blob: 5deeb9923fc47a8310af683be00b628d4a20f40c (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
|
{ config, pkgs, ... }:
{
imports = [
./hw.nix
<stockholm/krebs>
<stockholm/krebs/2configs>
<stockholm/krebs/2configs/matterbridge.nix>
<stockholm/krebs/2configs/nameserver.nix>
];
#networking.defaultGateway6 = {
# address = "fe80::1";
# interface = "ens3";
#};
#networking.interfaces.ens3.ipv6.addresses = [
# {
# # old: address = "2a03:4000:13:4c::1";
# address = "2a03:4000:1a:cf::1"; #/64"
# prefixLength = 64;
# }
#];
networking.firewall.allowedTCPPorts = [ 80 443 ];
networking.firewall.logRefusedConnections = false;
networking.firewall.logRefusedUnicastsOnly = false;
# Move Internet-facing SSH port to reduce logspam.
networking.firewall.extraCommands = let
host = config.krebs.build.host;
in /* sh */ ''
iptables -t nat -A OUTPUT -o lo -p tcp --dport 11423 -j REDIRECT --to-ports 22
iptables -t nat -A PREROUTING -p tcp --dport 11423 -j REDIRECT --to-ports 22
iptables -t nat -A PREROUTING -d ${host.nets.retiolum.ip4.addr} -p tcp --dport 22 -j ACCEPT
iptables -t nat -A PREROUTING -p tcp --dport 22 -j REDIRECT --to-ports 0
ip6tables -t nat -A OUTPUT -o lo -p tcp --dport 11423 -j REDIRECT --to-ports 22
ip6tables -t nat -A PREROUTING -p tcp --dport 11423 -j REDIRECT --to-ports 22
ip6tables -t nat -A PREROUTING -d ${host.nets.retiolum.ip6.addr} -p tcp --dport 22 -j ACCEPT
ip6tables -t nat -A PREROUTING -p tcp --dport 22 -j REDIRECT --to-ports 0
'';
krebs.build.host = config.krebs.hosts.ponte;
krebs.pages.enable = true;
krebs.pages.nginx.addSSL = true;
krebs.pages.nginx.useACMEHost = "krebsco.de";
security.acme.acceptTerms = true;
security.acme.certs."krebsco.de" = {
domain = "krebsco.de";
extraDomainNames = [
"*.krebsco.de"
];
email = "spam@krebsco.de";
reloadServices = [
"knsupdate-krebsco.de.service"
"nginx.service"
];
keyType = "ec384";
dnsProvider = "rfc2136";
credentialsFile = "/var/src/secrets/acme-credentials";
};
users.users.nginx.extraGroups = [ "acme" ];
}
|