Compare commits

..

15 Commits

Author SHA1 Message Date
95671fb32d
chromium: doh-private-ecs.json was supposed to be automatic 2024-05-18 16:55:38 +03:00
0a4179df0c
Revert "chromium/recommended/{duckduckgo,ecosia}.json: trick Brave & Edge into complying by NewTabPageLocation"
This reverts commit 7bab72fb3cf3e4dc4f6c5385e234c35b6ee60acd.
2024-05-18 16:36:46 +03:00
c2e0917c3a
unbound/dns-over-tls.conf: remove Quad9 ECS comments 2024-05-18 16:14:57 +03:00
bec86d1344
{systemd-resolved,unbound}: add commented unfiltered adguard to appropiate file 2024-05-18 16:12:58 +03:00
a7ef548dab
{chromium,unbound}: experimental dot-private-ecs.conf 2024-05-18 16:08:17 +03:00
e6696d22f6
Revert "unbound/dns-over-tls.conf: remove ECS and private ECS"
This reverts commit 78fa2b7b9ca4cbb09eb386fcf3693e0e354dc717.
2024-05-18 15:51:13 +03:00
5b4f78f5f4
chromium/doh-google{,64}.json: use get requests
more as a note that it can be done
2024-05-18 15:35:36 +03:00
2ff416d880
{firefox,chromium}: also enable curben-phishing 2024-05-18 14:04:43 +03:00
20679e705d
{firefox,chromium}: enable AdNauseam ublock-annoyances & adguard-mobile-app-banners 2024-05-18 13:55:18 +03:00
aac0a04564
LibreAwoo: comment the 7 options that policy accepted 2024-05-18 11:04:59 +03:00
c68e3f66ab
firefox: attempt to enable http for esr 2024-05-18 10:21:44 +03:00
5a88836d59
firefox: Comment/clear network.dns.native_https_query_win10 2024-05-18 09:44:25 +03:00
5995ef8f32
firefox/policies.json: attempt to autoconfig, but again not allowed 2024-05-18 09:24:25 +03:00
1290db73f5
firefox/policies.json: import more disallowed things from autoconfig, comment disallowed ones, clear location provider 2024-05-18 09:15:10 +03:00
c05eedbb78
chromium README: note Bitwarden management options for self-hosters 2024-05-18 08:03:29 +03:00
17 changed files with 204 additions and 17 deletions

