shell-things/etc/systemd/resolved.conf.d
Aminda Suomalainen 4a20f75d3c
etc/systemd/resolved.conf.d: add DNS0 DoT configs
Their website already had the correct syntax for the entries

Ref: #153
2023-02-20 11:49:31 +02:00
..
00-defaults.conf etc…resolved…: add/clarify links in/to comments 2022-03-28 20:34:37 +03:00
README.md systemd-resolved README: add quickstart, remove extra h-levels 2022-03-28 20:43:03 +03:00
dot-adguard.conf etc/ststemd/resolved…: aggressive cleanup/rewriting 2022-03-28 20:28:17 +03:00
dot-cloudflare.conf etc/ststemd/resolved…: aggressive cleanup/rewriting 2022-03-28 20:28:17 +03:00
dot-dns0-kids.conf etc/systemd/resolved.conf.d: add DNS0 DoT configs 2023-02-20 11:49:31 +02:00
dot-dns0-zero.conf etc/systemd/resolved.conf.d: add DNS0 DoT configs 2023-02-20 11:49:31 +02:00
dot-dns0.conf etc/systemd/resolved.conf.d: add DNS0 DoT configs 2023-02-20 11:49:31 +02:00
dot-mullvad-adblock.conf etc/ststemd/resolved…: aggressive cleanup/rewriting 2022-03-28 20:28:17 +03:00
dot-mullvad.conf etc/ststemd/resolved…: aggressive cleanup/rewriting 2022-03-28 20:28:17 +03:00
dot-nextdns.conf etc/ststemd/resolved…: aggressive cleanup/rewriting 2022-03-28 20:28:17 +03:00
dot-quad9-ecs.conf etc/ststemd/resolved…: aggressive cleanup/rewriting 2022-03-28 20:28:17 +03:00
dot-quad9.conf etc/ststemd/resolved…: aggressive cleanup/rewriting 2022-03-28 20:28:17 +03:00
dot-snopyta.conf etc/ststemd/resolved…: aggressive cleanup/rewriting 2022-03-28 20:28:17 +03:00
unbound.conf etc…resolved…: add/clarify links in/to comments 2022-03-28 20:34:37 +03:00

README.md

systemd-resolved additional config files

Quickstart

sudo systemctl enable --now systemd-resolved.service
sudo ln -rsf /run/systemd/resolve/stub-resolv.conf /etc/resolv.conf
# After changing configuration
sudo systemctl restart systemd-resolved

Files explained

  • 00-defaults.conf - configuration not touching resolvers. Disables DNSSEC (as systemd-resolved doesnt handle it properly), enables opportunistic DoT and caching.
  • dot-*.conf - configuration to use the DNS provider with DNS-over-TLS. If captive portals are a concern, DNSOverTLS=no.
  • README.md - you are reading it right now.

General commentary

  • Based on my test DNSOverTLS is not supported in Ubuntu 18.04.x LTS (however at the time of writing this README.md, the current version is Ubuntu 20.04.0) (systemd v237). DNSOverTLS became supported in v239, strict mode (yes) in v243 (big improvements in v244).
    • TODO: find out when SNI became supported, I have just spotted it in the fine manual in 2020-06-??.
  • Domains has to be .~ for them to override DHCP. See https://www.internetsociety.org/blog/2018/12/dns-privacy-in-linux-systemd without which I wouldnt have got this right.
  • DNSSEC may not work if the system is down for a long time and not updated. Thus allow-downgrade may be better for non-tech people, even with the potential downgrade attack. There are also captive portals, affecting DNSOverTLS. Both take yes or no or their own special option, for DNNSEC the allow-downgrade, for DNSOverTLS opportunistic.

Other links I have found important and my files are based on: