mirror of
https://gitea.blesmrt.net/mikaela/shell-things.git
synced 2025-08-19 12:47:27 +02:00
Compare commits
15 Commits
df1458af1f
...
95671fb32d
Author | SHA1 | Date | |
---|---|---|---|
95671fb32d | |||
0a4179df0c | |||
c2e0917c3a | |||
bec86d1344 | |||
a7ef548dab | |||
e6696d22f6 | |||
5b4f78f5f4 | |||
2ff416d880 | |||
20679e705d | |||
aac0a04564 | |||
c68e3f66ab | |||
5a88836d59 | |||
5995ef8f32 | |||
1290db73f5 | |||
c05eedbb78 |
@ -12,7 +12,7 @@
|
|||||||
|
|
||||||
// Firefox autoconfig
|
// Firefox autoconfig
|
||||||
pref("autoadmin.global_config_url", "https://gitea.blesmrt.net/mikaela/shell-things/raw/branch/master/conf/librewolf.overrides.cfg");
|
pref("autoadmin.global_config_url", "https://gitea.blesmrt.net/mikaela/shell-things/raw/branch/master/conf/librewolf.overrides.cfg");
|
||||||
pref("general.config.obscure_value", 0);
|
//pref("general.config.obscure_value", 0);
|
||||||
pref("autoadmin.refresh_interval", 120);
|
pref("autoadmin.refresh_interval", 120);
|
||||||
pref("autoadmin.offline_failover", true);
|
pref("autoadmin.offline_failover", true);
|
||||||
pref("autoadmin.failover_to_cached", true);
|
pref("autoadmin.failover_to_cached", true);
|
||||||
@ -31,7 +31,7 @@ pref("cookiebanners.service.mode.privateBrowsing", 2);
|
|||||||
pref("cookiebanners.bannerClicking.enabled", true);
|
pref("cookiebanners.bannerClicking.enabled", true);
|
||||||
|
|
||||||
// https://globalprivacycontrol.org/ the successor of DNT
|
// https://globalprivacycontrol.org/ the successor of DNT
|
||||||
pref("privacy.globalprivacycontrol.enabled", true);
|
//pref("privacy.globalprivacycontrol.enabled", true);
|
||||||
pref("privacy.globalprivacycontrol.functionality.enabled", true);
|
pref("privacy.globalprivacycontrol.functionality.enabled", true);
|
||||||
pref("privacy.donottrackheader.enabled", true);
|
pref("privacy.donottrackheader.enabled", true);
|
||||||
pref("privacy.donottrackheader.value", 1);
|
pref("privacy.donottrackheader.value", 1);
|
||||||
@ -62,7 +62,7 @@ pref("javascript.use_us_english_locale", true);
|
|||||||
// the fingerprinting game. Then again as sending empty accept-language is
|
// the fingerprinting game. Then again as sending empty accept-language is
|
||||||
// valid ("just give me any"), what if I request only Finnish considering the
|
// valid ("just give me any"), what if I request only Finnish considering the
|
||||||
// RFC discourages sending rejection if no language matches.
|
// RFC discourages sending rejection if no language matches.
|
||||||
defaultPref("intl.accept_languages", "fi, en");
|
//defaultPref("intl.accept_languages", "fi, en");
|
||||||
// Apparently even not sending accept-language is more common than Finnish,
|
// Apparently even not sending accept-language is more common than Finnish,
|
||||||
// so let's do that. Any language is fine, at least I am not promoting English
|
// so let's do that. Any language is fine, at least I am not promoting English
|
||||||
// to every web site I visit.
|
// to every web site I visit.
|
||||||
@ -75,7 +75,7 @@ defaultPref("intl.accept_languages", "fi, en");
|
|||||||
|
|
||||||
// Dark mode
|
// Dark mode
|
||||||
//pref("ui.systemUsesDarkTheme", 1);
|
//pref("ui.systemUsesDarkTheme", 1);
|
||||||
pref("prefers-color-scheme", "dark");
|
//pref("prefers-color-scheme", "dark");
|
||||||
//pref("pdfjs.viewerCssTheme", 2);
|
//pref("pdfjs.viewerCssTheme", 2);
|
||||||
|
|
||||||
// Enable Firefox accounts
|
// Enable Firefox accounts
|
||||||
@ -125,7 +125,7 @@ pref("reader.parse-on-load.force-enabled", true);
|
|||||||
//pref("network.trr.excluded-domains", "http.badssl.com,norwegianwifi.com,mywifiext.net,tplinkrepeater.net,router.asus.com");
|
//pref("network.trr.excluded-domains", "http.badssl.com,norwegianwifi.com,mywifiext.net,tplinkrepeater.net,router.asus.com");
|
||||||
|
|
||||||
// Default UI scale
|
// Default UI scale
|
||||||
defaultPref("layout.css.devPixelsPerPx", "1.5");
|
//defaultPref("layout.css.devPixelsPerPx", "1.5");
|
||||||
|
|
||||||
// Keep cache on both disk & memory. This is required for
|
// Keep cache on both disk & memory. This is required for
|
||||||
// https://github.com/JimmXinu/FanFicFare/wiki/BrowserCacheFeature
|
// https://github.com/JimmXinu/FanFicFare/wiki/BrowserCacheFeature
|
||||||
@ -143,8 +143,8 @@ pref("browser.cache.memory.enable", true);
|
|||||||
/** [SECTION] CONTAINERS
|
/** [SECTION] CONTAINERS
|
||||||
* enable containers and show the settings to control them in the stock ui
|
* enable containers and show the settings to control them in the stock ui
|
||||||
*/
|
*/
|
||||||
pref("privacy.userContext.enabled", true);
|
//pref("privacy.userContext.enabled", true);
|
||||||
pref("privacy.userContext.ui.enabled", true);
|
//pref("privacy.userContext.ui.enabled", true);
|
||||||
|
|
||||||
//pref("browser.contentblocking.category", "strict");
|
//pref("browser.contentblocking.category", "strict");
|
||||||
pref("privacy.partition.always_partition_third_party_non_cookie_storage", true);
|
pref("privacy.partition.always_partition_third_party_non_cookie_storage", true);
|
||||||
|
@ -37,7 +37,10 @@
|
|||||||
"eff-dnt-whitelist",
|
"eff-dnt-whitelist",
|
||||||
"ublock-quick-fixes",
|
"ublock-quick-fixes",
|
||||||
"FIN-0",
|
"FIN-0",
|
||||||
"https://big.oisd.nl"
|
"https://big.oisd.nl",
|
||||||
|
"ublock-annoyances",
|
||||||
|
"adguard-mobile-app-banners",
|
||||||
|
"curben-phishing"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
@ -236,6 +239,30 @@
|
|||||||
"Enabled": true
|
"Enabled": true
|
||||||
},
|
},
|
||||||
"Preferences": {
|
"Preferences": {
|
||||||
|
"autoadmin.failover_to_cached": {
|
||||||
|
"Comment": "Preference not allowed for stability reasons. :(",
|
||||||
|
"Status": "locked",
|
||||||
|
"Type": "boolean",
|
||||||
|
"Value": true
|
||||||
|
},
|
||||||
|
"autoadmin.global_config_url": {
|
||||||
|
"Comment": "Preference not allowed for stability reasons. :(",
|
||||||
|
"Status": "locked",
|
||||||
|
"Type": "string",
|
||||||
|
"Value": "https://gitea.blesmrt.net/mikaela/shell-things/raw/branch/master/conf/librewolf.overrides.cfg"
|
||||||
|
},
|
||||||
|
"autoadmin.offline_failover": {
|
||||||
|
"Comment": "Preference not allowed for stability reasons. :(",
|
||||||
|
"Status": "locked",
|
||||||
|
"Type": "boolean",
|
||||||
|
"Value": true
|
||||||
|
},
|
||||||
|
"autoadmin.refresh_interval": {
|
||||||
|
"Comment": "Preference not allowed for stability reasons. :(",
|
||||||
|
"Status": "locked",
|
||||||
|
"Type": "number",
|
||||||
|
"Value": 120
|
||||||
|
},
|
||||||
"browser.aboutConfig.showWarning": {
|
"browser.aboutConfig.showWarning": {
|
||||||
"Status": "locked",
|
"Status": "locked",
|
||||||
"Type": "boolean",
|
"Type": "boolean",
|
||||||
@ -266,6 +293,24 @@
|
|||||||
"Type": "boolean",
|
"Type": "boolean",
|
||||||
"Value": false
|
"Value": false
|
||||||
},
|
},
|
||||||
|
"cookiebanners.bannerClicking.enabled": {
|
||||||
|
"Comment": "Preference not allowed for stability reasons. :(",
|
||||||
|
"Status": "locked",
|
||||||
|
"Type": "boolean",
|
||||||
|
"Value": true
|
||||||
|
},
|
||||||
|
"cookiebanners.service.mode": {
|
||||||
|
"Comment": "Preference not allowed for stability reasons. :(",
|
||||||
|
"Status": "locked",
|
||||||
|
"Type": "number",
|
||||||
|
"Value": 2
|
||||||
|
},
|
||||||
|
"cookiebanners.service.mode.privateBrowsing": {
|
||||||
|
"Comment": "Preference not allowed for stability reasons. :(",
|
||||||
|
"Status": "locked",
|
||||||
|
"Type": "number",
|
||||||
|
"Value": 2
|
||||||
|
},
|
||||||
"dom.block_download_insecure": {
|
"dom.block_download_insecure": {
|
||||||
"Status": "locked",
|
"Status": "locked",
|
||||||
"Type": "boolean",
|
"Type": "boolean",
|
||||||
@ -281,7 +326,17 @@
|
|||||||
"Type": "string",
|
"Type": "string",
|
||||||
"Value": ""
|
"Value": ""
|
||||||
},
|
},
|
||||||
|
"general.config.obscure_value": {
|
||||||
|
"Status": "locked",
|
||||||
|
"Type": "number",
|
||||||
|
"Value": 0
|
||||||
|
},
|
||||||
|
"geo.provider.network.url": {
|
||||||
|
"Comment": "This might point to discontinued Mozilla Location Services, so better to restore it to default.",
|
||||||
|
"Status": "clear"
|
||||||
|
},
|
||||||
"image.animation.mode": {
|
"image.animation.mode": {
|
||||||
|
"Comment": "Preference not allowed for stability reasons. :(",
|
||||||
"Status": "default",
|
"Status": "default",
|
||||||
"Type": "string",
|
"Type": "string",
|
||||||
"Value": "once"
|
"Value": "once"
|
||||||
@ -291,11 +346,22 @@
|
|||||||
"Type": "string",
|
"Type": "string",
|
||||||
"Value": "fi, en"
|
"Value": "fi, en"
|
||||||
},
|
},
|
||||||
|
"javascript.use_us_english_locale": {
|
||||||
|
"Comment": "Preference not allowed for stability reasons. :(",
|
||||||
|
"Status": "default",
|
||||||
|
"Type": "boolean",
|
||||||
|
"Value": true
|
||||||
|
},
|
||||||
"layout.css.devPixelsPerPx": {
|
"layout.css.devPixelsPerPx": {
|
||||||
"Status": "default",
|
"Status": "default",
|
||||||
"Type": "string",
|
"Type": "string",
|
||||||
"Value": "1.5"
|
"Value": "1.5"
|
||||||
},
|
},
|
||||||
|
"layout.css.prefers-color-scheme.content-override": {
|
||||||
|
"Status": "default",
|
||||||
|
"Type": "number",
|
||||||
|
"Value": 0
|
||||||
|
},
|
||||||
"media.autoplay.default": {
|
"media.autoplay.default": {
|
||||||
"Status": "default",
|
"Status": "default",
|
||||||
"Type": "number",
|
"Type": "number",
|
||||||
@ -311,6 +377,11 @@
|
|||||||
"Type": "boolean",
|
"Type": "boolean",
|
||||||
"Value": true
|
"Value": true
|
||||||
},
|
},
|
||||||
|
"network.dns.http3_echconfig.enabled": {
|
||||||
|
"Status": "locked",
|
||||||
|
"Type": "boolean",
|
||||||
|
"Value": true
|
||||||
|
},
|
||||||
"network.dns.native_https_query": {
|
"network.dns.native_https_query": {
|
||||||
"Status": "locked",
|
"Status": "locked",
|
||||||
"Type": "boolean",
|
"Type": "boolean",
|
||||||
@ -322,9 +393,8 @@
|
|||||||
"Value": true
|
"Value": true
|
||||||
},
|
},
|
||||||
"network.dns.native_https_query_win10": {
|
"network.dns.native_https_query_win10": {
|
||||||
"Status": "locked",
|
"Comment": "This is here just as a reminder that it exists. I don't have a Windows 10 and it will likely switch to true when it exists.",
|
||||||
"Type": "boolean",
|
"Status": "clear"
|
||||||
"Value": true
|
|
||||||
},
|
},
|
||||||
"network.dns.preferIPv6": {
|
"network.dns.preferIPv6": {
|
||||||
"Status": "locked",
|
"Status": "locked",
|
||||||
@ -402,25 +472,64 @@
|
|||||||
"Value": "#ffb700"
|
"Value": "#ffb700"
|
||||||
},
|
},
|
||||||
"privacy.donottrackheader.enabled": {
|
"privacy.donottrackheader.enabled": {
|
||||||
|
"Comment": "Preference not allowed for stability reasons. :(",
|
||||||
"Status": "locked",
|
"Status": "locked",
|
||||||
"Type": "boolean",
|
"Type": "boolean",
|
||||||
"Value": true
|
"Value": true
|
||||||
},
|
},
|
||||||
"privacy.donottrackheader.value": {
|
"privacy.donottrackheader.value": {
|
||||||
|
"Comment": "Preference not allowed for stability reasons. :(",
|
||||||
"Status": "locked",
|
"Status": "locked",
|
||||||
"Type": "number",
|
"Type": "number",
|
||||||
"Value": 1
|
"Value": 1
|
||||||
},
|
},
|
||||||
|
"privacy.fingerprintingProtection": {
|
||||||
|
"Comment": "Preference not allowed for stability reasons. :(",
|
||||||
|
"Status": "locked",
|
||||||
|
"Type": "boolean",
|
||||||
|
"Value": true
|
||||||
|
},
|
||||||
|
"privacy.fingerprintingProtection.overrides": {
|
||||||
|
"Comment": "Preference not allowed for stability reasons. :(",
|
||||||
|
"Status": "locked",
|
||||||
|
"Type": "string",
|
||||||
|
"Value": "+AllTargets,-KeyboardEvents,-SpeechSynthesis,-CSSPrefersColorScheme,-CSSPrefersReducedMotion,-NavigatorPlatform,-NavigatorUserAgent,-JSDateTimeUTC,-HttpUserAgent,-FontVisibilityRestrictGenerics,-FontVisibilityBaseSystem,-FontVisibilityLangPack"
|
||||||
|
},
|
||||||
|
"privacy.fingerprintingProtection.pbmode": {
|
||||||
|
"Comment": "Preference not allowed for stability reasons. :(",
|
||||||
|
"Status": "locked",
|
||||||
|
"Type": "boolean",
|
||||||
|
"Value": true
|
||||||
|
},
|
||||||
"privacy.globalprivacycontrol.enabled": {
|
"privacy.globalprivacycontrol.enabled": {
|
||||||
"Status": "locked",
|
"Status": "locked",
|
||||||
"Type": "boolean",
|
"Type": "boolean",
|
||||||
"Value": true
|
"Value": true
|
||||||
},
|
},
|
||||||
"privacy.globalprivacycontrol.functionality.enabled": {
|
"privacy.resistFingerprinting": {
|
||||||
|
"Comment": "Preference not allowed for stability reasons. :(",
|
||||||
|
"Status": "locked",
|
||||||
|
"Type": "boolean",
