forked from Fediversity/Fediversity
Factorise networking configurations (#19)
This commit is contained in:
commit
9c7b370447
|
@ -60,6 +60,10 @@
|
||||||
enable = true;
|
enable = true;
|
||||||
inherit files;
|
inherit files;
|
||||||
};
|
};
|
||||||
|
trim-trailing-whitespace = {
|
||||||
|
enable = true;
|
||||||
|
inherit files;
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
devShells.default = pkgs.mkShell {
|
devShells.default = pkgs.mkShell {
|
||||||
|
|
1
infra/common/default.nix
Normal file
1
infra/common/default.nix
Normal file
|
@ -0,0 +1 @@
|
||||||
|
{ imports = [ ./networking.nix ]; }
|
70
infra/common/networking.nix
Normal file
70
infra/common/networking.nix
Normal file
|
@ -0,0 +1,70 @@
|
||||||
|
{ config, lib, ... }:
|
||||||
|
|
||||||
|
let
|
||||||
|
inherit (lib) mkOption;
|
||||||
|
|
||||||
|
in
|
||||||
|
{
|
||||||
|
options = {
|
||||||
|
procolix.vm = {
|
||||||
|
name = mkOption { };
|
||||||
|
ip4 = mkOption { };
|
||||||
|
ip6 = mkOption { };
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
config = {
|
||||||
|
services.openssh = {
|
||||||
|
enable = true;
|
||||||
|
settings.PasswordAuthentication = false;
|
||||||
|
};
|
||||||
|
|
||||||
|
networking = {
|
||||||
|
hostName = config.procolix.vm.name;
|
||||||
|
domain = "procolix.com";
|
||||||
|
|
||||||
|
interfaces = {
|
||||||
|
eth0 = {
|
||||||
|
ipv4 = {
|
||||||
|
addresses = [
|
||||||
|
{
|
||||||
|
address = config.procolix.vm.ip4;
|
||||||
|
prefixLength = 24;
|
||||||
|
}
|
||||||
|
];
|
||||||
|
};
|
||||||
|
ipv6 = {
|
||||||
|
addresses = [
|
||||||
|
{
|
||||||
|
address = config.procolix.vm.ip6;
|
||||||
|
prefixLength = 64;
|
||||||
|
}
|
||||||
|
];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
defaultGateway = {
|
||||||
|
address = "185.206.232.1";
|
||||||
|
interface = "eth0";
|
||||||
|
};
|
||||||
|
defaultGateway6 = {
|
||||||
|
address = "2a00:51c0:12:1201::1";
|
||||||
|
interface = "eth0";
|
||||||
|
};
|
||||||
|
|
||||||
|
nameservers = [
|
||||||
|
"95.215.185.6"
|
||||||
|
"95.215.185.7"
|
||||||
|
"2a00:51c0::5fd7:b906"
|
||||||
|
"2a00:51c0::5fd7:b907"
|
||||||
|
];
|
||||||
|
|
||||||
|
firewall.enable = false;
|
||||||
|
nftables = {
|
||||||
|
enable = true;
|
||||||
|
rulesetFile = ./nftables-ruleset.nft;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
70
infra/common/nftables-ruleset.nft
Normal file
70
infra/common/nftables-ruleset.nft
Normal file
|
@ -0,0 +1,70 @@
|
||||||
|
#!/usr/sbin/nft -f
|
||||||
|
|
||||||
|
flush ruleset
|
||||||
|
|
||||||
|
########### define usefull variables here #####################
|
||||||
|
|
||||||
|
define wan = eth0
|
||||||
|
define ssh_allow = {
|
||||||
|
83.161.147.127/32, # host801 ipv4
|
||||||
|
95.215.185.92/32, # host088 ipv4
|
||||||
|
95.215.185.211/32, # host089 ipv4
|
||||||
|
95.215.185.34/32, # nagios2 ipv4
|
||||||
|
95.215.185.235/32, # ansible-hq
|
||||||
|
}
|
||||||
|
define snmp_allow = {
|
||||||
|
95.215.185.31/32, # cacti ipv4
|
||||||
|
}
|
||||||
|
define nrpe_allow = {
|
||||||
|
95.215.185.34/32, # nagios2 ipv4
|
||||||
|
}
|
||||||
|
|
||||||
|
########### here starts the automated bit #####################
|
||||||
|
|
||||||
|
table inet filter {
|
||||||
|
chain input {
|
||||||
|
type filter hook input priority 0;
|
||||||
|
policy drop;
