02:00
2077219f56
init-browser-policies.bash: rootless SteamOS operation 2025-03-27 13:06:29 +02:00
255554e0b6
init-browser-policies.bash: chromium flatpak support 2025-03-27 12:33:23 +02:00
6f8aeddf30
init-browser-policies.bash: initial firefox flatpak support 2025-03-27 12:20:40 +02:00
f932e07512
firefox: clarify media autoplay 2025-03-27 11:44:20 +02:00
b713a04ba2
update pnpm and add corepack as a dependency 2025-03-25 10:27:34 +02:00
ca17627ce0
update prettier config version 2025-03-25 10:22:55 +02:00
f4407515ab
firefox: add a reminder on OpenDyslexic not working in font config
This reverts commit 22df7c73a864aed3c0d5083c970d34cb0a093872.
2025-03-24 13:47:12 +02:00
22df7c73a8
firefox: prioritise OpenDyslexic over Inclusive Sans 2025-03-24 13:40:13 +02:00
75f6119e80
firefox: enable fission 2025-03-23 21:21:30 +02:00
85d61ee175
{chromium,firefox}: test the allowed rule with NoScript & JShelter 2025-03-22 15:48:52 +02:00
032069492a
{chromium,firefox}: allow unloading jshelter due to too much breakage 2025-03-21 20:56:38 +02:00
17331de845
{chromium,firefox}: pin Go European 2025-03-21 16:58:33 +02:00
83ed191950
{firefox,chromium}: prepare for return of NoScript 2025-03-21 10:08:37 +02:00
dbdd6cb640
firefox: add onepin-opensc-pkcs11.so for Debian & Fedora 2025-03-20 21:05:31 +02:00
5cd21e1e13
firefox: add chrome-mask 2025-03-20 13:21:56 +02:00
a6bba46ab5
{chromium,firefox}: add JShelter 2025-03-19 21:33:50 +02:00
ff0c63ee3b
{chromium,firefox}: remove NoScript 2025-03-19 21:27:56 +02:00
de0ce17b6c
{chromium,firefox}#uBo: enable colorBlindFriendly in my grayscale efforts 2025-03-19 16:30:14 +02:00
b669950ad4
init-browser-policies.bash: add todo comments 2025-03-19 16:26:43 +02:00
d00d3e6bef
init-browser-policies.bash: add support for chromium snap 2025-03-19 16:14:52 +02:00
b47a0b8bcb
chromium: add Midnight Lizard
While ManifestV2, currently it seems to be the most reputable extension with grayscale mode that I was able to find with quick lookup
2025-03-19 09:46:55 +02:00
d7f63a25e5
firefox: add grayscale bro 2025-03-19 09:43:58 +02:00
f0329b5f5d
{bash,zsh}rc: add note on going gray 2025-03-19 09:39:50 +02:00
b90f4fea2f
corepack up 2025-03-19 09:35:00 +02:00
f9bb679e5d
firefox: take a firmer stance against AI
Sourcehut, AO3, Codeberg, and whoever else are having the same issue in my circles. The ID is Mozilla Orbit.
2025-03-18 17:22:52 +02:00
fbe4e58767
firefox: default enable browser.taskbarTabs.enabled
https://www.omgubuntu.co.uk/2025/03/firefox-nightly-supports-web-apps-taskbar-tabs
2025-03-18 10:44:21 +02:00
630f8c526d
chromium: add Go European & TOSDR 2025-03-17 19:25:58 +02:00
a322d8dde1
remove python version specification 2025-03-17 19:20:48 +02:00
bc03e64c3d
firefox: add goeuropean, gps-detet & tosdr 2025-03-17 19:19:14 +02:00
397092d420
firefox: make ui denser 2025-03-17 17:14:24 +02:00
14c8986fd5
{bash,zsh}rc: add deck to list of my accounts for motivational messages 2025-03-17 15:28:08 +02:00
550d4260f2
firefox: smart tab grouping? 2025-03-15 12:07:43 +02:00
2f3ae973e4
chromium: rm generative-ai.json 2025-03-14 16:13:39 +02:00
398883ef29
firefox: default to Le Chat by Mistral as the only european AI, if enabled 2025-03-14 16:12:52 +02:00
710606caba
unbound: apparently I still use ECS 2025-03-13 21:45:50 +02:00
ef69158c92
unbound/dns-over-tls.conf: swap standard ports for excotic ones where available 2025-03-13 08:40:49 +02:00
f5ad25059d
{chromium,firefox}#uBo: add bpwc 2025-03-13 08:37:15 +02:00
2bd28c084c
unbound/dns-over-tls.conf: comment servers currently not in my consideration 2025-03-12 20:50:24 +02:00
e52b25bfaa
{unbound,systemd-resolved}: cleanup, disable ECS in unused quad9 file 2025-03-12 20:43:26 +02:00
33 changed files with 315 additions and 409 deletions

1
.gitignore vendored
View File

@ -19,6 +19,7 @@
!.python-version !.python-version
!.renovate-shared.json* !.renovate-shared.json*
!.reuse !.reuse
!.wokeignore
# Certificates (unlikely to happen, but better safe than sorry) # Certificates (unlikely to happen, but better safe than sorry)
*.pem *.pem

View File

@ -9,8 +9,6 @@ ci:
default_language_version: default_language_version:
node: "lts" node: "lts"
# Remember .python-version !
python: "3.13"
ruby: ".ruby-version" ruby: ".ruby-version"
repos: repos:
@ -73,7 +71,7 @@ repos:
# GitHub Actions etc. configuration validity checking # GitHub Actions etc. configuration validity checking
- repo: https://github.com/python-jsonschema/check-jsonschema - repo: https://github.com/python-jsonschema/check-jsonschema
rev: 0.31.3 rev: 0.32.1
hooks: hooks:
#- id: check-jsonschema #- id: check-jsonschema
- id: check-dependabot - id: check-dependabot

View File

@ -1 +0,0 @@
system

17
.wokeignore Normal file
View File

@ -0,0 +1,17 @@
# ASCII armoured GPG content, I don't control words included.
*.asc
# When you become IRC operator on Charybdis IRCd, it will tell you:
# We would like to take this moment to remind you that we accept
# absolutely no liability for the INSANITY you're about to endure.
# I think it's appropiate reminder for logging in as root (which people
# shouldn't be doing, sudo logs superuser actions better) and thus I wish to
# keep it in my configuration and I hope everyone doing system administration
# understands it without getting upset. That is not to say I am not open for
# alternatives, if you know of an more inclusive saying and are a person,
# please contact me.
rc/bashrc
rc/zshrc
# A certain CAPITALIZED word above is an issue.
.wokeignore

View File

@ -1,5 +1,3 @@
/** @format */
// This file belongs to Firefox `default/pref` directory. // This file belongs to Firefox `default/pref` directory.
// E.g. /usr/lib64/firefox/defaults/pref/ or ~/.local/firefox/defaults/pref/ // E.g. /usr/lib64/firefox/defaults/pref/ or ~/.local/firefox/defaults/pref/

View File

@ -1,15 +1,12 @@
/** @format */
// This file belongs to Firefox `default/pref` directory as `autoconfig.js`. // This file belongs to Firefox `default/pref` directory as `autoconfig.js`.
// E.g. /usr/lib64/firefox/defaults/pref/autoconfig.js // E.g. /usr/lib64/firefox/defaults/pref/autoconfig.js
// WARNING: lockPref() IS NOT ALLOWED HERE! // WARNING: lockPref() IS NOT ALLOWED HERE!
//pref("autoadmin.global_config_url","https://codeberg.org/Aminda/shell-things/raw/branch/master/conf/firefox-forbidden-policies.js"); // prettier-ignore
pref( pref("autoadmin.global_config_url", "https://raw.githubusercontent.com/Mikaela/shell-things/refs/heads/cxefa/conf/firefox-forbidden-policies.js");
"autoadmin.global_config_url", // prettier-ignore
"file:///home/aminda/public_html/autoconfig.js", //pref("autoadmin.global_config_url", "file:///home/aminda/public_html/autoconfig.js");
);
pref("general.config.obscure_value", 0); pref("general.config.obscure_value", 0);
pref("autoadmin.refresh_interval", 120); pref("autoadmin.refresh_interval", 120);
pref("autoadmin.offline_failover", true); pref("autoadmin.offline_failover", true);

View File

@ -28,6 +28,8 @@ lockPref(
"font.name-list.monospace.x-western", "font.name-list.monospace.x-western",
"Comic Shanns Mono, Roboto Mono, Liberation Mono, Noto Sans Mono, monospace", "Comic Shanns Mono, Roboto Mono, Liberation Mono, Noto Sans Mono, monospace",
); );
// REMEMBER! OpenDyslexic won't work here for some reason, use the extension
// once it returns to Firefox! https://github.com/OpenDyslexic/extension/issues/75
lockPref( lockPref(
"font.name-list.sans-serif.x-cyrillic", "font.name-list.sans-serif.x-cyrillic",
"Inclusive Sans, Roboto, Liberation Sans, Noto Sans, sans-serif", "Inclusive Sans, Roboto, Liberation Sans, Noto Sans, sans-serif",
@ -86,5 +88,8 @@ lockPref("sidebar.revamp", true);
lockPref("sidebar.verticalTabs", true); lockPref("sidebar.verticalTabs", true);
lockPref("sidebar.visibility", "always-show"); lockPref("sidebar.visibility", "always-show");
// Per process isolation
lockPref("fission.autostart", true);
// No making configuration on the last line of the file! // No making configuration on the last line of the file!
// //

View File

@ -1,4 +1,5 @@
# Itwjyg is a MacBook 7,1, brcmsmac is the WLAN driver, Nouveau is the # Itwjyg is a MacBook 7,1, brcmsmac is the WLAN driver, Nouveau is the
# driver that actually gets picture visible and I think nvidia is the # driver that actually gets picture visible and I think nvidia is the
# propietary driver that doesn't manage that. # propietary driver that doesn't manage that.
# wokeignore:rule=blacklist
GRUB_CMDLINE_LINUX_DEFAULT="$GRUB_CMDLINE_LINUX_DEFAULT brcmsmac nouveau module_blacklist=nvidia" GRUB_CMDLINE_LINUX_DEFAULT="$GRUB_CMDLINE_LINUX_DEFAULT brcmsmac nouveau module_blacklist=nvidia"

View File

@ -1,2 +1,3 @@
# wokeignore:rule=blacklist
kernel_cmdline="root=UUID=c3df30ca-878b-4125-bcb4-ba3ba4398efd rw rootflags=subvol=root rd.lvm.lv=fedora_localhost-live/root rd.luks.uuid=luks-f9a33e19-4176-44b3-8e06-2ee7fb70f3d0 mitigations=auto,nosmt btusb.force_scofix=1 btusb.enable_autosuspend=0 cpufreq.default_governor=schedutil rd.driver.blacklist=nouveau modprobe.blacklist=nouveau" kernel_cmdline="root=UUID=c3df30ca-878b-4125-bcb4-ba3ba4398efd rw rootflags=subvol=root rd.lvm.lv=fedora_localhost-live/root rd.luks.uuid=luks-f9a33e19-4176-44b3-8e06-2ee7fb70f3d0 mitigations=auto,nosmt btusb.force_scofix=1 btusb.enable_autosuspend=0 cpufreq.default_governor=schedutil rd.driver.blacklist=nouveau modprobe.blacklist=nouveau"
# vim: filetype=conf # vim: filetype=conf