|
||||||
|
"Value": false
|
||||||
|
},
|
||||||
|
"privacy.resistFingerprinting.block_mozAddonManage": {
|
||||||
|
"Comment": "Preference not allowed for stability reasons. :(",
|
||||||
"Status": "locked",
|
"Status": "locked",
|
||||||
"Type": "boolean",
|
"Type": "boolean",
|
||||||
"Value": true
|
"Value": true
|
||||||
},
|
},
|
||||||
|
"privacy.resistFingerprinting.letterboxing": {
|
||||||
|
"Comment": "Preference not allowed for stability reasons. :(",
|
||||||
|
"Status": "locked",
|
||||||
|
"Type": "boolean",
|
||||||
|
"Value": true
|
||||||
|
},
|
||||||
|
"privacy.resistFingerprinting.pbmode": {
|
||||||
|
"Comment": "Preference not allowed for stability reasons. :(",
|
||||||
|
"Status": "locked",
|
||||||
|
"Type": "boolean",
|
||||||
|
"Value": false
|
||||||
|
},
|
||||||
"privacy.userContext.enabled": {
|
"privacy.userContext.enabled": {
|
||||||
"Status": "locked",
|
"Status": "locked",
|
||||||
"Type": "boolean",
|
"Type": "boolean",
|
||||||
@ -431,6 +540,12 @@
|
|||||||
"Type": "boolean",
|
"Type": "boolean",
|
||||||
"Value": true
|
"Value": true
|
||||||
},
|
},
|
||||||
|
"reader.parse-on-load.force-enabled": {
|
||||||
|
"Comment": "Preference not allowed for stability reasons. :(",
|
||||||
|
"Status": "locked",
|
||||||
|
"Type": "boolean",
|
||||||
|
"Value": true
|
||||||
|
},
|
||||||
"security.OCSP.require": {
|
"security.OCSP.require": {
|
||||||
"Status": "locked",
|
"Status": "locked",
|
||||||
"Type": "boolean",
|
"Type": "boolean",
|
||||||
@ -447,6 +562,7 @@
|
|||||||
"Value": true
|
"Value": true
|
||||||
},
|
},
|
||||||
"security.ssl.enable_ocsp_must_staple": {
|
"security.ssl.enable_ocsp_must_staple": {
|
||||||
|
"Comment": "Preference not allowed for security reasons. :(",
|
||||||
"Status": "locked",
|
"Status": "locked",
|
||||||
"Type": "boolean",
|
"Type": "boolean",
|
||||||
"Value": true
|
"Value": true
|
||||||
@ -456,6 +572,12 @@
|
|||||||
"Type": "boolean",
|
"Type": "boolean",
|
||||||
"Value": true
|
"Value": true
|
||||||
},
|
},
|
||||||
|
"security.tls.ech.grease_http3": {
|
||||||
|
"Comment": "Seems to be required for http3. This defaults to true on Nightly 128 and false on 115.11.0esr. However again not allowed to be deployed here for security :()",
|
||||||
|
"Status": "locked",
|
||||||
|
"Type": "boolean",
|
||||||
|
"Value": true
|
||||||
|
},
|
||||||
"ui.systemUsesDarkTheme": {
|
"ui.systemUsesDarkTheme": {
|
||||||
"Status": "default",
|
"Status": "default",
|
||||||
"Type": "number",
|
"Type": "number",
|
||||||
|
1
etc/opt/chromium/policies/managed/.gitignore
vendored
1
etc/opt/chromium/policies/managed/.gitignore
vendored
@ -1 +1,2 @@
|
|||||||
doh-cloudflare-secure.json
|
doh-cloudflare-secure.json
|
||||||
|
doh-adguard-dns0.json
|
||||||
|
@ -149,7 +149,9 @@ yes, it's the second time ,one is edge, one is chrome
|
|||||||
|
|
||||||
- `nngceckbapebfimnlniiiahkandclblb`
|
- `nngceckbapebfimnlniiiahkandclblb`
|
||||||
|
|
||||||
The password manager of my choice.
|
The password manager of my choice. For the managed settings
|
||||||
|
[see here](https://bitwarden.com/help/deploy-clients/), although that only
|
||||||
|
applies to self-hosters.
|
||||||
|
|
||||||
### [Privacy Badger](https://chrome.google.com/webstore/detail/pkehgijcmpdhfbdbbnkijodmdjhbjlgp)
|
### [Privacy Badger](https://chrome.google.com/webstore/detail/pkehgijcmpdhfbdbbnkijodmdjhbjlgp)
|
||||||
|
|
||||||
|
@ -42,7 +42,10 @@
|
|||||||
"eff-dnt-whitelist",
|
"eff-dnt-whitelist",
|
||||||
"ublock-quick-fixes",
|
"ublock-quick-fixes",
|
||||||
"FIN-0",
|
"FIN-0",
|
||||||
"https://big.oisd.nl"
|
"https://big.oisd.nl",
|
||||||
|
"ublock-annoyances",
|
||||||
|
"adguard-mobile-app-banners",
|
||||||
|
"curben-phishing"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
1
etc/opt/chromium/policies/managed/doh-adguard-dns0.json
Symbolic link
1
etc/opt/chromium/policies/managed/doh-adguard-dns0.json
Symbolic link
@ -0,0 +1 @@
|
|||||||
|
doh-private-ecs.json
|
@ -1,4 +1,4 @@
|
|||||||
{
|
{
|
||||||
"DnsOverHttpsMode": "automatic",
|
"DnsOverHttpsMode": "automatic",
|
||||||
"DnsOverHttpsTemplates": "https://dns.google/dns-query"
|
"DnsOverHttpsTemplates": "https://dns.google/dns-query?dns"
|
||||||
}
|
}
|
||||||
|
4
etc/opt/chromium/policies/managed/doh-google64.json
Normal file
4
etc/opt/chromium/policies/managed/doh-google64.json
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
{
|
||||||
|
"DnsOverHttpsMode": "automatic",
|
||||||
|
"DnsOverHttpsTemplates": "https://dns64.dns.google/dns-query?dns"
|
||||||
|
}
|
4
etc/opt/chromium/policies/managed/doh-private-ecs.json
Normal file
4
etc/opt/chromium/policies/managed/doh-private-ecs.json
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
{
|
||||||
|
"DnsOverHttpsMode": "automatic",
|
||||||
|
"DnsOverHttpsTemplates": "https://unfiltered.adguard-dns.com/dns-query https://open.dns0.eu/"
|
||||||
|
}
|
@ -6,6 +6,5 @@
|
|||||||
"DefaultSearchProviderNewTabURL": "https://start.duckduckgo.com/chrome_newtab?addon=newext",
|
"DefaultSearchProviderNewTabURL": "https://start.duckduckgo.com/chrome_newtab?addon=newext",
|
||||||
"DefaultSearchProviderSearchURL": "https://start.duckduckgo.com/?q={searchTerms}&addon=newext",
|
"DefaultSearchProviderSearchURL": "https://start.duckduckgo.com/?q={searchTerms}&addon=newext",
|
||||||
"DefaultSearchProviderSuggestURL": "https://start.duckduckgo.com/ac/?q={searchTerms}&type=list",
|
"DefaultSearchProviderSuggestURL": "https://start.duckduckgo.com/ac/?q={searchTerms}&type=list",
|
||||||
"HomepageIsNewTabPage": true,
|
|
||||||
"NewTabPageLocation": "https://start.duckduckgo.com/chrome_newtab?addon=newext"
|
"NewTabPageLocation": "https://start.duckduckgo.com/chrome_newtab?addon=newext"
|
||||||
}
|
}
|
||||||
|
@ -6,6 +6,5 @@
|
|||||||
"DefaultSearchProviderNewTabURL": "https://www.ecosia.org/newtab/?addon=chromegpo",
|
"DefaultSearchProviderNewTabURL": "https://www.ecosia.org/newtab/?addon=chromegpo",
|
||||||
"DefaultSearchProviderSearchURL": "https://www.ecosia.org/search?q={searchTerms}&addon=chromegpo",
|
"DefaultSearchProviderSearchURL": "https://www.ecosia.org/search?q={searchTerms}&addon=chromegpo",
|
||||||
"DefaultSearchProviderSuggestURL": "https://ac.ecosia.org/autocomplete?q={searchTerms}",
|
"DefaultSearchProviderSuggestURL": "https://ac.ecosia.org/autocomplete?q={searchTerms}",