|
||||||
|
|
||||||
|
# established/related connections
|
||||||
|
ct state established,related accept
|
||||||
|
ct state invalid drop
|
||||||
|
|
||||||
|
# Limit ping requests.
|
||||||
|
ip protocol icmp icmp type echo-request limit rate over 10/second burst 50 packets drop
|
||||||
|
ip6 nexthdr icmpv6 icmpv6 type echo-request limit rate over 10/second burst 50 packets drop
|
||||||
|
|
||||||
|
# loopback interface
|
||||||
|
iifname lo accept
|
||||||
|
|
||||||
|
# icmp
|
||||||
|
ip protocol icmp icmp type { destination-unreachable, echo-reply, echo-request, source-quench, time-exceeded } accept
|
||||||
|
# Without the nd-* ones ipv6 will not work.
|
||||||
|
ip6 nexthdr icmpv6 icmpv6 type { destination-unreachable, echo-reply, echo-request, nd-neighbor-solicit, nd-router-advert, nd-neighbor-advert, packet-too-big, parameter-problem, time-exceeded } accept
|
||||||
|
|
||||||
|
# open tcp ports: sshd (22)
|
||||||
|
tcp dport {ssh} accept
|
||||||
|
|
||||||
|
# open tcp ports: snmp (161)
|
||||||
|
ip saddr $snmp_allow udp dport {snmp} accept
|
||||||
|
|
||||||
|
# open tcp ports: nrpe (5666)
|
||||||
|
ip saddr $nrpe_allow tcp dport {nrpe} accept
|
||||||
|
|
||||||
|
# open tcp ports: http (80,443)
|
||||||
|
tcp dport {http,https} accept
|
||||||
|
}
|
||||||
|
chain forward {
|
||||||
|
type filter hook forward priority 0;
|
||||||
|
}
|
||||||
|
chain output {
|
||||||
|
type filter hook output priority 0;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
table ip nat {
|
||||||
|
chain postrouting {
|
||||||
|
}
|
||||||
|
chain prerouting {
|
||||||
|
}
|
||||||
|
}
|
|
@ -1,170 +1,23 @@
|
||||||
# Edit this configuration file to define what should be installed on
|
|
||||||
# your system. Help is available in the configuration.nix(5) man page, on
|
|
||||||
# https://search.nixos.org/options and in the NixOS manual (`nixos-help`).
|
|
||||||
|
|
||||||
{ pkgs, ... }:
|
{ pkgs, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
imports = [
|
imports = [ ../common ];
|
||||||
# Include the results of the hardware scan.
|
|
||||||
./hardware-configuration.nix
|
procolix.vm = {
|
||||||
# This will install and configure Forgejo
|
name = "vm02116";
|
||||||
./forgejo.nix
|
ip4 = "185.206.232.34";
|
||||||
];
|
ip6 = "2a00:51c0:12:1201::20";
|
||||||
|
};
|
||||||
|
|
||||||
# Use the systemd-boot EFI boot loader.
|
# Use the systemd-boot EFI boot loader.
|
||||||
boot.loader.systemd-boot.enable = true;
|
boot.loader.systemd-boot.enable = true;
|
||||||
boot.loader.efi.canTouchEfiVariables = true;
|
boot.loader.efi.canTouchEfiVariables = true;