View File

@ -52,7 +52,7 @@
"advancedSettings": [ "advancedSettings": [
[ [
"filterAuthorMode", "filterAuthorMode",
"true" "false"
], ],
[ [
"trustedListPrefixes", "trustedListPrefixes",
@ -102,6 +102,7 @@
"ublock-cookies-adguard", "ublock-cookies-adguard",
"ublock-cookies-easylist", "ublock-cookies-easylist",
"https://secure.fanboy.co.nz/fanboy-annoyance.txt", "https://secure.fanboy.co.nz/fanboy-annoyance.txt",
"https://gitflic.ru/project/magnolia1234/bypass-paywalls-clean-filters/blob/raw?file=bpc-paywall-filter.txt",
"https://ads-for-open-source.readthedocs.io/en/latest/_static/lists/opensource-ads.txt" "https://ads-for-open-source.readthedocs.io/en/latest/_static/lists/opensource-ads.txt"
] ]
}, },
@ -118,6 +119,10 @@
"collapseBlocked", "collapseBlocked",
"true" "true"
], ],
[
"colorBlindFriendly",
"false"
],
[ [
"ignoreGenericCosmeticFilters", "ignoreGenericCosmeticFilters",
"true" "true"
@ -214,23 +219,42 @@
"ATBC@EasonWong": { "ATBC@EasonWong": {
"default_area": "menupanel", "default_area": "menupanel",
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/adaptive-tab-bar-colour/latest.xpi", "install_url": "https://addons.mozilla.org/firefox/downloads/latest/adaptive-tab-bar-colour/latest.xpi",
"installation_mode": "normal_installed", "installation_mode": "force_installed",
"private_browsing": false "private_browsing": true
}, },
"CanvasBlocker@kkapsner.de": { "CanvasBlocker@kkapsner.de": {
"comment": "Requested by LibreAwoo for those who don't have RFP/FPP, neither of which I can specify through this policy. Additionally its own description says compatible with the Firefox integrated one.", "blocked_install_message": "Likely overlaps with JShelter in a negative way",
"comment": "Requested by LibreAwoo for those who don't have RFP/FPP, neither of which I can specify through this policy. Additionally its own description says compatible with the Firefox integrated one. Anyway I will probably unload it personally.",
"default_area": "menupanel", "default_area": "menupanel",
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/canvasblocker/latest.xpi", "install_url": "https://addons.mozilla.org/firefox/downloads/latest/canvasblocker/latest.xpi",
"installation_mode": "normal_installed", "installation_mode": "blocked",
"private_browsing": true, "private_browsing": true,
"restricted_domains": [] "restricted_domains": []
}, },
"addon@darkreader.org": { "addon@darkreader.org": {
"default_area": "navbar", "default_area": "navbar",
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/darkreader/latest.xpi", "install_url": "https://addons.mozilla.org/firefox/downloads/latest/darkreader/latest.xpi",
"installation_mode": "normal_installed", "installation_mode": "allowed",
"private_browsing": true "private_browsing": true
}, },
"chrome-mask@overengineer.dev": {
"default_area": "navbar",
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/chrome-mask/latest.xpi",
"installation_mode": "force_installed",
"private_browsing": false
},
"goeuropean@example.com": {
"default_area": "navbar",
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/go-european/latest.xpi",
"installation_mode": "force_installed",
"private_browsing": false
},
"gps-detect@allanwirth.com": {
"default_area": "menupanel",
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/gpsdetect/latest.xpi",
"installation_mode": "force_installed",
"private_browsing": false
},
"ipvfoo@pmarks.net": { "ipvfoo@pmarks.net": {
"default_area": "menupanel", "default_area": "menupanel",
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/ipvfoo/latest.xpi", "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ipvfoo/latest.xpi",
@ -238,6 +262,12 @@
"private_browsing": false, "private_browsing": false,
"restricted_domains": [] "restricted_domains": []
}, },
"jid0-3GUEt1r69sQNSrca5p8kx9Ezc3U@jetpack": {
"default_area": "navbar",
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/terms-of-service-didnt-read/latest.xpi",
"installation_mode": "force_installed",
"private_browsing": false
},
"jid1-MnnxcxisBPnSXQ-eff@jetpack": { "jid1-MnnxcxisBPnSXQ-eff@jetpack": {
"blocked_install_message": "Already installed from AMO", "blocked_install_message": "Already installed from AMO",
"default_area": "navbar", "default_area": "navbar",
@ -254,11 +284,17 @@
"private_browsing": true, "private_browsing": true,
"restricted_domains": [] "restricted_domains": []
}, },
"jsr@javascriptrestrictor": {
"default_area": "navbar",
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/javascript-restrictor/latest.xpi",
"installation_mode": "allowed",
"private_browsing": true
},
"offline-qr-code@rugk.github.io": { "offline-qr-code@rugk.github.io": {
"default_area": "navbar", "default_area": "navbar",
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/offline-qr-code-generator/latest.xpi", "install_url": "https://addons.mozilla.org/firefox/downloads/latest/offline-qr-code-generator/latest.xpi",
"installation_mode": "force_installed", "installation_mode": "force_installed",
"private_browsing": true, "private_browsing": false,
"restricted_domains": [] "restricted_domains": []
}, },
"optout@google.com": { "optout@google.com": {
@ -285,7 +321,7 @@
"uBlock0@raymondhill.net": { "uBlock0@raymondhill.net": {
"default_area": "navbar", "default_area": "navbar",
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi", "install_url": "https://addons.mozilla.org/firefox/downloads/latest/ublock-origin/latest.xpi",
"installation_mode": "normal_installed", "installation_mode": "force_installed",
"private_browsing": true, "private_browsing": true,
"restricted_domains": [] "restricted_domains": []
}, },
@ -325,6 +361,10 @@
"private_browsing": true, "private_browsing": true,
"restricted_domains": [] "restricted_domains": []
}, },
"{6003eac6-4b07-4aaf-960b-92fa006cd444}": {
"blocked_install_message": "AI hurts climate and the crawlers are DDoSing the internet",
"installation_mode": "blocked"
},
"{6a65273e-2b26-40f5-b66e-8eed317307da}": { "{6a65273e-2b26-40f5-b66e-8eed317307da}": {
"default_area": "navbar", "default_area": "navbar",
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/new-tab-suspender/latest.xpi", "install_url": "https://addons.mozilla.org/firefox/downloads/latest/new-tab-suspender/latest.xpi",
@ -342,7 +382,7 @@
"{73a6fe31-595d-460b-a920-fcc0f8843232}": { "{73a6fe31-595d-460b-a920-fcc0f8843232}": {
"default_area": "navbar", "default_area": "navbar",
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/noscript/latest.xpi", "install_url": "https://addons.mozilla.org/firefox/downloads/latest/noscript/latest.xpi",
"installation_mode": "normal_installed", "installation_mode": "allowed",
"private_browsing": true, "private_browsing": true,
"restricted_domains": [] "restricted_domains": []
}, },
@ -352,16 +392,22 @@
"installation_mode": "normal_installed", "installation_mode": "normal_installed",
"private_browsing": false "private_browsing": false
}, },
"{90b8ecca-860a-4f1c-8476-e181df2cf635}": {
"default_area": "navbar",
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/grayscale-bro/latest.xpi",
"installation_mode": "normal_installed",
"private_browsing": true
},
"{b11bea1f-a888-4332-8d8a-cec2be7d24b9}": { "{b11bea1f-a888-4332-8d8a-cec2be7d24b9}": {
"default_area": "navbar", "default_area": "navbar",
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/torproject-snowflake/latest.xpi", "install_url": "https://addons.mozilla.org/firefox/downloads/latest/torproject-snowflake/latest.xpi",
"installation_mode": "normal_installed", "installation_mode": "normal_installed",
"private_browsing": true "private_browsing": false
}, },
"{b86e4813-687a-43e6-ab65-0bde4ab75758}": { "{b86e4813-687a-43e6-ab65-0bde4ab75758}": {
"default_area": "navbar", "default_area": "navbar",
"install_url": "https://addons.mozilla.org/firefox/downloads/latest/localcdn-fork-of-decentraleyes/latest.xpi", "install_url": "https://addons.mozilla.org/firefox/downloads/latest/localcdn-fork-of-decentraleyes/latest.xpi",
"installation_mode": "normal_installed", "installation_mode": "allowed",
"private_browsing": true, "private_browsing": true,
"restricted_domains": [] "restricted_domains": []
}, },
@ -396,7 +442,7 @@
"LegacySameSiteCookieBehaviorEnabled": false, "LegacySameSiteCookieBehaviorEnabled": false,
"NetworkPrediction": false, "NetworkPrediction": false,
"NewTabPage": true, "NewTabPage": true,
"OverrideFirstRunPage": "about:mozilla|https://github.com/gorhill/uBlock/wiki/Dynamic-filtering:-quick-guide", "OverrideFirstRunPage": "about:mozilla|https://github.com/gorhill/uBlock/wiki/Dynamic-filtering:-quick-guide|https://addons.mozilla.org/firefox/addon/noscript/",
"PDFjs": { "PDFjs": {
"EnablePermissions": false, "EnablePermissions": false,
"Enabled": true "Enabled": true
@ -490,16 +536,15 @@
"Value": 0 "Value": 0
}, },
"browser.ml.chat.enabled": { "browser.ml.chat.enabled": {
"Comment": "Disable AI by default.", "Comment": "Disable AI.",
"Status": "default", "Status": "locked",
"Type": "boolean", "Type": "boolean",
"Value": false "Value": false
}, },
"browser.ml.chat.provider": { "browser.ml.chat.provider": {
"Comment": "Ask every time which AI to use, if enabled.", "Status": "default",
"Status": "clear",
"Type": "string", "Type": "string",
"Value": "https://www.ecosia.org/chat" "Value": "https://chat.mistral.ai/chat"
}, },
"browser.preferences.moreFromMozilla": { "browser.preferences.moreFromMozilla": {
"Status": "default", "Status": "default",
@ -579,6 +624,11 @@
"Type": "boolean", "Type": "boolean",
"Value": true "Value": true
}, },
"browser.tabs.groups.smart.enabled": {
"Status": "default",
"Type": "boolean",
"Value": true
},
"browser.tabs.inTitlebar_commented": { "browser.tabs.inTitlebar_commented": {
"Comment": "without _commented 0 enables system title bar and 2 is default.", "Comment": "without _commented 0 enables system title bar and 2 is default.",
"Status": "default", "Status": "default",
@ -600,6 +650,12 @@
"Type": "boolean", "Type": "boolean",
"Value": false "Value": false
}, },
"browser.taskbarTabs.enabled": {
"Comment": "Rumoured PWA support",
"Status": "default",
"Type": "boolean",
"Value": true
},
"browser.translations.automaticallyPopup": { "browser.translations.automaticallyPopup": {
"Status": "locked", "Status": "locked",
"Type": "boolean", "Type": "boolean",
@ -625,6 +681,11 @@
"Type": "boolean", "Type": "boolean",
"Value": true "Value": true
}, },
"browser.uidensity": {
"Status": "default",
"Type": "number",
"Value": 1
},
"browser.urlbar.trimHttps": { "browser.urlbar.trimHttps": {
"Status": "locked", "Status": "locked",
"Type": "boolean", "Type": "boolean",
@ -686,6 +747,12 @@
"Type": "string", "Type": "string",
"Value": "" "Value": ""
}, },
"fission.autostart": {
"Comment": "Enable fission, site separation per process, security. Preference not allowed for stability reasons. :(",
"Status": "locked",
"Type": "boolean",
"Value": true
},
"general.config.obscure_value": { "general.config.obscure_value": {
"Comment": "Required for autoconfig.", "Comment": "Required for autoconfig.",
"Status": "locked", "Status": "locked",
@ -709,6 +776,12 @@
"Type": "boolean", "Type": "boolean",
"Value": false "Value": false
}, },
"gfx.webrender.all": {
"Comment": "Enable fission, site separation per process, security",
"Status": "locked",
"Type": "boolean",
"Value": true
},
"image.animation.mode": { "image.animation.mode": {
"Comment": "Preference not allowed for stability reasons. :(", "Comment": "Preference not allowed for stability reasons. :(",
"Status": "default", "Status": "default",
@ -771,8 +844,14 @@
"Type": "boolean", "Type": "boolean",
"Value": false "Value": false
}, },
"media.autoplay.blocking_policy": {
"Comment": "2 - Click to play media",
"Status": "default",
"Type": "number",
"Value": 2
},
"media.autoplay.default": { "media.autoplay.default": {
"Comment": "Not even autoplaying silently?", "Comment": "5 blocks autoplay entirely (unless allowed per site from the navbar menu). 2 should open the prompt by default.",
"Status": "default", "Status": "default",
"Type": "number", "Type": "number",
"Value": 5 "Value": 5
@ -1009,7 +1088,7 @@
"URLTemplate": "https://start.duckduckgo.com/?q={searchTerms}" "URLTemplate": "https://start.duckduckgo.com/?q={searchTerms}"
}, },
{ {
"Name": "Ecosia", "Name": "Ecosia search",
"Alias": "e", "Alias": "e",
"Description": "Ecosia Search Engine", "Description": "Ecosia Search Engine",
"IconURL": "https://cdn-static.ecosia.org/static/icons/favicon.ico", "IconURL": "https://cdn-static.ecosia.org/static/icons/favicon.ico",
@ -1044,11 +1123,13 @@
"URLTemplate": "https://search.brave.com/goggles?q={searchTerms}" "URLTemplate": "https://search.brave.com/goggles?q={searchTerms}"
} }
], ],
"Default": "Ecosia" "Default": "Ecosia search"
}, },
"SearchSuggestEnabled": false, "SearchSuggestEnabled": false,
"SecurityDevices": { "SecurityDevices": {
"Add": { "Add": {
"Debian OpenSC onepin": "/usr/lib/x86_64-linux-gnu/onepin-opensc-pkcs11.so",
"Fedora OpenSC onepin": "/usr/lib64/onepin-opensc-pkcs11.so",
"Fujitsu mPollux DigiSignApplication": "/usr/lib64/libcryptoki.so" "Fujitsu mPollux DigiSignApplication": "/usr/lib64/libcryptoki.so"
} }
}, },

View File

@ -5,16 +5,41 @@ set -x
# Require root or exit # Require root or exit
if [ "$(id -u)" != "0" ]; then if [ "$(id -u)" != "0" ]; then
echo "This script requires root for managing /etc/" 1>&2 echo "This script requires root for managing /etc/..."
exit 1
# Firefox Flatpak
mkdir -vp "$HOME/.local/share/flatpak/extension/org.mozilla.firefox.systemconfig/$(uname -m)/stable/policies/"
mkdir -vp "$HOME/.local/share/flatpak/extension/org.mozilla.firefox.systemconfig/$(uname -m)/beta/policies/"
cp -v firefox/policies/policies.json "$HOME/.local/share/flatpak/extension/org.mozilla.firefox.systemconfig/$(uname -m)/stable/policies/"
cp -v firefox/policies/policies.json "$HOME/.local/share/flatpak/extension/org.mozilla.firefox.systemconfig/$(uname -m)/beta/policies/"
# Chromium Flatpak
mkdir -vp "$HOME/.local/share/flatpak/extension/org.chromium.Chromium.Extension.system-policies/$(uname -m)/1/managed"
mkdir -vp "$HOME/.local/share/flatpak/extension/org.chromium.Chromium.Extension.system-policies/$(uname -m)/1/recommended"
echo "...but flatpaks were more or less handled."
exit 0
fi fi
# TODO: Snap based browsers or at least Firefox can supposedly run with less
# snap sandboxing. Consider these if need arises:
# sudo snap set firefox confinement=classic
# https://bugs.launchpad.net/snapd/+bug/1972762
# sudo snap connect {firefox,chromium,vivaldi}:pcscd
#
# OFFTOPIC TODO: more flatseal style management is coming, consider
# snap refresh snapd --channel=candidate
# snap install desktop-security-center
# snap install prompting-client
# https://discourse.ubuntu.com/t/ubuntu-desktop-s-24-10-dev-cycle-part-5-introducing-permissions-prompting/47963?p-119405-enabling-the-feature
# Firefox and LibreWolf (caution! https://codeberg.org/librewolf/issues/issues/1767) # Firefox and LibreWolf (caution! https://codeberg.org/librewolf/issues/issues/1767)
mkdir -vp /etc/firefox/policies mkdir -vp /etc/firefox/policies
setfacl --recursive --modify=u:root:rwX,o:rX /etc/firefox/policies setfacl --recursive --modify=u:root:rwX,g:root:rwX,o:rX /etc/firefox/policies
chmod -v a+rx /etc/firefox/ chmod -v a+rx /etc/firefox/
chmod -v a+rx /etc/firefox/policies/ chmod -v a+rx /etc/firefox/policies/
touch /etc/firefox/policies/policies.json #touch /etc/firefox/policies/policies.json
cp -v firefox/policies/policies.json /etc/firefox/policies/policies.json
chmod -v a+r /etc/firefox/policies/policies.json chmod -v a+r /etc/firefox/policies/policies.json
printf "WARNING! LibreWolf default profile may be masked!\nhttps://codeberg.org/librewolf/issues/issues/1767\n" printf "WARNING! LibreWolf default profile may be masked!\nhttps://codeberg.org/librewolf/issues/issues/1767\n"
@ -31,35 +56,57 @@ ln -nsfv /etc/firefox /etc/firefox-esr
# Chromium # Chromium
mkdir -vp /etc/opt/chromium/policies/{managed,recommended} mkdir -vp /etc/opt/chromium/policies/{managed,recommended}
setfacl --recursive --modify=u:root:rwX,o:rX /etc/firefox/policies setfacl --recursive --modify=u:root:rwX,g:root:rwX,o:rX /etc/opt/chromium/policies
chmod -v a+rx /etc/opt/chromium/policies/ chmod -v a+rx /etc/opt/chromium/policies/
chmod -v a+rx /etc/opt/chromium/policies/{managed,recommended}/ chmod -v a+rx /etc/opt/chromium/policies/{managed,recommended}/
# Chromium snap
mkdir -p /etc/chromium-browser
setfacl --recursive --modify=u:root:rwX,g:root:rwX,o:rX /etc/chromium-browser
ln -nsfv /etc/opt/chromium/policies /etc/chromium-browser/policies
# Brave # Brave
mkdir -p /etc/brave mkdir -p /etc/brave
setfacl --recursive --modify=u:root:rwX,o:rX /etc/brave setfacl --recursive --modify=u:root:rwX,g:root:rwX,o:rX /etc/brave
ln -nsfv /etc/opt/chromium/policies /etc/brave/policies ln -nsfv /etc/opt/chromium/policies /etc/brave/policies
# Vivaldi # Vivaldi
mkdir -p /etc/chromium mkdir -p /etc/chromium
setfacl --recursive --modify=u:root:rwX,o:rX /etc/chromium setfacl --recursive --modify=u:root:rwX,g:root:rwX,o:rX /etc/chromium
ln -nsfv /etc/opt/chromium/policies /etc/chromium/policies ln -nsfv /etc/opt/chromium/policies /etc/chromium/policies
# Google Chrome # Google Chrome
mkdir -p /etc/opt/chrome mkdir -p /etc/opt/chrome
setfacl --recursive --modify=u:root:rwX,o:rX /etc/opt/chrome setfacl --recursive --modify=u:root:rwX,g:root:rwX,o:rX /etc/opt/chrome
ln -nsfv /etc/opt/chromium/policies /etc/opt/chrome/policies ln -nsfv /etc/opt/chromium/policies /etc/opt/chrome/policies
# Naggig suspicion of another Google Chrome # Naggig suspicion of another Google Chrome
mkdir -p /etc/chrome mkdir -p /etc/chrome
setfacl --recursive --modify=u:root:rwX,o:rX /etc/chrome setfacl --recursive --modify=u:root:rwX,g:root:rwX,o:rX /etc/chrome
ln -nsfv /etc/opt/chromium/policies /etc/chrome/policies ln -nsfv /etc/opt/chromium/policies /etc/chrome/policies
# Microsoft Edge # Microsoft Edge
# I used to have a separate policy for it so remember to remove this manually # I used to have a separate policy for it so remember to remove this manually
# if it exists! # if it exists!
mkdir -p /etc/opt/edge mkdir -p /etc/opt/edge
setfacl --recursive --modify=u:root:rwX,o:rX /etc/opt/edge setfacl --recursive --modify=u:root:rwX,g:root:rwX,o:rX /etc/opt/edge
ln -nsfv /etc/opt/chromium/policies /etc/opt/edge/policies ln -nsfv /etc/opt/chromium/policies /etc/opt/edge/policies
# Firefox Flatpak
mkdir -vp "/var/lib/flatpak/extension/org.mozilla.firefox.systemconfig/$(uname -m)/stable/policies/"
mkdir -vp "/var/lib/flatpak/extension/org.mozilla.firefox.systemconfig/$(uname -m)/beta/policies/"
#cp -v /etc/firefox/policies/policies.json "/var/lib/flatpak/extension/org.mozilla.firefox.systemconfig/$(uname -m)/stable/policies/"
#cp -v /etc/firefox/policies/policies.json "/var/lib/flatpak/extension/org.mozilla.firefox.systemconfig/$(uname -m)/beta/policies/"
cp -v firefox/policies/policies.json "/var/lib/flatpak/extension/org.mozilla.firefox.systemconfig/$(uname -m)/stable/policies/"
cp -v firefox/policies/policies.json "/var/lib/flatpak/extension/org.mozilla.firefox.systemconfig/$(uname -m)/beta/policies/"
# Firefox flatpak autoconfig
cp -v ../conf/autoconfig.js.online /var/lib/flatpak/app/org.mozilla.firefox/current/active/files/lib/firefox/defaults/pref/autoconfig.js
#cp -v ../conf/firefox-forbidden-policies.js /var/lib/flatpak/app/org.mozilla.firefox/current/active/files/lib/firefox/
chmod -v a+r /var/lib/flatpak/app/org.mozilla.firefox/current/active/files/lib/firefox/defaults/pref/autoconfig.js
chmod -v a+r /var/lib/flatpak/app/org.mozilla.firefox/current/active/files/lib/firefox/firefox-forbidden-policies.js
# Chromium Flatpak
mkdir -vp "/var/lib/flatpak/extension/org.chromium.Chromium.Extension.system-policies/$(uname -m)/1/"
cp -rv /etc/opt/chromium/policies/ "/var/lib/flatpak/extension/org.chromium.Chromium.Extension.system-policies/$(uname -m)/1/"
set +x set +x