|
||||||
"HomepageIsNewTabPage": true,
|
|
||||||
"NewTabPageLocation": "https://www.ecosia.org/newtab/?addon=chromegpo"
|
"NewTabPageLocation": "https://www.ecosia.org/newtab/?addon=chromegpo"
|
||||||
}
|
}
|
||||||
|
@ -1,5 +1,6 @@
|
|||||||
[Resolve]
|
[Resolve]
|
||||||
DNS=94.140.14.14#dns.adguard.com 94.140.15.15#dns.adguard.com 2a10:50c0::ad1:ff#dns.adguard.com 2a10:50c0::ad2:ff#dns.adguard.com
|
DNS=94.140.14.14#dns.adguard.com 94.140.15.15#dns.adguard.com 2a10:50c0::ad1:ff#dns.adguard.com 2a10:50c0::ad2:ff#dns.adguard.com
|
||||||
|
#DNS=94.140.14.140#unfiltered.adguard-dns.com 94.140.14.141#unfiltered.adguard-dns.com DNS=2a10:50c0::1:ff#unfiltered.adguard-dns.com 2a10:50c0::2:ff#unfiltered.adguard-dns.com
|
||||||
#DNSOverTLS=true
|
#DNSOverTLS=true
|
||||||
|
|
||||||
# vim: filetype=systemd
|
# vim: filetype=systemd
|
||||||
|
1
etc/unbound/unbound.conf.d/.gitignore
vendored
1
etc/unbound/unbound.conf.d/.gitignore
vendored
@ -1,3 +1,4 @@
|
|||||||
dot-nextdns.conf
|
dot-nextdns.conf
|
||||||
dot-trex.conf
|
dot-trex.conf
|
||||||
cache.conf
|
cache.conf
|
||||||
|
dot-adguard-dns0.conf
|
||||||
|
@ -12,6 +12,8 @@ server:
|
|||||||
# This list is for my travel laptop to have at least one DoT443 server
|
# This list is for my travel laptop to have at least one DoT443 server
|
||||||
# which seems to be applied-privacy.net. They advice having multiple DoT servers
|
# which seems to be applied-privacy.net. They advice having multiple DoT servers
|
||||||
# for redundancy and as they don't filter, it's best I use other non-filtering ones.
|
# for redundancy and as they don't filter, it's best I use other non-filtering ones.
|
||||||
|
# Since then this expanded to include <https://www.privacyguides.org/en/dns/>.
|
||||||
|
# just look at git blame...
|
||||||
|
|
||||||
forward-zone:
|
forward-zone:
|
||||||
name: "."
|
name: "."
|
||||||
@ -49,4 +51,16 @@ forward-zone:
|
|||||||
forward-addr: 9.9.9.10@853#dns10.quad9.net
|
forward-addr: 9.9.9.10@853#dns10.quad9.net
|
||||||
forward-addr: 9.9.9.10@8853#dns10.quad9.net
|
forward-addr: 9.9.9.10@8853#dns10.quad9.net
|
||||||
|
|
||||||
|
# https://www.dns0.eu/open https://www.dns0.eu/network - French based. Private ECS
|
||||||
|
forward-addr: 193.110.81.254@853#open.dns0.eu
|
||||||
|
forward-addr: 185.253.5.254@853#open.dns0.eu
|
||||||
|
forward-addr: 2a0f:fc80::ffff@853#open.dns0.eu
|
||||||
|
forward-addr: 2a0f:fc81::ffff@853#open.dns0.eu
|
||||||
|
|
||||||
|
# Adguard DNS Unfiltered Anycast. Malta based. Private ECS.
|
||||||
|
forward-addr: 2a10:50c0::1:ff@853#unfiltered.adguard-dns.com
|
||||||
|
forward-addr: 2a10:50c0::2:ff@853#unfiltered.adguard-dns.com
|
||||||
|
forward-addr: 94.140.14.140@853#unfiltered.adguard-dns.com
|
||||||
|
forward-addr: 94.140.14.141@853#unfiltered.adguard-dns.com
|
||||||
|
|
||||||
# vim: filetype=unbound.conf
|
# vim: filetype=unbound.conf
|
||||||
|
1
etc/unbound/unbound.conf.d/dot-adguard-dns0.conf
Symbolic link
1
etc/unbound/unbound.conf.d/dot-adguard-dns0.conf
Symbolic link
@ -0,0 +1 @@
|
|||||||
|
dot-private-ecs.conf
|
@ -15,10 +15,16 @@ server:
|
|||||||
forward-zone:
|
forward-zone:
|
||||||
name: "."