|
||||||
|
|
||||||
# networking.hostName = "nixos"; # Define your hostname.
|
|
||||||
# Pick only one of the below networking options.
|
|
||||||
# networking.wireless.enable = true; # Enables wireless support via wpa_supplicant.
|
|
||||||
# networking.networkmanager.enable = true; # Easiest to use and most distros use this by default.
|
|
||||||
|
|
||||||
# Networking
|
|
||||||
networking = {
|
|
||||||
hostName = "vm02116";
|
|
||||||
domain = "procolix.com";
|
|
||||||
interfaces = {
|
|
||||||
eth0 = {
|
|
||||||
ipv4 = {
|
|
||||||
addresses = [
|
|
||||||
{
|
|
||||||
address = "185.206.232.34";
|
|
||||||
prefixLength = 24;
|
|
||||||
}
|
|
||||||
];
|
|
||||||
};
|
|
||||||
ipv6 = {
|
|
||||||
addresses = [
|
|
||||||
{
|
|
||||||
address = "2a00:51c0:12:1201::20";
|
|
||||||
prefixLength = 64;
|
|
||||||
}
|
|
||||||
];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
defaultGateway = {
|
|
||||||
address = "185.206.232.1";
|
|
||||||
interface = "eth0";
|
|
||||||
};
|
|
||||||
defaultGateway6 = {
|
|
||||||
address = "2a00:51c0:12:1201::1";
|
|
||||||
interface = "eth0";
|
|
||||||
};
|
|
||||||
nameservers = [
|
|
||||||
"2a00:51c0::5fd7:b906"
|
|
||||||
"95.215.185.7"
|
|
||||||
];
|
|
||||||
firewall.enable = false;
|
|
||||||
nftables = {
|
|
||||||
enable = true;
|
|
||||||
ruleset = ''
|
|
||||||
#!/usr/sbin/nft -f
|
|
||||||
|
|
||||||
flush ruleset
|
|
||||||
|
|
||||||
########### define usefull variables here #####################
|
|
||||||
define wan = eth0
|
|
||||||
define ssh_allow = {
|
|
||||||
83.161.147.127/32, # host801 ipv4
|
|
||||||
95.215.185.92/32, # host088 ipv4
|
|
||||||
95.215.185.211/32, # host089 ipv4
|
|
||||||
95.215.185.34/32, # nagios2 ipv4
|
|
||||||
95.215.185.235, # ansible-hq
|
|
||||||
}
|
|
||||||
define snmp_allow = {
|
|
||||||
95.215.185.31/32, # cacti ipv4
|
|
||||||
}
|
|
||||||
define nrpe_allow = {
|
|
||||||
95.215.185.34/32, # nagios2 ipv4
|
|
||||||
}
|
|
||||||
|
|
||||||
########### here starts the automated bit #####################
|
|
||||||
table inet filter {
|
|
||||||
chain input {
|
|
||||||
type filter hook input priority 0;
|
|
||||||
policy drop;
|
|
||||||
|
|
||||||
# established/related connections
|
|
||||||
ct state established,related accept
|
|
||||||
ct state invalid drop
|
|
||||||
|
|
||||||
# Limit ping requests.
|
|
||||||
ip protocol icmp icmp type echo-request limit rate over 10/second burst 50 packets drop
|
|
||||||
ip6 nexthdr icmpv6 icmpv6 type echo-request limit rate over 10/second burst 50 packets drop
|
|
||||||
|
|
||||||
# loopback interface
|
|
||||||
iifname lo accept
|
|
||||||
|
|
||||||
# icmp
|
|
||||||
ip protocol icmp icmp type { destination-unreachable, echo-reply, echo-request, source-quench, time-exceeded } accept
|
|
||||||
# Without the nd-* ones ipv6 will not work.
|
|
||||||
ip6 nexthdr icmpv6 icmpv6 type { destination-unreachable, echo-reply, echo-request, nd-neighbor-solicit, nd-router-advert, nd-neighbor-advert, packet-too-big, parameter-problem, time-exceeded } accept
|
|
||||||
|
|
||||||
# open tcp ports: sshd (22)
|
|
||||||
#ip saddr $ssh_allow tcp dport {ssh} accept
|
|
||||||
tcp dport {ssh} accept
|
|
||||||
|
|
||||||
# open tcp ports: snmp (161)
|
|
||||||
ip saddr $snmp_allow udp dport {snmp} accept
|
|
||||||
|
|
||||||
# open tcp ports: nrpe (5666)
|
|
||||||
ip saddr $nrpe_allow tcp dport {nrpe} accept
|
|
||||||
|
|
||||||
# open tcp ports: http (80,443)
|
|
||||||
tcp dport {http,https} accept
|
|
||||||
}
|
|
||||||
chain forward {
|
|
||||||
type filter hook forward priority 0;
|
|
||||||
}
|
|
||||||
chain output {
|
|
||||||
type filter hook output priority 0;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
table ip nat {
|
|
||||||
chain postrouting {
|
|
||||||
}
|
|
||||||
chain prerouting {
|
|
||||||
}
|
|
||||||
}
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# Set your time zone.