View File

@ -12,7 +12,7 @@
// Firefox autoconfig // Firefox autoconfig
pref("autoadmin.global_config_url", "https://gitea.blesmrt.net/mikaela/shell-things/raw/branch/master/conf/librewolf.overrides.cfg"); pref("autoadmin.global_config_url", "https://gitea.blesmrt.net/mikaela/shell-things/raw/branch/master/conf/librewolf.overrides.cfg");
pref("general.config.obscure_value", 0); //pref("general.config.obscure_value", 0);
pref("autoadmin.refresh_interval", 120); pref("autoadmin.refresh_interval", 120);
pref("autoadmin.offline_failover", true); pref("autoadmin.offline_failover", true);
pref("autoadmin.failover_to_cached", true); pref("autoadmin.failover_to_cached", true);
@ -31,7 +31,7 @@ pref("cookiebanners.service.mode.privateBrowsing", 2);
pref("cookiebanners.bannerClicking.enabled", true); pref("cookiebanners.bannerClicking.enabled", true);
// https://globalprivacycontrol.org/ the successor of DNT // https://globalprivacycontrol.org/ the successor of DNT
pref("privacy.globalprivacycontrol.enabled", true); //pref("privacy.globalprivacycontrol.enabled", true);
pref("privacy.globalprivacycontrol.functionality.enabled", true); pref("privacy.globalprivacycontrol.functionality.enabled", true);
pref("privacy.donottrackheader.enabled", true); pref("privacy.donottrackheader.enabled", true);
pref("privacy.donottrackheader.value", 1); pref("privacy.donottrackheader.value", 1);
@ -62,7 +62,7 @@ pref("javascript.use_us_english_locale", true);
// the fingerprinting game. Then again as sending empty accept-language is // the fingerprinting game. Then again as sending empty accept-language is
// valid ("just give me any"), what if I request only Finnish considering the // valid ("just give me any"), what if I request only Finnish considering the
// RFC discourages sending rejection if no language matches. // RFC discourages sending rejection if no language matches.
defaultPref("intl.accept_languages", "fi, en"); //defaultPref("intl.accept_languages", "fi, en");
// Apparently even not sending accept-language is more common than Finnish, // Apparently even not sending accept-language is more common than Finnish,
// so let's do that. Any language is fine, at least I am not promoting English // so let's do that. Any language is fine, at least I am not promoting English
// to every web site I visit. // to every web site I visit.
@ -75,7 +75,7 @@ defaultPref("intl.accept_languages", "fi, en");
// Dark mode // Dark mode
//pref("ui.systemUsesDarkTheme", 1); //pref("ui.systemUsesDarkTheme", 1);
pref("prefers-color-scheme", "dark"); //pref("prefers-color-scheme", "dark");
//pref("pdfjs.viewerCssTheme", 2); //pref("pdfjs.viewerCssTheme", 2);
// Enable Firefox accounts // Enable Firefox accounts
@ -125,7 +125,7 @@ pref("reader.parse-on-load.force-enabled", true);
//pref("network.trr.excluded-domains", "http.badssl.com,norwegianwifi.com,mywifiext.net,tplinkrepeater.net,router.asus.com"); //pref("network.trr.excluded-domains", "http.badssl.com,norwegianwifi.com,mywifiext.net,tplinkrepeater.net,router.asus.com");
// Default UI scale // Default UI scale
defaultPref("layout.css.devPixelsPerPx", "1.5"); //defaultPref("layout.css.devPixelsPerPx", "1.5");
// Keep cache on both disk & memory. This is required for // Keep cache on both disk & memory. This is required for
// https://github.com/JimmXinu/FanFicFare/wiki/BrowserCacheFeature // https://github.com/JimmXinu/FanFicFare/wiki/BrowserCacheFeature
@ -143,8 +143,8 @@ pref("browser.cache.memory.enable", true);
/** [SECTION] CONTAINERS /** [SECTION] CONTAINERS
* enable containers and show the settings to control them in the stock ui * enable containers and show the settings to control them in the stock ui
*/ */
pref("privacy.userContext.enabled", true); //pref("privacy.userContext.enabled", true);
pref("privacy.userContext.ui.enabled", true); //pref("privacy.userContext.ui.enabled", true);
//pref("browser.contentblocking.category", "strict"); //pref("browser.contentblocking.category", "strict");
pref("privacy.partition.always_partition_third_party_non_cookie_storage", true); pref("privacy.partition.always_partition_third_party_non_cookie_storage", true);

View File

@ -37,7 +37,10 @@
"eff-dnt-whitelist", "eff-dnt-whitelist",
"ublock-quick-fixes", "ublock-quick-fixes",
"FIN-0", "FIN-0",
"https://big.oisd.nl" "https://big.oisd.nl",
"ublock-annoyances",
"adguard-mobile-app-banners",
"curben-phishing"
] ]
} }
}, },
@ -236,6 +239,30 @@
"Enabled": true "Enabled": true
}, },
"Preferences": { "Preferences": {
"autoadmin.failover_to_cached": {
"Comment": "Preference not allowed for stability reasons. :(",
"Status": "locked",
"Type": "boolean",
"Value": true
},
"autoadmin.global_config_url": {
"Comment": "Preference not allowed for stability reasons. :(",
"Status": "locked",
"Type": "string",
"Value": "https://gitea.blesmrt.net/mikaela/shell-things/raw/branch/master/conf/librewolf.overrides.cfg"
},
"autoadmin.offline_failover": {
"Comment": "Preference not allowed for stability reasons. :(",
"Status": "locked",
"Type": "boolean",
"Value": true
},
"autoadmin.refresh_interval": {
"Comment": "Preference not allowed for stability reasons. :(",
"Status": "locked",
"Type": "number",
"Value": 120
},
"browser.aboutConfig.showWarning": { "browser.aboutConfig.showWarning": {
"Status": "locked", "Status": "locked",
"Type": "boolean", "Type": "boolean",
@ -266,6 +293,24 @@
"Type": "boolean", "Type": "boolean",
"Value": false "Value": false
}, },
"cookiebanners.bannerClicking.enabled": {
"Comment": "Preference not allowed for stability reasons. :(",
"Status": "locked",
"Type": "boolean",
"Value": true
},
"cookiebanners.service.mode": {
"Comment": "Preference not allowed for stability reasons. :(",
"Status": "locked",
"Type": "number",
"Value": 2
},
"cookiebanners.service.mode.privateBrowsing": {
"Comment": "Preference not allowed for stability reasons. :(",
"Status": "locked",
"Type": "number",
"Value": 2
},
"dom.block_download_insecure": { "dom.block_download_insecure": {
"Status": "locked", "Status": "locked",
"Type": "boolean", "Type": "boolean",
@ -281,7 +326,17 @@
"Type": "string", "Type": "string",
"Value": "" "Value": ""
}, },
"general.config.obscure_value": {
"Status": "locked",
"Type": "number",
"Value": 0
},
"geo.provider.network.url": {
"Comment": "This might point to discontinued Mozilla Location Services, so better to restore it to default.",
"Status": "clear"
},
"image.animation.mode": { "image.animation.mode": {
"Comment": "Preference not allowed for stability reasons. :(",
"Status": "default", "Status": "default",
"Type": "string", "Type": "string",
"Value": "once" "Value": "once"
@ -291,11 +346,22 @@
"Type": "string", "Type": "string",
"Value": "fi, en" "Value": "fi, en"
}, },
"javascript.use_us_english_locale": {
"Comment": "Preference not allowed for stability reasons. :(",
"Status": "default",
"Type": "boolean",
"Value": true
},
"layout.css.devPixelsPerPx": { "layout.css.devPixelsPerPx": {
"Status": "default", "Status": "default",
"Type": "string", "Type": "string",
"Value": "1.5" "Value": "1.5"
}, },
"layout.css.prefers-color-scheme.content-override": {
"Status": "default",
"Type": "number",
"Value": 0
},
"media.autoplay.default": { "media.autoplay.default": {
"Status": "default", "Status": "default",
"Type": "number", "Type": "number",
@ -311,6 +377,11 @@
"Type": "boolean", "Type": "boolean",
"Value": true "Value": true
}, },
"network.dns.http3_echconfig.enabled": {
"Status": "locked",
"Type": "boolean",
"Value": true
},
"network.dns.native_https_query": { "network.dns.native_https_query": {
"Status": "locked", "Status": "locked",
"Type": "boolean", "Type": "boolean",
@ -322,9 +393,8 @@
"Value": true "Value": true
}, },
"network.dns.native_https_query_win10": { "network.dns.native_https_query_win10": {
"Status": "locked", "Comment": "This is here just as a reminder that it exists. I don't have a Windows 10 and it will likely switch to true when it exists.",
"Type": "boolean", "Status": "clear"
"Value": true
}, },
"network.dns.preferIPv6": { "network.dns.preferIPv6": {
"Status": "locked", "Status": "locked",
@ -402,25 +472,64 @@
"Value": "#ffb700" "Value": "#ffb700"
}, },
"privacy.donottrackheader.enabled": { "privacy.donottrackheader.enabled": {
"Comment": "Preference not allowed for stability reasons. :(",
"Status": "locked", "Status": "locked",
"Type": "boolean", "Type": "boolean",
"Value": true "Value": true
}, },
"privacy.donottrackheader.value": { "privacy.donottrackheader.value": {
"Comment": "Preference not allowed for stability reasons. :(",
"Status": "locked", "Status": "locked",
"Type": "number", "Type": "number",
"Value": 1 "Value": 1
}, },
"privacy.fingerprintingProtection": {
"Comment": "Preference not allowed for stability reasons. :(",
"Status": "locked",
"Type": "boolean",
"Value": true
},
"privacy.fingerprintingProtection.overrides": {
"Comment": "Preference not allowed for stability reasons. :(",
"Status": "locked",
"Type": "string",
"Value": "+AllTargets,-KeyboardEvents,-SpeechSynthesis,-CSSPrefersColorScheme,-CSSPrefersReducedMotion,-NavigatorPlatform,-NavigatorUserAgent,-JSDateTimeUTC,-HttpUserAgent,-FontVisibilityRestrictGenerics,-FontVisibilityBaseSystem,-FontVisibilityLangPack"
},
"privacy.fingerprintingProtection.pbmode": {
"Comment": "Preference not allowed for stability reasons. :(",
"Status": "locked",
"Type": "boolean",
"Value": true
},
"privacy.globalprivacycontrol.enabled": { "privacy.globalprivacycontrol.enabled": {
"Status": "locked", "Status": "locked",
"Type": "boolean", "Type": "boolean",
"Value": true "Value": true
}, },
"privacy.globalprivacycontrol.functionality.enabled": { "privacy.resistFingerprinting": {
"Comment": "Preference not allowed for stability reasons. :(",
"Status": "locked",
"Type": "boolean",
"Value": false
},
"privacy.resistFingerprinting.block_mozAddonManage": {
"Comment": "Preference not allowed for stability reasons. :(",
"Status": "locked", "Status": "locked",
"Type": "boolean", "Type": "boolean",
"Value": true "Value": true
}, },
"privacy.resistFingerprinting.letterboxing": {
"Comment": "Preference not allowed for stability reasons. :(",
"Status": "locked",
"Type": "boolean",
"Value": true
},
"privacy.resistFingerprinting.pbmode": {
"Comment": "Preference not allowed for stability reasons. :(",
"Status": "locked",
"Type": "boolean",
"Value": false
},
"privacy.userContext.enabled": { "privacy.userContext.enabled": {
"Status": "locked", "Status": "locked",
"Type": "boolean", "Type": "boolean",
@ -431,6 +540,12 @@
"Type": "boolean", "Type": "boolean",
"Value": true "Value": true
}, },
"reader.parse-on-load.force-enabled": {
"Comment": "Preference not allowed for stability reasons. :(",
"Status": "locked",
"Type": "boolean",
"Value": true
},
"security.OCSP.require": { "security.OCSP.require": {
"Status": "locked", "Status": "locked",
"Type": "boolean", "Type": "boolean",
@ -447,6 +562,7 @@
"Value": true "Value": true
}, },
"security.ssl.enable_ocsp_must_staple": { "security.ssl.enable_ocsp_must_staple": {
"Comment": "Preference not allowed for security reasons. :(",
"Status": "locked", "Status": "locked",
"Type": "boolean", "Type": "boolean",
"Value": true "Value": true
@ -456,6 +572,12 @@
"Type": "boolean", "Type": "boolean",
"Value": true "Value": true
}, },
"security.tls.ech.grease_http3": {
"Comment": "Seems to be required for http3. This defaults to true on Nightly 128 and false on 115.11.0esr. However again not allowed to be deployed here for security :()",
"Status": "locked",
"Type": "boolean",
"Value": true
},
"ui.systemUsesDarkTheme": { "ui.systemUsesDarkTheme": {
"Status": "default", "Status": "default",
"Type": "number", "Type": "number",