|
name: "."
|
||||||
forward-tls-upstream: yes
|
forward-tls-upstream: yes
|
||||||
|
# AdGuard with AdBlocking
|
||||||
forward-addr: 2a10:50c0::ad1:ff@853#dns.adguard.com
|
forward-addr: 2a10:50c0::ad1:ff@853#dns.adguard.com
|
||||||
forward-addr: 94.140.14.14@853#dns.adguard.com
|
forward-addr: 94.140.14.14@853#dns.adguard.com
|
||||||
forward-addr: 2a10:50c0::ad2:ff@853#dns.adguard.com
|
forward-addr: 2a10:50c0::ad2:ff@853#dns.adguard.com
|
||||||
forward-addr: 94.140.15.15@853#dns.adguard.com
|
forward-addr: 94.140.15.15@853#dns.adguard.com
|
||||||
|
# AdGuard Public DNS without filtering
|
||||||
|
#forward-addr: 2a10:50c0::1:ff@853#unfiltered.adguard-dns.com
|
||||||
|
#forward-addr: 2a10:50c0::2:ff@853#unfiltered.adguard-dns.com
|
||||||
|
#forward-addr: 94.140.14.140@853#unfiltered.adguard-dns.com
|
||||||
|
#forward-addr: 94.140.14.141@853#unfiltered.adguard-dns.com
|
||||||
|
|
||||||
# Updated for https://adguard.com/en/blog/adguard-dns-new-addresses.html
|
# Updated for https://adguard.com/en/blog/adguard-dns-new-addresses.html
|
||||||
|
|
||||||
|
29
etc/unbound/unbound.conf.d/dot-private-ecs.conf
Normal file
29
etc/unbound/unbound.conf.d/dot-private-ecs.conf
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
server:
|
||||||
|
# Debian ca-certificates location
|
||||||
|
#tls-cert-bundle: /etc/ssl/certs/ca-certificates.crt
|
||||||
|
# Fedora
|
||||||
|
#tls-cert-bundle: /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem
|
||||||
|
# Use system certificates no matter where they are
|
||||||
|
tls-system-cert: yes
|
||||||
|
# Quad9 says pointless performance impact on forwarders.
|
||||||
|
# https://docs.quad9.net/Quad9_For_Organizations/DNS_Forwarder_Best_Practices/#disable-qname-minimization
|
||||||
|
qname-minimisation: no
|
||||||
|
# Private ECS is more accurate with IPv4 than IPv6.
|
||||||
|
prefer-ip4: yes
|
||||||
|
prefer-ip6: no
|
||||||
|
# AdGuard Public DNS without filtering.
|
||||||
|
forward-zone:
|
||||||
|
name: "."
|
||||||
|
forward-tls-upstream: yes
|
||||||
|
# AdGuard Public DNS without filtering
|
||||||
|
forward-addr: 2a10:50c0::1:ff@853#unfiltered.adguard-dns.com
|
||||||
|
forward-addr: 2a10:50c0::2:ff@853#unfiltered.adguard-dns.com
|
||||||
|
forward-addr: 94.140.14.140@853#unfiltered.adguard-dns.com
|
||||||
|
forward-addr: 94.140.14.141@853#unfiltered.adguard-dns.com
|
||||||
|
# DNS0.eu without filtering
|
||||||
|
forward-addr: 193.110.81.254@853#open.dns0.eu
|
||||||
|
forward-addr: 185.253.5.254@853#open.dns0.eu
|
||||||
|
forward-addr: 2a0f:fc80::ffff@853#open.dns0.eu
|
||||||
|
forward-addr: 2a0f:fc81::ffff@853#open.dns0.eu
|
||||||
|
|
||||||
|
# vim: filetype=unbound.conf
|
Loading…
x
Reference in New Issue
Block a user