|
# Set your time zone.
|
||||||
time.timeZone = "Europe/Amsterdam";
|
time.timeZone = "Europe/Amsterdam";
|
||||||
|
|
||||||
# Configure network proxy if necessary
|
|
||||||
# networking.proxy.default = "http://user:password@proxy:port/";
|
|
||||||
# networking.proxy.noProxy = "127.0.0.1,localhost,internal.domain";
|
|
||||||
|
|
||||||
# Select internationalisation properties.
|
# Select internationalisation properties.
|
||||||
i18n.defaultLocale = "en_US.UTF-8";
|
i18n.defaultLocale = "en_US.UTF-8";
|
||||||
# console = {
|
|
||||||
# font = "Lat2-Terminus16";
|
|
||||||
# keyMap = "us";
|
|
||||||
# useXkbConfig = true; # use xkb.options in tty.
|
|
||||||
# };
|
|
||||||
|
|
||||||
# Enable the X11 windowing system.
|
|
||||||
# services.xserver.enable = true;
|
|
||||||
|
|
||||||
# Configure keymap in X11
|
|
||||||
# services.xserver.xkb.layout = "us";
|
|
||||||
# services.xserver.xkb.options = "eurosign:e,caps:escape";
|
|
||||||
|
|
||||||
# Enable CUPS to print documents.
|
|
||||||
# services.printing.enable = true;
|
|
||||||
|
|
||||||
# Enable sound.
|
|
||||||
# sound.enable = true;
|
|
||||||
# hardware.pulseaudio.enable = true;
|
|
||||||
|
|
||||||
# Enable touchpad support (enabled default in most desktopManager).
|
|
||||||
# services.xserver.libinput.enable = true;
|
|
||||||
|
|
||||||
# Define a user account. Don't forget to set a password with ‘passwd’.
|
# Define a user account. Don't forget to set a password with ‘passwd’.
|
||||||
users.users = {
|
users.users = {
|
||||||
|
@ -204,29 +57,7 @@
|
||||||
subversion
|
subversion
|
||||||
];
|
];
|
||||||
|
|
||||||
# Some programs need SUID wrappers, can be configured further or are
|
services.xe-guest-utilities.enable = true;
|
||||||
# started in user sessions.
|
|
||||||
# programs.mtr.enable = true;
|
|
||||||
# programs.gnupg.agent = {
|
|
||||||
# enable = true;
|
|
||||||
# enableSSHSupport = true;
|
|
||||||
# };
|
|
||||||
|
|
||||||
# List services that you want to enable:
|
|
||||||
services = {
|
|
||||||
openssh = {
|
|
||||||
enable = true;
|
|
||||||
};
|
|
||||||
xe-guest-utilities = {
|
|
||||||
enable = true;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# Open ports in the firewall.
|
|
||||||
# networking.firewall.allowedTCPPorts = [ ... ];
|
|
||||||
# networking.firewall.allowedUDPPorts = [ ... ];
|
|
||||||
# Or disable the firewall altogether.
|
|
||||||
# networking.firewall.enable = false;
|
|
||||||
|
|
||||||
# This option defines the first version of NixOS you have installed on this particular machine,
|
# This option defines the first version of NixOS you have installed on this particular machine,
|
||||||
# and is used to maintain compatibility with application data (e.g. databases) created on older NixOS versions.
|
# and is used to maintain compatibility with application data (e.g. databases) created on older NixOS versions.
|
||||||
|
@ -245,5 +76,4 @@
|
||||||
#
|
#
|
||||||
# For more information, see `man configuration.nix` or https://nixos.org/manual/nixos/stable/options#opt-system.stateVersion .
|
# For more information, see `man configuration.nix` or https://nixos.org/manual/nixos/stable/options#opt-system.stateVersion .
|
||||||
system.stateVersion = "24.05";
|
system.stateVersion = "24.05";
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,126 +1,18 @@
|
||||||
# Edit this configuration file to define what should be installed on
|
|
||||||
# your system. Help is available in the configuration.nix(5) man page
|
|
||||||
# and in the NixOS manual (accessible by running ‘nixos-help’).
|
|
||||||
|
|
||||||
{ pkgs, ... }:
|
{ pkgs, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
|
imports = [ ../common ];
|
||||||
|
|
||||||
|
procolix.vm = {
|
||||||
|
name = "vm02179";
|
||||||
|
ip4 = "185.206.232.179";
|
||||||
|
ip6 = "2a00:51c0:12:1201::179";
|
||||||
|
};