View File

@ -1 +1,2 @@
doh-cloudflare-secure.json doh-cloudflare-secure.json
doh-adguard-dns0.json

View File

@ -149,7 +149,9 @@ yes, it's the second time ,one is edge, one is chrome
- `nngceckbapebfimnlniiiahkandclblb` - `nngceckbapebfimnlniiiahkandclblb`
The password manager of my choice. The password manager of my choice. For the managed settings
[see here](https://bitwarden.com/help/deploy-clients/), although that only
applies to self-hosters.
### [Privacy Badger](https://chrome.google.com/webstore/detail/pkehgijcmpdhfbdbbnkijodmdjhbjlgp) ### [Privacy Badger](https://chrome.google.com/webstore/detail/pkehgijcmpdhfbdbbnkijodmdjhbjlgp)

View File

@ -42,7 +42,10 @@
"eff-dnt-whitelist", "eff-dnt-whitelist",
"ublock-quick-fixes", "ublock-quick-fixes",
"FIN-0", "FIN-0",
"https://big.oisd.nl" "https://big.oisd.nl",
"ublock-annoyances",
"adguard-mobile-app-banners",
"curben-phishing"
] ]
} }
}, },

View File

@ -0,0 +1 @@
doh-private-ecs.json

View File

@ -1,4 +1,4 @@
{ {
"DnsOverHttpsMode": "automatic", "DnsOverHttpsMode": "automatic",
"DnsOverHttpsTemplates": "https://dns.google/dns-query" "DnsOverHttpsTemplates": "https://dns.google/dns-query?dns"
} }

View File

@ -0,0 +1,4 @@
{
"DnsOverHttpsMode": "automatic",
"DnsOverHttpsTemplates": "https://dns64.dns.google/dns-query?dns"
}

View File

@ -0,0 +1,4 @@
{
"DnsOverHttpsMode": "automatic",
"DnsOverHttpsTemplates": "https://unfiltered.adguard-dns.com/dns-query https://open.dns0.eu/"
}

View File

@ -6,6 +6,5 @@
"DefaultSearchProviderNewTabURL": "https://start.duckduckgo.com/chrome_newtab?addon=newext", "DefaultSearchProviderNewTabURL": "https://start.duckduckgo.com/chrome_newtab?addon=newext",
"DefaultSearchProviderSearchURL": "https://start.duckduckgo.com/?q={searchTerms}&addon=newext", "DefaultSearchProviderSearchURL": "https://start.duckduckgo.com/?q={searchTerms}&addon=newext",
"DefaultSearchProviderSuggestURL": "https://start.duckduckgo.com/ac/?q={searchTerms}&type=list", "DefaultSearchProviderSuggestURL": "https://start.duckduckgo.com/ac/?q={searchTerms}&type=list",
"HomepageIsNewTabPage": true,
"NewTabPageLocation": "https://start.duckduckgo.com/chrome_newtab?addon=newext" "NewTabPageLocation": "https://start.duckduckgo.com/chrome_newtab?addon=newext"
} }

View File

@ -6,6 +6,5 @@
"DefaultSearchProviderNewTabURL": "https://www.ecosia.org/newtab/?addon=chromegpo", "DefaultSearchProviderNewTabURL": "https://www.ecosia.org/newtab/?addon=chromegpo",
"DefaultSearchProviderSearchURL": "https://www.ecosia.org/search?q={searchTerms}&addon=chromegpo", "DefaultSearchProviderSearchURL": "https://www.ecosia.org/search?q={searchTerms}&addon=chromegpo",
"DefaultSearchProviderSuggestURL": "https://ac.ecosia.org/autocomplete?q={searchTerms}", "DefaultSearchProviderSuggestURL": "https://ac.ecosia.org/autocomplete?q={searchTerms}",
"HomepageIsNewTabPage": true,
"NewTabPageLocation": "https://www.ecosia.org/newtab/?addon=chromegpo" "NewTabPageLocation": "https://www.ecosia.org/newtab/?addon=chromegpo"
} }

View File

@ -1,5 +1,6 @@
[Resolve] [Resolve]
DNS=94.140.14.14#dns.adguard.com 94.140.15.15#dns.adguard.com 2a10:50c0::ad1:ff#dns.adguard.com 2a10:50c0::ad2:ff#dns.adguard.com DNS=94.140.14.14#dns.adguard.com 94.140.15.15#dns.adguard.com 2a10:50c0::ad1:ff#dns.adguard.com 2a10:50c0::ad2:ff#dns.adguard.com
#DNS=94.140.14.140#unfiltered.adguard-dns.com 94.140.14.141#unfiltered.adguard-dns.com DNS=2a10:50c0::1:ff#unfiltered.adguard-dns.com 2a10:50c0::2:ff#unfiltered.adguard-dns.com
#DNSOverTLS=true #DNSOverTLS=true
# vim: filetype=systemd # vim: filetype=systemd

View File

@ -1,3 +1,4 @@
dot-nextdns.conf dot-nextdns.conf
dot-trex.conf dot-trex.conf
cache.conf cache.conf
dot-adguard-dns0.conf