View File

@ -1,3 +1,4 @@
# Prevents HDMI driver from getting loaded and thus it appearing in # Prevents HDMI driver from getting loaded and thus it appearing in
# pavucontrol. Source: https://askubuntu.com/a/1127760 # pavucontrol. Source: https://askubuntu.com/a/1127760
# wokeignore:rule=blacklist
blacklist snd_hda_codec_hdmi blacklist snd_hda_codec_hdmi

View File

@ -11,7 +11,7 @@
"advancedSettings": [ "advancedSettings": [
[ [
"filterAuthorMode", "filterAuthorMode",
"true" "false"
], ],
[ [
"trustedListPrefixes", "trustedListPrefixes",
@ -61,6 +61,7 @@
"ublock-cookies-adguard", "ublock-cookies-adguard",
"ublock-cookies-easylist", "ublock-cookies-easylist",
"https://secure.fanboy.co.nz/fanboy-annoyance.txt", "https://secure.fanboy.co.nz/fanboy-annoyance.txt",
"https://gitflic.ru/project/magnolia1234/bypass-paywalls-clean-filters/blob/raw?file=bpc-paywall-filter.txt",
"https://ads-for-open-source.readthedocs.io/en/latest/_static/lists/opensource-ads.txt" "https://ads-for-open-source.readthedocs.io/en/latest/_static/lists/opensource-ads.txt"
] ]
}, },
@ -77,6 +78,10 @@
"collapseBlocked", "collapseBlocked",
"true" "true"
], ],
[
"colorBlindFriendly",
"false"
],
[ [
"ignoreGenericCosmeticFilters", "ignoreGenericCosmeticFilters",
"true" "true"
@ -118,20 +123,6 @@
"+annoyances-overlays" "+annoyances-overlays"
] ]
}, },
"mlojlfildnehdpnlmpkeiiglhhkofhpb": {
"toAdd": {
"trustedSiteDirectives": [
""
]
},
"toOverwrite": {
"filterLists": [
"easylist",
"adnauseam-filters",
"eff-dnt-whitelist"
]
}
},
"nngceckbapebfimnlniiiahkandclblb": { "nngceckbapebfimnlniiiahkandclblb": {
"environment": { "environment": {
"base": "https://vault.bitwarden.eu", "base": "https://vault.bitwarden.eu",
@ -192,6 +183,12 @@
"toolbar_pin": "default_unpinned", "toolbar_pin": "default_unpinned",
"update_url": "https://clients2.google.com/service/update2/crx" "update_url": "https://clients2.google.com/service/update2/crx"
}, },
"ammoloihpcbognfddfjcljgembpibcmb": {
"installation_mode": "allowed",
"override_update_url": true,
"toolbar_pin": "force_pinned",
"update_url": "https://clients2.google.com/service/update2/crx"
},
"cbimgpnbgalffiohilfglgkkhpegpjlo": { "cbimgpnbgalffiohilfglgkkhpegpjlo": {
"installation_mode": "normal_installed", "installation_mode": "normal_installed",
"override_update_url": true, "override_update_url": true,
@ -223,7 +220,7 @@
"update_url": "https://clients2.google.com/service/update2/crx" "update_url": "https://clients2.google.com/service/update2/crx"
}, },
"doojmbjmlfjjnbmnoijecmcbfeoakpjm": { "doojmbjmlfjjnbmnoijecmcbfeoakpjm": {
"installation_mode": "normal_installed", "installation_mode": "allowed",
"override_update_url": true, "override_update_url": true,
"toolbar_pin": "force_pinned", "toolbar_pin": "force_pinned",
"update_url": "https://clients2.google.com/service/update2/crx" "update_url": "https://clients2.google.com/service/update2/crx"
@ -235,7 +232,7 @@
"update_url": "https://clients2.google.com/service/update2/crx" "update_url": "https://clients2.google.com/service/update2/crx"
}, },
"eimadpbcbfnmbkopoojfekhnkhdbieeh": { "eimadpbcbfnmbkopoojfekhnkhdbieeh": {
"installation_mode": "normal_installed", "installation_mode": "allowed",
"override_update_url": true, "override_update_url": true,
"toolbar_pin": "force_pinned", "toolbar_pin": "force_pinned",
"update_url": "https://clients2.google.com/service/update2/crx" "update_url": "https://clients2.google.com/service/update2/crx"
@ -275,12 +272,24 @@
"toolbar_pin": "force_pinned", "toolbar_pin": "force_pinned",
"update_url": "https://clients2.google.com/service/update2/crx" "update_url": "https://clients2.google.com/service/update2/crx"
}, },
"hjdoplcnndgiblooccencgcggcoihigg": {
"installation_mode": "force_installed",
"override_update_url": true,
"toolbar_pin": "force_pinned",
"update_url": "https://clients2.google.com/service/update2/crx"
},
"hojggiaghnldpcknpbciehjcaoafceil": { "hojggiaghnldpcknpbciehjcaoafceil": {
"installation_mode": "normal_installed", "installation_mode": "normal_installed",
"override_update_url": true, "override_update_url": true,
"toolbar_pin": "default_unpinned", "toolbar_pin": "default_unpinned",
"update_url": "https://clients2.google.com/service/update2/crx" "update_url": "https://clients2.google.com/service/update2/crx"
}, },
"klmgadmgadfhjgomffmpamppmkajdloc": {
"installation_mode": "force_installed",
"override_update_url": true,
"toolbar_pin": "force_pinned",
"update_url": "https://clients2.google.com/service/update2/crx"
},
"mafpmfcccpbjnhfhjnllmmalhifmlcie": { "mafpmfcccpbjnhfhjnllmmalhifmlcie": {
"installation_mode": "normal_installed", "installation_mode": "normal_installed",
"override_update_url": true, "override_update_url": true,
@ -316,6 +325,12 @@
"toolbar_pin": "default_unpinned", "toolbar_pin": "default_unpinned",
"update_url": "https://clients2.google.com/service/update2/crx" "update_url": "https://clients2.google.com/service/update2/crx"
}, },
"pbnndmlekkboofhnbonilimejonapojg": {
"installation_mode": "normal_installed",
"override_update_url": true,
"toolbar_pin": "force_pinned",
"update_url": "https://clients2.google.com/service/update2/crx"
},
"pkehgijcmpdhfbdbbnkijodmdjhbjlgp": { "pkehgijcmpdhfbdbbnkijodmdjhbjlgp": {
"installation_mode": "force_installed", "installation_mode": "force_installed",
"override_update_url": true, "override_update_url": true,

View File

@ -1,5 +1,6 @@
ID Name Comment ID Name Comment
ajhmfdgkijocedmfjonnpjfojldioehi Silk ajhmfdgkijocedmfjonnpjfojldioehi Silk
ammoloihpcbognfddfjcljgembpibcmb JShelter
bkdgflcldnnnapblkhphbgpggdiikppg DuckDuckGo bkdgflcldnnnapblkhphbgpggdiikppg DuckDuckGo
caoacbimdbbljakfhgikoodekdnlcgpk DuckDuckGo caoacbimdbbljakfhgikoodekdnlcgpk DuckDuckGo
cbimgpnbgalffiohilfglgkkhpegpjlo QR Code cbimgpnbgalffiohilfglgkkhpegpjlo QR Code
@ -16,8 +17,10 @@ fpnmgdkabkmnadcjpehmlllkndpkmiak Wayback Machine
gbiekjoijknlhijdjbaadobpkdhmoebb Google IBA opt-out Preparing for eventuality of Google killing adblockers by opting into non-targeted ads instead. gbiekjoijknlhijdjbaadobpkdhmoebb Google IBA opt-out Preparing for eventuality of Google killing adblockers by opting into non-targeted ads instead.
gecgipfabdickgidpmbicneamekgbaej Chrome Apps Launcher BLOCKED. It means the ages ago deprecated Chrome apps, not PWAs. gecgipfabdickgidpmbicneamekgbaej Chrome Apps Launcher BLOCKED. It means the ages ago deprecated Chrome apps, not PWAs.
hgcomhbcacfkpffiphlmnlhpppcjgmbl HTTP Indicator hgcomhbcacfkpffiphlmnlhpppcjgmbl HTTP Indicator
hjdoplcnndgiblooccencgcggcoihigg Terms of Service; Didnt Read
hojggiaghnldpcknpbciehjcaoafceil Fedora User Agent hojggiaghnldpcknpbciehjcaoafceil Fedora User Agent
iimpkhokkfekbpmoamlmcndclohnehhk IPVFooBar ManifestV2 unlike original IPvFoo iimpkhokkfekbpmoamlmcndclohnehhk IPVFooBar ManifestV2 unlike original IPvFoo
klmgadmgadfhjgomffmpamppmkajdloc Go European
mafpmfcccpbjnhfhjnllmmalhifmlcie Tor Snowflake mafpmfcccpbjnhfhjnllmmalhifmlcie Tor Snowflake
mlojlfildnehdpnlmpkeiiglhhkofhpb AdNauseam mlojlfildnehdpnlmpkeiiglhhkofhpb AdNauseam
mlojlfildnehdpnlmpkeiiglhhkofhpb Ad Nauseam mlojlfildnehdpnlmpkeiiglhhkofhpb Ad Nauseam
@ -26,4 +29,5 @@ nngceckbapebfimnlniiiahkandclblb Bitwarden
obpoeflheeknapimliioeoefbfaakefn Regrets Reporter obpoeflheeknapimliioeoefbfaakefn Regrets Reporter
odfafepnkmbhccpbejgmiehpchacaeak uBlock Origin odfafepnkmbhccpbejgmiehpchacaeak uBlock Origin
palihjnakafgffnompkdfgbgdbcagbko UpdateSWH palihjnakafgffnompkdfgbgdbcagbko UpdateSWH
pbnndmlekkboofhnbonilimejonapojg Midnight Lizard currently ManifestV2
pkehgijcmpdhfbdbbnkijodmdjhbjlgp PrivacyBadger pkehgijcmpdhfbdbbnkijodmdjhbjlgp PrivacyBadger

1 ID Name Comment
2 ajhmfdgkijocedmfjonnpjfojldioehi Silk
3 ammoloihpcbognfddfjcljgembpibcmb JShelter
4 bkdgflcldnnnapblkhphbgpggdiikppg DuckDuckGo
5 caoacbimdbbljakfhgikoodekdnlcgpk DuckDuckGo
6 cbimgpnbgalffiohilfglgkkhpegpjlo QR Code
17 gbiekjoijknlhijdjbaadobpkdhmoebb Google IBA opt-out Preparing for eventuality of Google killing adblockers by opting into non-targeted ads instead.
18 gecgipfabdickgidpmbicneamekgbaej Chrome Apps Launcher BLOCKED. It means the ages ago deprecated Chrome apps, not PWAs.
19 hgcomhbcacfkpffiphlmnlhpppcjgmbl HTTP Indicator
20 hjdoplcnndgiblooccencgcggcoihigg Terms of Service; Didn’t Read
21 hojggiaghnldpcknpbciehjcaoafceil Fedora User Agent
22 iimpkhokkfekbpmoamlmcndclohnehhk IPVFooBar ManifestV2 unlike original IPvFoo
23 klmgadmgadfhjgomffmpamppmkajdloc Go European
24 mafpmfcccpbjnhfhjnllmmalhifmlcie Tor Snowflake
25 mlojlfildnehdpnlmpkeiiglhhkofhpb AdNauseam
26 mlojlfildnehdpnlmpkeiiglhhkofhpb Ad Nauseam
29 obpoeflheeknapimliioeoefbfaakefn Regrets Reporter
30 odfafepnkmbhccpbejgmiehpchacaeak uBlock Origin
31 palihjnakafgffnompkdfgbgdbcagbko UpdateSWH
32 pbnndmlekkboofhnbonilimejonapojg Midnight Lizard currently ManifestV2
33 pkehgijcmpdhfbdbbnkijodmdjhbjlgp PrivacyBadger

View File

@ -1,6 +0,0 @@
{
"CreateThemesSettings": 1,
"GenAILocalFoundationalModelSettings": 0,
"HelpMeWriteSettings": 1,
"TabOrganizerSettings": 1
}

View File

@ -2,7 +2,7 @@
"DefaultSearchProviderEnabled": true, "DefaultSearchProviderEnabled": true,
"DefaultSearchProviderImageURL": "https://cdn-static.ecosia.org/static/icons/favicon.ico", "DefaultSearchProviderImageURL": "https://cdn-static.ecosia.org/static/icons/favicon.ico",
"DefaultSearchProviderKeyword": "e", "DefaultSearchProviderKeyword": "e",
"DefaultSearchProviderName": "Ecosia", "DefaultSearchProviderName": "Ecosia search",
"DefaultSearchProviderNewTabURL": "https://www.ecosia.org/newtab/?addon=chromegpo", "DefaultSearchProviderNewTabURL": "https://www.ecosia.org/newtab/?addon=chromegpo",
"DefaultSearchProviderSearchURL": "https://www.ecosia.org/search?q={searchTerms}&addon=chromegpo", "DefaultSearchProviderSearchURL": "https://www.ecosia.org/search?q={searchTerms}&addon=chromegpo",
"DefaultSearchProviderSuggestURL": "https://ac.ecosia.org/autocomplete?q={searchTerms}", "DefaultSearchProviderSuggestURL": "https://ac.ecosia.org/autocomplete?q={searchTerms}",

View File

@ -26,10 +26,10 @@ Mullvad All https://all.dns.mullvad.net/dns-query all.dns.mullvad.net 2a07:e340:
Mullvad Base https://base.dns.mullvad.net/dns-query base.dns.mullvad.net 2a07:e340::4 194.242.2.4 https://github.com/mullvad/encrypted-dns-profiles Mullvad Base https://base.dns.mullvad.net/dns-query base.dns.mullvad.net 2a07:e340::4 194.242.2.4 https://github.com/mullvad/encrypted-dns-profiles
Mullvad Extended https://extended.dns.mullvad.net/dns-query extended.dns.mullvad.net 2a07:e340::5 194.242.2.5 https://github.com/mullvad/encrypted-dns-profiles Mullvad Extended https://extended.dns.mullvad.net/dns-query extended.dns.mullvad.net 2a07:e340::5 194.242.2.5 https://github.com/mullvad/encrypted-dns-profiles
Mullvad Vanilla https://dns.mullvad.net/dns-query dns.mullvad.net 2a07:e340::2 194.242.2.2 https://github.com/mullvad/encrypted-dns-profiles No 2023-03-11 I tested with https://gitea.blesmrt.net/mikaela/scripts/src/branch/master/bash/dns-ecs-debug.bash Mullvad Vanilla https://dns.mullvad.net/dns-query dns.mullvad.net 2a07:e340::2 194.242.2.2 https://github.com/mullvad/encrypted-dns-profiles No 2023-03-11 I tested with https://gitea.blesmrt.net/mikaela/scripts/src/branch/master/bash/dns-ecs-debug.bash
NextDNS https://dns.nextdns.io dns.nextdns.io 2a07:a8c1:: 2a07:a8c0:: 45.90.30.0 45.90.28.0 https://apple.nextdns.io/ opt-in, private, upstream whitelist https://medium.com/nextdns/how-we-made-dns-both-fast-and-private-with-ecs-4970d70401e5 NextDNS https://dns.nextdns.io dns.nextdns.io 2a07:a8c1:: 2a07:a8c0:: 45.90.30.0 45.90.28.0 https://apple.nextdns.io/ opt-in, private, upstream inclusion list https://medium.com/nextdns/how-we-made-dns-both-fast-and-private-with-ecs-4970d70401e5
NextDNS Firefox https://firefox.dns.nextdns.io no NextDNS Firefox https://firefox.dns.nextdns.io no
OpenDNS https://doh.opendns.com/dns-query dns.opendns.com ? (#127) 2620:119:35::35 2620:119:53::53 208.67.222.222 208.67.220.220 yes, upstream whitelist https://support.opendns.com/hc/articles/227987647-EDNS-Client-Subnet-FAQ OpenDNS https://doh.opendns.com/dns-query dns.opendns.com ? (#127) 2620:119:35::35 2620:119:53::53 208.67.222.222 208.67.220.220 yes, upstream inclusion list https://support.opendns.com/hc/articles/227987647-EDNS-Client-Subnet-FAQ
OpenDNS Family https://doh.familyshield.opendns.com/dns-query 208.67.222.123 208.67.220.123 yes, upstream whitelist https://support.opendns.com/hc/articles/227987647-EDNS-Client-Subnet-FAQ OpenDNS Family https://doh.familyshield.opendns.com/dns-query 208.67.222.123 208.67.220.123 yes, upstream inclusion list https://support.opendns.com/hc/articles/227987647-EDNS-Client-Subnet-FAQ
Quad9 (Secure) https://dns.quad9.net/dns-query dns.quad9.net 2620:fe::fe 2620:fe::9 9.9.9.9 149.112.112.112 https://docs.quad9.net/Setup_Guides/iOS/iOS_14_and_later_%28Encrypted%29/#download-profile no https://www.quad9.net/support/faq/#edns Quad9 (Secure) https://dns.quad9.net/dns-query dns.quad9.net 2620:fe::fe 2620:fe::9 9.9.9.9 149.112.112.112 https://docs.quad9.net/Setup_Guides/iOS/iOS_14_and_later_%28Encrypted%29/#download-profile no https://www.quad9.net/support/faq/#edns
Quad9-10 (No Threat Blocking) https://dns10.quad9.net/dns-query dns10.quad9.net 2620:fe::10 2620:fe::fe:10 9.9.9.10 149.112.112.10 https://docs.quad9.net/Setup_Guides/iOS/iOS_14_and_later_%28Encrypted%29/#download-profile no https://docs.quad9.net/services/ Quad9-10 (No Threat Blocking) https://dns10.quad9.net/dns-query dns10.quad9.net 2620:fe::10 2620:fe::fe:10 9.9.9.10 149.112.112.10 https://docs.quad9.net/Setup_Guides/iOS/iOS_14_and_later_%28Encrypted%29/#download-profile no https://docs.quad9.net/services/
Quad9-11 (Secure + ECS) https://dns11.quad9.net/dns-query dns11.quad9.net 2620:fe::11 2620:fe::fe:11 9.9.9.11 149.112.112.11 https://docs.quad9.net/Setup_Guides/iOS/iOS_14_and_later_%28Encrypted%29/#download-profile yes https://www.quad9.net/support/faq/#edns Quad9-11 (Secure + ECS) https://dns11.quad9.net/dns-query dns11.quad9.net 2620:fe::11 2620:fe::fe:11 9.9.9.11 149.112.112.11 https://docs.quad9.net/Setup_Guides/iOS/iOS_14_and_later_%28Encrypted%29/#download-profile yes https://www.quad9.net/support/faq/#edns

1 Provider DoH DoT IPv6 IPv6 IPv4 IPv4 Apple MobileConfig ECS Source for EDNS Client Subnet (ECS)
26 Mullvad Base https://base.dns.mullvad.net/dns-query base.dns.mullvad.net 2a07:e340::4 194.242.2.4 https://github.com/mullvad/encrypted-dns-profiles
27 Mullvad Extended https://extended.dns.mullvad.net/dns-query extended.dns.mullvad.net 2a07:e340::5 194.242.2.5 https://github.com/mullvad/encrypted-dns-profiles
28 Mullvad Vanilla https://dns.mullvad.net/dns-query dns.mullvad.net 2a07:e340::2 194.242.2.2 https://github.com/mullvad/encrypted-dns-profiles No 2023-03-11 I tested with https://gitea.blesmrt.net/mikaela/scripts/src/branch/master/bash/dns-ecs-debug.bash
29 NextDNS https://dns.nextdns.io dns.nextdns.io 2a07:a8c1:: 2a07:a8c0:: 45.90.30.0 45.90.28.0 https://apple.nextdns.io/ opt-in, private, upstream whitelist opt-in, private, upstream inclusion list https://medium.com/nextdns/how-we-made-dns-both-fast-and-private-with-ecs-4970d70401e5
30 NextDNS Firefox https://firefox.dns.nextdns.io no
31 OpenDNS https://doh.opendns.com/dns-query dns.opendns.com ? (#127) 2620:119:35::35 2620:119:53::53 208.67.222.222 208.67.220.220 yes, upstream whitelist yes, upstream inclusion list https://support.opendns.com/hc/articles/227987647-EDNS-Client-Subnet-FAQ
32 OpenDNS Family https://doh.familyshield.opendns.com/dns-query 208.67.222.123 208.67.220.123 yes, upstream whitelist yes, upstream inclusion list https://support.opendns.com/hc/articles/227987647-EDNS-Client-Subnet-FAQ
33 Quad9 (Secure) https://dns.quad9.net/dns-query dns.quad9.net 2620:fe::fe 2620:fe::9 9.9.9.9 149.112.112.112 https://docs.quad9.net/Setup_Guides/iOS/iOS_14_and_later_%28Encrypted%29/#download-profile no https://www.quad9.net/support/faq/#edns
34 Quad9-10 (No Threat Blocking) https://dns10.quad9.net/dns-query dns10.quad9.net 2620:fe::10 2620:fe::fe:10 9.9.9.10 149.112.112.10 https://docs.quad9.net/Setup_Guides/iOS/iOS_14_and_later_%28Encrypted%29/#download-profile no https://docs.quad9.net/services/
35 Quad9-11 (Secure + ECS) https://dns11.quad9.net/dns-query dns11.quad9.net 2620:fe::11 2620:fe::fe:11 9.9.9.11 149.112.112.11 https://docs.quad9.net/Setup_Guides/iOS/iOS_14_and_later_%28Encrypted%29/#download-profile yes https://www.quad9.net/support/faq/#edns

