panacea/modules/networking.nix

115 lines
2.8 KiB
Nix
Raw Normal View History

{ config, lib, pkgs, ... }:
2022-09-10 09:11:26 +02:00
let wireguard_port = "51902";
in {
# Set hostname, hostid and enable WiFi
networking = {
hostName = "panacea";
2020-05-08 21:53:52 +02:00
hostId = "8feb0bb8";
wireless.iwd.enable = true;
};
2022-03-28 18:08:23 +02:00
# Enable systemd-networkd
networking = {
useDHCP = false;
interfaces = {
enp0s31f6.useDHCP = true;
wlan0.useDHCP = true;
};
useNetworkd = true;
dhcpcd.enable = false;
};
systemd.services."systemd-networkd-wait-online".enable = false;
2022-08-16 13:12:34 +02:00
# Disable DNSSEC
services.resolved.dnssec = "false";
2022-04-29 18:12:46 +02:00
# Prioritize ethernet over WiFi
systemd.network.networks."40-enp0s31f6".dhcpV4Config.RouteMetric = 10;
systemd.network.networks."40-wlan0".dhcpV4Config.RouteMetric = 20;
2022-03-28 18:08:23 +02:00
# Static IP for home network
systemd.network.networks."24-home" = {
name = "wlan0";
matchConfig = {
Name = "wlan0";
SSID = "WiFi-5.0-CE42";
};
2022-07-12 20:49:08 +02:00
address = [ "192.168.13.131/24" ];
gateway = [ "192.168.13.1" ];
dns = [ "192.168.13.2" ];
2022-03-28 18:08:23 +02:00
networkConfig.DNSSEC = "no";
};
# Enable zeroconf
services.avahi = {
enable = true;
nssmdns = true;
};
2022-08-03 13:52:02 +02:00
# VPN setup
systemd.network.netdevs."wg0" = {
netdevConfig = {
Kind = "wireguard";
Name = "wg0";
};
2022-09-10 09:11:26 +02:00
wireguardConfig = {
ListenPort = wireguard_port;
PrivateKeyFile = config.age.secrets.wireguard.path;
FirewallMark = 34952;
};
2022-08-03 13:52:02 +02:00
wireguardPeers = [{
wireguardPeerConfig = {
PublicKey = "GN8lqPBZYOulh6xD4GhkoEWI65HMMCpSxJSH5871YnU=";
AllowedIPs = [ "0.0.0.0/0" ];
2022-09-08 10:53:41 +02:00
Endpoint = "coolneng.duckdns.org:1194";
2022-08-03 13:52:02 +02:00
};
}];
};
systemd.network.networks."wg0" = {
matchConfig.Name = "wg0";
2022-09-10 09:11:26 +02:00
linkConfig.ActivationPolicy = "manual";
2022-08-03 13:52:02 +02:00
networkConfig = {
Address = "10.8.0.2/32";
DNS = "10.8.0.1";
2022-09-10 09:11:26 +02:00
DNSDefaultRoute = true;
Domains = "~.";
2022-08-03 13:52:02 +02:00
};
2022-09-10 09:11:26 +02:00
routingPolicyRules = [{
routingPolicyRuleConfig = {
FirewallMark = 34952;
InvertRule = true;
Table = 1000;
Priority = 10;
};
}];
routes = [{
routeConfig = {
Gateway = "10.8.0.1";
GatewayOnLink = true;
Table = 1000;
};
}];
2022-08-03 13:52:02 +02:00
};
2022-09-04 18:35:36 +02:00
# Firewall configuration
networking.firewall = {
allowedTCPPorts = [
9090 # Calibre Wireless
];
allowedUDPPorts = [
54982 # Calibre Wireless
];
2022-09-10 09:11:26 +02:00
# Allow wireguard traffic
extraCommands = ''
ip46tables -t raw -I nixos-fw-rpfilter -p udp -m udp --sport ${wireguard_port} -j RETURN
ip46tables -t raw -I nixos-fw-rpfilter -p udp -m udp --dport ${wireguard_port} -j RETURN
'';
extraStopCommands = ''
ip46tables -t raw -D nixos-fw-rpfilter -p udp -m udp --sport ${wireguard_port} -j RETURN || true
ip46tables -t raw -D nixos-fw-rpfilter -p udp -m udp --dport ${wireguard_port} -j RETURN || true
'';
2022-09-04 18:35:36 +02:00
};
}