View File

@ -12,6 +12,8 @@ server:
# This list is for my travel laptop to have at least one DoT443 server # This list is for my travel laptop to have at least one DoT443 server
# which seems to be applied-privacy.net. They advice having multiple DoT servers # which seems to be applied-privacy.net. They advice having multiple DoT servers
# for redundancy and as they don't filter, it's best I use other non-filtering ones. # for redundancy and as they don't filter, it's best I use other non-filtering ones.
# Since then this expanded to include <https://www.privacyguides.org/en/dns/>.
# just look at git blame...
forward-zone: forward-zone:
name: "." name: "."
@ -49,4 +51,16 @@ forward-zone:
forward-addr: 9.9.9.10@853#dns10.quad9.net forward-addr: 9.9.9.10@853#dns10.quad9.net
forward-addr: 9.9.9.10@8853#dns10.quad9.net forward-addr: 9.9.9.10@8853#dns10.quad9.net
# https://www.dns0.eu/open https://www.dns0.eu/network - French based. Private ECS
forward-addr: 193.110.81.254@853#open.dns0.eu
forward-addr: 185.253.5.254@853#open.dns0.eu
forward-addr: 2a0f:fc80::ffff@853#open.dns0.eu
forward-addr: 2a0f:fc81::ffff@853#open.dns0.eu
# Adguard DNS Unfiltered Anycast. Malta based. Private ECS.
forward-addr: 2a10:50c0::1:ff@853#unfiltered.adguard-dns.com
forward-addr: 2a10:50c0::2:ff@853#unfiltered.adguard-dns.com
forward-addr: 94.140.14.140@853#unfiltered.adguard-dns.com
forward-addr: 94.140.14.141@853#unfiltered.adguard-dns.com
# vim: filetype=unbound.conf # vim: filetype=unbound.conf

View File

@ -0,0 +1 @@
dot-private-ecs.conf

View File

@ -15,10 +15,16 @@ server:
forward-zone: forward-zone:
name: "." name: "."
forward-tls-upstream: yes forward-tls-upstream: yes
# AdGuard with AdBlocking
forward-addr: 2a10:50c0::ad1:ff@853#dns.adguard.com forward-addr: 2a10:50c0::ad1:ff@853#dns.adguard.com
forward-addr: 94.140.14.14@853#dns.adguard.com forward-addr: 94.140.14.14@853#dns.adguard.com
forward-addr: 2a10:50c0::ad2:ff@853#dns.adguard.com forward-addr: 2a10:50c0::ad2:ff@853#dns.adguard.com
forward-addr: 94.140.15.15@853#dns.adguard.com forward-addr: 94.140.15.15@853#dns.adguard.com
# AdGuard Public DNS without filtering
#forward-addr: 2a10:50c0::1:ff@853#unfiltered.adguard-dns.com
#forward-addr: 2a10:50c0::2:ff@853#unfiltered.adguard-dns.com
#forward-addr: 94.140.14.140@853#unfiltered.adguard-dns.com
#forward-addr: 94.140.14.141@853#unfiltered.adguard-dns.com
# Updated for https://adguard.com/en/blog/adguard-dns-new-addresses.html # Updated for https://adguard.com/en/blog/adguard-dns-new-addresses.html

View File

@ -0,0 +1,29 @@
server:
# Debian ca-certificates location
#tls-cert-bundle: /etc/ssl/certs/ca-certificates.crt
# Fedora
#tls-cert-bundle: /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem
# Use system certificates no matter where they are
tls-system-cert: yes
# Quad9 says pointless performance impact on forwarders.
# https://docs.quad9.net/Quad9_For_Organizations/DNS_Forwarder_Best_Practices/#disable-qname-minimization
qname-minimisation: no
# Private ECS is more accurate with IPv4 than IPv6.
prefer-ip4: yes
prefer-ip6: no
# AdGuard Public DNS without filtering.
forward-zone:
name: "."
forward-tls-upstream: yes
# AdGuard Public DNS without filtering
forward-addr: 2a10:50c0::1:ff@853#unfiltered.adguard-dns.com
forward-addr: 2a10:50c0::2:ff@853#unfiltered.adguard-dns.com
forward-addr: 94.140.14.140@853#unfiltered.adguard-dns.com
forward-addr: 94.140.14.141@853#unfiltered.adguard-dns.com
# DNS0.eu without filtering
forward-addr: 193.110.81.254@853#open.dns0.eu
forward-addr: 185.253.5.254@853#open.dns0.eu
forward-addr: 2a0f:fc80::ffff@853#open.dns0.eu
forward-addr: 2a0f:fc81::ffff@853#open.dns0.eu
# vim: filetype=unbound.conf