View File

@ -3,14 +3,14 @@
# encryption, but host a Quad9 node and giving these addresses instead. # encryption, but host a Quad9 node and giving these addresses instead.
[Resolve] [Resolve]
# Secure # Secure
#DNS=2620:fe::9#dns.quad9.net 2620:fe::fe#dns.quad9.net [2620:fe::9]:8853#dns.quad9.net [2620:fe::fe]:8853#dns.quad9.net DNS=2620:fe::9#dns.quad9.net 2620:fe::fe#dns.quad9.net [2620:fe::9]:8853#dns.quad9.net [2620:fe::fe]:8853#dns.quad9.net
#DNS=149.112.112.112#dns.quad9.net 9.9.9.9#dns.quad9.net 149.112.112.112:8853#dns.quad9.net 9.9.9.9:8853#dns.quad9.net DNS=149.112.112.112#dns.quad9.net 9.9.9.9#dns.quad9.net 149.112.112.112:8853#dns.quad9.net 9.9.9.9:8853#dns.quad9.net
# No Threat Blocking # No Threat Blocking
#DNS=2620:fe::10#dns10.quad9.net 2620:fe::fe:10#dns10.quad9.net [2620:fe::10]:8853#dns10.quad9.net [2620:fe::fe:10]:8853#dns10.quad9.net #DNS=2620:fe::10#dns10.quad9.net 2620:fe::fe:10#dns10.quad9.net [2620:fe::10]:8853#dns10.quad9.net [2620:fe::fe:10]:8853#dns10.quad9.net
#DNS=149.112.112.10#dns10.quad9.net 9.9.9.10#dns10.quad9.net 149.112.112.10:8853#dns10.quad9.net 9.9.9.10:8853#dns10.quad9.net #DNS=149.112.112.10#dns10.quad9.net 9.9.9.10#dns10.quad9.net 149.112.112.10:8853#dns10.quad9.net 9.9.9.10:8853#dns10.quad9.net
# Secure + ECS. IPv4 first so it gets preferred as my Unbound likely prefers IPv6 anyway. # Secure + ECS. IPv4 first so it gets preferred as my Unbound likely prefers IPv6 anyway.
DNS=149.112.112.11#dns11.quad9.net 9.9.9.11#dns11.quad9.net 149.112.112.11:8853#dns11.quad9.net 9.9.9.11:8853#dns11.quad9.net #DNS=149.112.112.11#dns11.quad9.net 9.9.9.11#dns11.quad9.net 149.112.112.11:8853#dns11.quad9.net 9.9.9.11:8853#dns11.quad9.net
DNS=2620:fe::11#dns11.quad9.net 2620:fe::fe:11#dns11.quad9.net [2620:fe::11]:8853#dns11.quad9.net [2620:fe::fe:11]:8853#dns11.quad9.net #DNS=2620:fe::11#dns11.quad9.net 2620:fe::fe:11#dns11.quad9.net [2620:fe::11]:8853#dns11.quad9.net [2620:fe::fe:11]:8853#dns11.quad9.net
# No Threat Blocking + ECS # No Threat Blocking + ECS
#DNS=2620:fe::12#dns12.quad9.net 2620:fe::fe:12#dns12.quad9.net [2620:fe::12]:8853#dns12.quad9.net [2620:fe::fe:12]:8853#dns12.quad9.net #DNS=2620:fe::12#dns12.quad9.net 2620:fe::fe:12#dns12.quad9.net [2620:fe::12]:8853#dns12.quad9.net [2620:fe::fe:12]:8853#dns12.quad9.net
#DNS=9.9.9.12#dns12.quad9.net 149.112.112.12#dns12.quad9.net 9.9.9.12:8853#dns12.quad9.net 149.112.112.12:8853#dns12.quad9.net #DNS=9.9.9.12#dns12.quad9.net 149.112.112.12#dns12.quad9.net 9.9.9.12:8853#dns12.quad9.net 149.112.112.12:8853#dns12.quad9.net

View File

@ -1,4 +1,4 @@
dot-.conf
dot-nextdns.conf dot-nextdns.conf
dot-trex.conf dot-trex.conf
cache.conf cache.conf
dot-adguard-dns0.conf

View File

@ -9,11 +9,16 @@ server:
# https://docs.quad9.net/Quad9_For_Organizations/DNS_Forwarder_Best_Practices/#disable-qname-minimization # https://docs.quad9.net/Quad9_For_Organizations/DNS_Forwarder_Best_Practices/#disable-qname-minimization
qname-minimisation: no qname-minimisation: no
# This list is for my travel laptop to have at least one DoT443 server # This file keeps changing purpose between being just for my travel laptop
# which seems to be applied-privacy.net. They advice having multiple DoT servers # and sometimes helps when I cannot decide what is important in a DNS server.
# for redundancy and as they don't filter, it's best I use other non-filtering ones.
# Since then this expanded to include <https://www.privacyguides.org/en/dns/>. # - applied-privacy.net provides DoT over 443 and tells you to use multiple
# just look at git blame... # servers for redundancy.
# - cloudflare-dns.com contributes to https://radar.cloudflare.com which gets
# used by many others including PrivacyBadger most popular domains for its
# badgersett pretraining
# - dns0.eu provides servers located only in the EU and private ECS
# - adguard-dns.com provides private ECS around the world
forward-zone: forward-zone:
name: "." name: "."
@ -22,8 +27,8 @@ forward-zone:
# https://appliedprivacy.net/services/dns/ - Vienna, Austria, no ECS # https://appliedprivacy.net/services/dns/ - Vienna, Austria, no ECS
forward-addr: 2a02:1b8:10:234::2@443#dot1.applied-privacy.net forward-addr: 2a02:1b8:10:234::2@443#dot1.applied-privacy.net
forward-addr: 146.255.56.98@443#dot1.applied-privacy.net forward-addr: 146.255.56.98@443#dot1.applied-privacy.net
forward-addr: 2a02:1b8:10:234::2@853#dot1.applied-privacy.net #forward-addr: 2a02:1b8:10:234::2@853#dot1.applied-privacy.net
forward-addr: 146.255.56.98@853#dot1.applied-privacy.net #forward-addr: 146.255.56.98@853#dot1.applied-privacy.net
# Cloudflare unfiltered, anycast, no ECS # Cloudflare unfiltered, anycast, no ECS
forward-addr: 2606:4700:4700::1111@853#cloudflare-dns.com forward-addr: 2606:4700:4700::1111@853#cloudflare-dns.com
@ -32,24 +37,34 @@ forward-zone:
forward-addr: 1.0.0.1@853#cloudflare-dns.com forward-addr: 1.0.0.1@853#cloudflare-dns.com
# Mullvad unfiltered, Anycast Sweden, no ECS # Mullvad unfiltered, Anycast Sweden, no ECS
forward-addr: 194.242.2.2@853#dns.mullvad.net #forward-addr: 194.242.2.2@853#dns.mullvad.net
forward-addr: 2a07:e340::2@853#dns.mullvad.net #forward-addr: 2a07:e340::2@853#dns.mullvad.net
# Control D Free DNS unfilterd, anycast, no ECS # Control D Free DNS unfilterd, anycast, no ECS
forward-addr: 76.76.2.0@853#p0.freedns.controld.com #forward-addr: 76.76.2.0@853#p0.freedns.controld.com
forward-addr: 2606:1a40::@853#s0.freedns.controld.com #forward-addr: 2606:1a40::@853#s0.freedns.controld.com
forward-addr: 76.76.10.0@853#p0.freedns.controld.com #forward-addr: 76.76.10.0@853#p0.freedns.controld.com
forward-addr: 2606:1a40:1::@853#s0.freedns.controld.com #forward-addr: 2606:1a40:1::@853#s0.freedns.controld.com
# Quad9 unfiltered, anycast, no ECS, no DNSSEC (Unbound does that) # Quad9 unfiltered, anycast, no ECS, no DNSSEC (Unbound does that)
forward-addr: 2620:fe::fe:10@853#dns10.quad9.net #forward-addr: 2620:fe::fe:10@853#dns10.quad9.net
forward-addr: 2620:fe::fe:10@8853#dns10.quad9.net #forward-addr: 2620:fe::fe:10@8853#dns10.quad9.net
forward-addr: 149.112.112.10@853#dns10.quad9.net #forward-addr: 149.112.112.10@853#dns10.quad9.net
forward-addr: 149.112.112.10@8853#dns10.quad9.net #forward-addr: 149.112.112.10@8853#dns10.quad9.net
forward-addr: 2620:fe::10@853#dns10.quad9.net #forward-addr: 2620:fe::10@853#dns10.quad9.net
forward-addr: 2620:fe::10@8853#dns10.quad9.net #forward-addr: 2620:fe::10@8853#dns10.quad9.net
forward-addr: 9.9.9.10@853#dns10.quad9.net #forward-addr: 9.9.9.10@853#dns10.quad9.net
forward-addr: 9.9.9.10@8853#dns10.quad9.net #forward-addr: 9.9.9.10@8853#dns10.quad9.net
# Quad9 unfiltered, anycast, ECS, no DNSSEC (Unbound does that)
#forward-addr: 2620:fe::fe:12@853#dns12.quad9.net
forward-addr: 2620:fe::fe:12@8853#dns12.quad9.net
#forward-addr: 9.9.9.12@853#dns12.quad9.net
forward-addr: 9.9.9.12@8853#dns12.quad9.net
#forward-addr: 2620:fe::12@853#dns12.quad9.net
forward-addr: 2620:fe::12@8853#dns12.quad9.net
#forward-addr: 149.112.112.12@853#dns12.quad9.net
forward-addr: 149.112.112.12@8853#dns12.quad9.net
# https://www.dns0.eu/open https://www.dns0.eu/network - French based. Private ECS # https://www.dns0.eu/open https://www.dns0.eu/network - French based. Private ECS
forward-addr: 193.110.81.254@853#open.dns0.eu forward-addr: 193.110.81.254@853#open.dns0.eu

View File

@ -0,0 +1 @@
dns-over-tls.conf

View File

@ -1 +0,0 @@
dot-private-ecs.conf

View File

@ -1,33 +0,0 @@
# This is a merging of dot-dns0.conf & dot-quad9.conf with weight on DNS0
# IPv4 and when using IPv6, Quad9 Secure with ECS. IPv6 private ECS is
# horribly inaccurate and I have minor leaning towards having ECS enabled.
# Private ECS is a compromise between privacy and local destinations.
#
# Both are filtering DNS servers, so this brings risk of something being
# blocked by only one of them. However both are non-profits and have servers
# in Finland.
server:
# Debian ca-certificates location
#tls-cert-bundle: /etc/ssl/certs/ca-certificates.crt
# Fedora
#tls-cert-bundle: /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem
# Use system certificates no matter where they are
tls-system-cert: yes
# Quad9 says pointless performance impact on forwarders.
# https://docs.quad9.net/Quad9_For_Organizations/DNS_Forwarder_Best_Practices/#disable-qname-minimization
qname-minimisation: no
forward-zone:
name: "."
forward-tls-upstream: yes
## DNS0.eu IPv4 Default
forward-addr: 193.110.81.0@853#dns0.eu
forward-addr: 185.253.5.0@853#dns0.eu
## Quad9 IPv6 Secure + ECS
forward-addr: 2620:fe::11@8853#dns11.quad9.net
forward-addr: 2620:fe::fe:11@853#dns11.quad9.net
forward-addr: 2620:fe::11@853#dns11.quad9.net
forward-addr: 2620:fe::fe:11@8853#dns11.quad9.net
# vim: filetype=unbound.conf

View File

@ -1,33 +0,0 @@
# NOTE! Requires Unbound 1.7.3 or newer!
# Based on https://www.ctrl.blog/entry/unbound-tls-forwarding.html
server:
# Debian ca-certificates location
#tls-cert-bundle: /etc/ssl/certs/ca-certificates.crt
# Fedora location
#tls-cert-bundle: /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem
# Use system certificates no matter where they are
tls-system-cert: yes
# Quad9 says pointless performance impact on forwarders.
# https://docs.quad9.net/Quad9_For_Organizations/DNS_Forwarder_Best_Practices/#disable-qname-minimization
qname-minimisation: no
# DNS servers that have public button for flushing cache. Privacy not considered.
forward-zone:
name: "."
forward-tls-upstream: yes
# Cloudflare / https://1.1.1.1/purge-cache/
forward-addr: 2606:4700:4700::1111@853#cloudflare-dns.com
forward-addr: 1.1.1.1@853#cloudflare-dns.com
forward-addr: 2606:4700:4700::1001@853#cloudflare-dns.com
forward-addr: 1.0.0.1@853#cloudflare-dns.com
# Google / https://dns.google/cache
forward-addr: 8.8.8.8@853#dns.google
forward-addr: 8.8.4.4@853#dns.google
forward-addr: 2001:4860:4860::8888@853#dns.google
forward-addr: 2001:4860:4860::8844@853#dns.google
# vim: filetype=unbound.conf

View File

@ -1,26 +0,0 @@
server:
# Debian ca-certificates location
#tls-cert-bundle: /etc/ssl/certs/ca-certificates.crt
# Fedora
#tls-cert-bundle: /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem
# Use system certificates no matter where they are
tls-system-cert: yes
# Quad9 says pointless performance impact on forwarders.
# https://docs.quad9.net/Quad9_For_Organizations/DNS_Forwarder_Best_Practices/#disable-qname-minimization
qname-minimisation: no
# AdGuard Public DNS without filtering.
forward-zone:
name: "."
forward-tls-upstream: yes
# AdGuard Public DNS without filtering
forward-addr: 2a10:50c0::1:ff@853#unfiltered.adguard-dns.com
forward-addr: 2a10:50c0::2:ff@853#unfiltered.adguard-dns.com
forward-addr: 94.140.14.140@853#unfiltered.adguard-dns.com
forward-addr: 94.140.14.141@853#unfiltered.adguard-dns.com
# DNS0.eu without filtering
forward-addr: 193.110.81.254@853#open.dns0.eu
forward-addr: 185.253.5.254@853#open.dns0.eu
forward-addr: 2a0f:fc80::ffff@853#open.dns0.eu
forward-addr: 2a0f:fc81::ffff@853#open.dns0.eu
# vim: filetype=unbound.conf

View File

@ -1,86 +0,0 @@
# This file attempts to send zones belonging to DNS operators to their DNS servers.
# Inclusion criteria: I know and use the service.
server:
# Debian ca-certificates location
#tls-cert-bundle: /etc/ssl/certs/ca-certificates.crt
# Fedora
#tls-cert-bundle: /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem
# Use system certificates no matter where they are
tls-system-cert: yes
# Quad9 says pointless performance impact on forwarders.
# https://docs.quad9.net/Quad9_For_Organizations/DNS_Forwarder_Best_Practices/#disable-qname-minimization
qname-minimisation: no
forward-zone:
name: "google"
forward-tls-upstream: yes
# Must be explicit forward-addr for dns.google to be found
forward-addr: 2001:4860:4860::8844@853#dns.google
forward-addr: 2001:4860:4860::8888@853#dns.google
forward-addr: 8.8.4.4@853#dns.google
forward-addr: 8.8.8.8@853#dns.google
forward-zone:
name: "google.fi"
forward-tls-upstream: yes
forward-host: dns.google@853#dns.google
forward-zone:
name: "google.com"
forward-tls-upstream: yes
forward-host: dns.google@853#dns.google
forward-zone:
name: "youtube.com"
forward-tls-upstream: yes
forward-host: dns.google@853#dns.google
forward-zone:
name: "youtube-nocookie.com"
forward-tls-upstream: yes
forward-host: dns.google@853#dns.google
forward-zone:
name: "youtu.be"
forward-tls-upstream: yes
forward-host: dns.google@853#dns.google
forward-zone:
name: "googlevideo.com"
forward-tls-upstream: yes
forward-host: dns.google@853#dns.google
forward-zone:
name: "ytimg.com"
forward-tls-upstream: yes
forward-host: dns.google@853#dns.google
# forward-zone:
# name: "googleusercontent.com"
# forward-tls-upstream: yes
# forward-host: dns.google@853#dns.google
forward-zone:
name: "gstatic.com"
forward-tls-upstream: yes
forward-host: dns.google@853#dns.google
forward-zone:
name: "cloudflare-dns.com"
# Must be explicit for forward-addr
forward-addr: 2606:4700:4700::1112@853#security.cloudflare-dns.com
forward-addr: 2606:4700:4700::1002@853#security.cloudflare-dns.com
forward-addr: 1.1.1.2@853#security.cloudflare-dns.com
forward-addr: 1.0.0.2@853#security.cloudflare-dns.com
forward-zone:
name: "cloudflare.com"
forward-host: security.cloudflare-dns.com@853#security.cloudflare-dns.com
forward-zone:
name: "one.one"
forward-host: security.cloudflare-dns.com@853#security.cloudflare-dns.com
# vim: filetype=unbound.conf

View File

@ -17,14 +17,14 @@ forward-zone:
name: "." name: "."
forward-tls-upstream: yes forward-tls-upstream: yes
## Secure ## Secure
#forward-addr: 2620:fe::fe@853#dns.quad9.net forward-addr: 2620:fe::fe@853#dns.quad9.net
#forward-addr: 2620:fe::fe@8853#dns.quad9.net forward-addr: 2620:fe::fe@8853#dns.quad9.net
#forward-addr: 2620:fe::9@853#dns.quad9.net forward-addr: 2620:fe::9@853#dns.quad9.net
#forward-addr: 2620:fe::9@8853#dns.quad9.net forward-addr: 2620:fe::9@8853#dns.quad9.net
#forward-addr: 9.9.9.9@853#dns.quad9.net forward-addr: 9.9.9.9@853#dns.quad9.net
#forward-addr: 9.9.9.9@8853#dns.quad9.net forward-addr: 9.9.9.9@8853#dns.quad9.net
#forward-addr: 149.112.112.112@853#dns.quad9.net forward-addr: 149.112.112.112@853#dns.quad9.net
#forward-addr: 149.112.112.112@8853#dns.quad9.net forward-addr: 149.112.112.112@8853#dns.quad9.net
## No Threat Blocking ## No Threat Blocking
#forward-addr: 2620:fe::fe:10@853#dns10.quad9.net #forward-addr: 2620:fe::fe:10@853#dns10.quad9.net
#forward-addr: 2620:fe::fe:10@8853#dns10.quad9.net #forward-addr: 2620:fe::fe:10@8853#dns10.quad9.net
@ -35,14 +35,14 @@ forward-zone:
#forward-addr: 9.9.9.10@853#dns10.quad9.net #forward-addr: 9.9.9.10@853#dns10.quad9.net
#forward-addr: 9.9.9.10@8853#dns10.quad9.net #forward-addr: 9.9.9.10@8853#dns10.quad9.net
## Secure + ECS ## Secure + ECS
forward-addr: 2620:fe::fe:11@853#dns11.quad9.net #forward-addr: 2620:fe::fe:11@853#dns11.quad9.net
forward-addr: 2620:fe::fe:11@8853#dns11.quad9.net #forward-addr: 2620:fe::fe:11@8853#dns11.quad9.net
forward-addr: 9.9.9.11@853#dns11.quad9.net #forward-addr: 9.9.9.11@853#dns11.quad9.net
forward-addr: 9.9.9.11@8853#dns11.quad9.net #forward-addr: 9.9.9.11@8853#dns11.quad9.net
forward-addr: 2620:fe::11@853#dns11.quad9.net #forward-addr: 2620:fe::11@853#dns11.quad9.net
forward-addr: 2620:fe::11@8853#dns11.quad9.net #forward-addr: 2620:fe::11@8853#dns11.quad9.net
forward-addr: 149.112.112.11@853#dns11.quad9.net #forward-addr: 149.112.112.11@853#dns11.quad9.net
forward-addr: 149.112.112.11@8853#dns11.quad9.net #forward-addr: 149.112.112.11@8853#dns11.quad9.net
## No Threat Blocking + ECS ## No Threat Blocking + ECS
#forward-addr: 2620:fe::fe:12@853#dns12.quad9.net #forward-addr: 2620:fe::fe:12@853#dns12.quad9.net
#forward-addr: 2620:fe::fe:12@8853#dns12.quad9.net #forward-addr: 2620:fe::fe:12@8853#dns12.quad9.net

View File

@ -1,18 +0,0 @@
# This will only affect servers that are accessed with public IP address!
server:
#module-config: "ipsecmod validator iterator"
# subnetcache must be loaded for ecs
module-config: "subnetcache validator iterator"
# Send ECS everywhere always
client-subnet-zone: "."
client-subnet-always-forward: yes
# Send different subnet size
#max-client-subnet-ipv6: "16"
#max-client-subnet-ipv4: "0"
# IP address to send client subnets TO. Optionally /CIDR can be appended.
# This actually means AUTHORITY servers!
#send-client-subnet:
#send-client-subnet:
# vim: filetype=unbound.conf

View File

@ -1,89 +0,0 @@
# The point of this file is to have these domains just work without having
# to send queries, even if they are queried by web browser.
server:
# Quad9 Secure
local-zone: "dns.quad9.net." typetransparent
local-data: "dns.quad9.net. A 9.9.9.9"
local-data: "dns.quad9.net. A 149.112.112.112"
local-data: "dns.quad9.net. AAAA 2620:fe::fe"
local-data: "dns.quad9.net. AAAA 2620:fe::9"
# Quad9 No Threat Blocking
local-zone: "dns10.quad9.net." typetransparent
local-data: "dns10.quad9.net. A 9.9.9.10"
local-data: "dns10.quad9.net. A 149.112.112.10"
local-data: "dns10.quad9.net. AAAA 2620:fe::10"
local-data: "dns10.quad9.net. AAAA 2620:fe::fe:10"
# Quad9 Secure + ECS
local-zone: "dns11.quad9.net." typetransparent
local-data: "dns11.quad9.net. A 9.9.9.11"
local-data: "dns11.quad9.net. A 149.112.112.11"
local-data: "dns11.quad9.net. AAAA 2620:fe::11"
local-data: "dns11.quad9.net. AAAA 2620:fe::fe:11"
# Quad9 No Threat Blocking + ECS
local-zone: "dns12.quad9.net." typetransparent
local-data: "dns12.quad9.net. A 9.9.9.12"
local-data: "dns12.quad9.net. A 149.112.112.12"
local-data: "dns12.quad9.net. AAAA 2620:fe::12"
local-data: "dns12.quad9.net. AAAA 2620:fe::fe:12"
# DNS0 default
local-zone: "dns0.eu." typetransparent
local-data: "dns0.eu. A 193.110.81.0"
local-data: "dns0.eu. A 185.253.5.0"
local-data: "dns0.eu. AAAA 2a0f:fc80::"
local-data: "dns0.eu. AAAA 2a0f:fc81::"
# DNS0 Zero
local-zone: "zero.dns0.eu." typetransparent
local-data: "zero.dns0.eu. A 193.110.81.9"
local-data: "zero.dns0.eu. A 185.253.5.9"
local-data: "zero.dns0.eu. AAAA 2a0f:fc80::9"
local-data: "zero.dns0.eu. AAAA 2a0f:fc81::9"
# DNS0 Kids
local-zone: "kids.dns0.eu." typetransparent
local-data: "kids.dns0.eu. A 193.110.81.1"
local-data: "kids.dns0.eu. A 185.253.5.1"
local-data: "kids.dns0.eu. AAAA 2a0f:fc80::1"
local-data: "kids.dns0.eu. AAAA 2a0f:fc81::1"
# DNS0 Open
local-zone: "open.dns0.eu." typetransparent
local-data: "open.dns0.eu. A 193.110.81.254"
local-data: "open.dns0.eu. A 185.253.5.254"
local-data: "open.dns0.eu. AAAA 2a0f:fc80::ffff"
local-data: "open.dns0.eu. AAAA 2a0f:fc81::ffff"
# Cloudflare
local-zone: "cloudflare-dns.com." typetransparent
local-data: "cloudflare-dns.com. A 1.1.1.1"
local-data: "cloudflare-dns.com. A 1.0.0.1"
local-data: "cloudflare-dns.com. AAAA 2606:4700:4700::1111"
local-data: "cloudflare-dns.com. AAAA 2606:4700:4700::1001"
local-zone: "one.one.one.one." typetransparent
local-data: "one.one.one.one. CNAME cloudflare-dns.com."
# Cloudflare Malware blocking
local-zone: "security.cloudflare-dns.com." typetransparent
local-data: "security.cloudflare-dns.com. A 1.1.1.2"
local-data: "security.cloudflare-dns.com. A 1.0.0.2"
local-data: "security.cloudflare-dns.com. AAAA 2606:4700:4700::1112"
local-data: "security.cloudflare-dns.com. AAAA 2606:4700:4700::1002"
# Mullvad ad, tracker & malware block
local-zone: "base.dns.mullvad.net." typetransparent
local-data: "base.dns.mullvad.net. A 194.242.2.4"
local-data: "base.dns.mullvad.net. AAAA 2a07:e340::4"
# AdGuard Default
local-zone: "dns.adguard-dns.com." typetransparent
local-data: "dns.adguard-dns.com. A 94.140.14.14"
local-data: "dns.adguard-dns.com. A 94.140.15.15"
local-data: "dns.adguard-dns.com. AAAA 2a10:50c0::ad1:ff"
local-data: "dns.adguard-dns.com. AAAA 2a10:50c0::ad2:ff"
# Google DNS
local-zone: "dns.google." typetransparent
local-data: "dns.google. A 8.8.8.8"
local-data: "dns.google. A 8.8.4.4"
local-data: "dns.google. AAAA 2001:4860:4860::8888"
local-data: "dns.google. AAAA 2001:4860:4860::8844"
local-zone: "dns.google.com." typetransparent
local-data: "dns.google.com. CNAME dns.google."
# Google DNS64
local-zone: "dns64.dns.google." typetransparent
local-data: "dns64.dns.google. AAAA 2001:4860:4860::6464"
local-data: "dns64.dns.google. AAAA 2001:4860:4860::64"
# vim: filetype=unbound.conf

5
package.json vendored
View File

@ -1,13 +1,14 @@
{ {
"devDependencies": { "devDependencies": {
"@aminda/global-prettier-config": "2025.10.0", "@aminda/global-prettier-config": "2025.13.0",
"@prettier/plugin-ruby": "4.0.4", "@prettier/plugin-ruby": "4.0.4",
"@prettier/plugin-xml": "3.4.1", "@prettier/plugin-xml": "3.4.1",
"corepack": "latest",
"prettier": "3.5.3", "prettier": "3.5.3",
"prettier-plugin-nginx": "1.0.3", "prettier-plugin-nginx": "1.0.3",
"prettier-plugin-sh": "0.15.0", "prettier-plugin-sh": "0.15.0",
"prettier-plugin-toml": "2.0.2" "prettier-plugin-toml": "2.0.2"
}, },
"packageManager": "pnpm@10.6.2+sha512.47870716bea1572b53df34ad8647b42962bc790ce2bf4562ba0f643237d7302a3d6a8ecef9e4bdfc01d23af1969aa90485d4cebb0b9638fa5ef1daef656f6c1b", "packageManager": "pnpm@10.6.5+sha512.cdf928fca20832cd59ec53826492b7dc25dc524d4370b6b4adbf65803d32efaa6c1c88147c0ae4e8d579a6c9eec715757b50d4fa35eea179d868eada4ed043af",
"prettier": "@aminda/global-prettier-config" "prettier": "@aminda/global-prettier-config"
} }

24
pnpm-lock.yaml generated vendored
View File

@ -8,14 +8,17 @@ importers:
.: .:
devDependencies: devDependencies:
"@aminda/global-prettier-config": "@aminda/global-prettier-config":
specifier: 2025.10.0 specifier: 2025.13.0
version: 2025.10.0 version: 2025.13.0
"@prettier/plugin-ruby": "@prettier/plugin-ruby":
specifier: 4.0.4 specifier: 4.0.4
version: 4.0.4(prettier@3.5.3) version: 4.0.4(prettier@3.5.3)
"@prettier/plugin-xml": "@prettier/plugin-xml":
specifier: 3.4.1 specifier: 3.4.1
version: 3.4.1(prettier@3.5.3) version: 3.4.1(prettier@3.5.3)
corepack:
specifier: latest
version: 0.32.0
prettier: prettier:
specifier: 3.5.3 specifier: 3.5.3
version: 3.5.3 version: 3.5.3
@ -30,10 +33,10 @@ importers:
version: 2.0.2(prettier@3.5.3) version: 2.0.2(prettier@3.5.3)
packages: packages:
"@aminda/global-prettier-config@2025.10.0": "@aminda/global-prettier-config@2025.13.0":
resolution: resolution:
{ {
integrity: sha512-7M2TWWTZDU6rU0AkcNeFSILuvh8lT3Mr0TAl/ZVctYWgWuzOzyRVZySwStl4o3Oj2QMCEEEky5wzJO8540rq1Q==, integrity: sha512-1yRmlX7lrBu41eu7dcAF17fTYdbnTYp6o1zRKGUVku6ddz9rp0cjCw4QK1oNrUq7KU0GAAlxQtDfw0WlOzJw+A==,
} }
"@prettier/plugin-ruby@4.0.4": "@prettier/plugin-ruby@4.0.4":
@ -76,6 +79,14 @@ packages:
integrity: sha512-wy3mC1x4ye+O+QkEinVJkPf5u2vsrDIYW9G7ZuwFl6v/Yu0LwUuT2POsb+NUWApebyxfkQq6+yDfRExbnI5rcw==, integrity: sha512-wy3mC1x4ye+O+QkEinVJkPf5u2vsrDIYW9G7ZuwFl6v/Yu0LwUuT2POsb+NUWApebyxfkQq6+yDfRExbnI5rcw==,
} }
corepack@0.32.0:
resolution:
{
integrity: sha512-KhahVUFy7xL8OTty/ToY646hXMQhih8rnvUkA9/qnk/u4QUF2+SbQneX/zZnDxG1NiABFm5ojZCWnIv93oyhhQ==,
}
engines: { node: ^18.17.1 || ^20.10.0 || >=22.11.0 }
hasBin: true
mvdan-sh@0.10.1: mvdan-sh@0.10.1:
resolution: resolution:
{ {
@ -134,10 +145,11 @@ packages:
} }
snapshots: snapshots:
"@aminda/global-prettier-config@2025.10.0": "@aminda/global-prettier-config@2025.13.0":
dependencies: dependencies:
"@prettier/plugin-ruby": 4.0.4(prettier@3.5.3) "@prettier/plugin-ruby": 4.0.4(prettier@3.5.3)
"@prettier/plugin-xml": 3.4.1(prettier@3.5.3) "@prettier/plugin-xml": 3.4.1(prettier@3.5.3)
corepack: 0.32.0
prettier: 3.5.3 prettier: 3.5.3
prettier-plugin-nginx: 1.0.3 prettier-plugin-nginx: 1.0.3
prettier-plugin-sh: 0.15.0(prettier@3.5.3) prettier-plugin-sh: 0.15.0(prettier@3.5.3)
@ -166,6 +178,8 @@ snapshots:
dependencies: dependencies:
regexp-to-ast: 0.5.0 regexp-to-ast: 0.5.0
corepack@0.32.0: {}
mvdan-sh@0.10.1: {} mvdan-sh@0.10.1: {}
prettier-plugin-nginx@1.0.3: {} prettier-plugin-nginx@1.0.3: {}

View File

@ -159,8 +159,8 @@ if hash lsb_release 2> /dev/null; then
unset LC_ALL unset LC_ALL
) )
# Only print motivational phrases if username is aminda or mikaela # Only print motivational phrases if username is aminda or mikaela or deck
if [[ $(whoami) == aminda ]] || [[ $(whoami) == mikaela ]]; then if [[ $(whoami) == aminda ]] || [[ $(whoami) == mikaela ]] || [[ $(whoami) == deck ]]; then
if hash python3 2> /dev/null; then if hash python3 2> /dev/null; then
( (
# Motivational messages # Motivational messages
@ -191,6 +191,7 @@ Aferoj emas funkcii sin mem...\tOM MANI PEME HUNG...
# And this from sudo + the general advice for auditability # And this from sudo + the general advice for auditability
(printf "We trust you have received the usual lecture from the local System\nAdministrator. It usually boils down to these three things:\n\n\t#1) Respect the privacy of others.\n\t#2) Think before you type.\n\t#3) With great power comes great responsibility.\n\nAdditionally you shouldn't be logging in as root directly.\n\n") (printf "We trust you have received the usual lecture from the local System\nAdministrator. It usually boils down to these three things:\n\n\t#1) Respect the privacy of others.\n\t#2) Think before you type.\n\t#3) With great power comes great responsibility.\n\nAdditionally you shouldn't be logging in as root directly.\n\n")
fi fi
printf "\tMake your tech grayscale painting your life with colours\n"
fi fi
##### Environment 7RS56S ##### ##### Environment 7RS56S #####

View File

@ -55,8 +55,8 @@ if hash lsb_release 2> /dev/null; then
unset LC_ALL unset LC_ALL
) )
# Only print motivational phrases if username is aminda or mikaela # Only print motivational phrases if username is aminda or mikaela or deck
if [[ $(whoami) == aminda ]] || [[ $(whoami) == mikaela ]]; then if [[ $(whoami) == aminda ]] || [[ $(whoami) == mikaela ]] || [[ $(whoami) == deck ]]; then
if hash python3 2> /dev/null; then if hash python3 2> /dev/null; then
( (
# Motivational messages # Motivational messages
@ -87,6 +87,7 @@ Aferoj emas funkcii sin mem...\tOM MANI PEME HUNG...
# And this from sudo + the general advice for auditability # And this from sudo + the general advice for auditability
(printf "We trust you have received the usual lecture from the local System\nAdministrator. It usually boils down to these three things:\n\n\t#1) Respect the privacy of others.\n\t#2) Think before you type.\n\t#3) With great power comes great responsibility.\n\nAdditionally you shouldn't be logging in as root directly.\n\n") (printf "We trust you have received the usual lecture from the local System\nAdministrator. It usually boils down to these three things:\n\n\t#1) Respect the privacy of others.\n\t#2) Think before you type.\n\t#3) With great power comes great responsibility.\n\nAdditionally you shouldn't be logging in as root directly.\n\n")
fi fi
printf "\tMake your tech grayscale painting your life with colours\n"
fi fi
##### Defaults etc... M0TZLS ##### ##### Defaults etc... M0TZLS #####