|
||||||
|
|
||||||
# Use the systemd-boot EFI boot loader.
|
# Use the systemd-boot EFI boot loader.
|
||||||
boot.loader.systemd-boot.enable = true;
|
boot.loader.systemd-boot.enable = true;
|
||||||
boot.loader.efi.canTouchEfiVariables = true;
|
boot.loader.efi.canTouchEfiVariables = true;
|
||||||
|
|
||||||
networking = {
|
|
||||||
hostName = "vm02179";
|
|
||||||
domain = "procolix.com";
|
|
||||||
interfaces = {
|
|
||||||
eth0 = {
|
|
||||||
ipv4 = {
|
|
||||||
addresses = [
|
|
||||||
{
|
|
||||||
address = "185.206.232.179";
|
|
||||||
prefixLength = 24;
|
|
||||||
}
|
|
||||||
];
|
|
||||||
};
|
|
||||||
ipv6 = {
|
|
||||||
addresses = [
|
|
||||||
{
|
|
||||||
address = "2a00:51c0:12:1201::179";
|
|
||||||
prefixLength = 64;
|
|
||||||
}
|
|
||||||
];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
defaultGateway = {
|
|
||||||
address = "185.206.232.1";
|
|
||||||
interface = "eth0";
|
|
||||||
};
|
|
||||||
defaultGateway6 = {
|
|
||||||
address = "2a00:51c0:12:1201::1";
|
|
||||||
interface = "eth0";
|
|
||||||
};
|
|
||||||
nameservers = [
|
|
||||||
"95.215.185.6"
|
|
||||||
"95.215.185.7"
|
|
||||||
];
|
|
||||||
firewall.enable = false;
|
|
||||||
nftables = {
|
|
||||||
enable = true;
|
|
||||||
ruleset = ''
|
|
||||||
#!/usr/sbin/nft -f
|
|
||||||
|
|
||||||
flush ruleset
|
|
||||||
|
|
||||||
########### define usefull variables here #####################
|
|
||||||
define wan = eth0
|
|
||||||
define ssh_allow = {
|
|
||||||
83.161.147.127/32, # host801 ipv4
|
|
||||||
95.215.185.92/32, # host088 ipv4
|
|
||||||
95.215.185.211/32, # host089 ipv4
|
|
||||||
95.215.185.34/32, # nagios2 ipv4
|
|
||||||
95.215.185.181/32, # ansible.procolix.com
|
|
||||||
95.215.185.235, # ansible-hq
|
|
||||||
}
|
|
||||||
define snmp_allow = {
|
|
||||||
95.215.185.31/32, # cacti ipv4
|
|
||||||
}
|
|
||||||
define nrpe_allow = {
|
|
||||||
95.215.185.34/32, # nagios2 ipv4
|
|
||||||
}
|
|
||||||
|
|
||||||
########### here starts the automated bit #####################
|
|
||||||
table inet filter {
|
|
||||||
chain input {
|
|
||||||
type filter hook input priority 0;
|
|
||||||
policy drop;
|
|
||||||
|
|
||||||
# established/related connections
|
|
||||||
ct state established,related accept
|
|
||||||
ct state invalid drop
|
|
||||||
|
|
||||||
# Limit ping requests.
|
|
||||||
ip protocol icmp icmp type echo-request limit rate over 10/second burst 50 packets drop
|
|
||||||
ip6 nexthdr icmpv6 icmpv6 type echo-request limit rate over 10/second burst 50 packets drop
|
|
||||||
|
|
||||||
# loopback interface
|
|
||||||
iifname lo accept
|
|
||||||
|
|
||||||
# icmp
|
|
||||||
ip protocol icmp icmp type { destination-unreachable, echo-reply, echo-request, source-quench, time-exceeded } accept
|
|
||||||
# Without the nd-* ones ipv6 will not work.
|
|
||||||
ip6 nexthdr icmpv6 icmpv6 type { destination-unreachable, echo-reply, echo-request, nd-neighbor-solicit, nd-router-advert, nd-neighbor-advert, packet-too-big, parameter-problem, time-exceeded } accept
|
|
||||||
|
|
||||||
# open tcp ports: sshd (22)
|
|
||||||
tcp dport {ssh} accept
|
|
||||||
|
|
||||||
# open tcp ports: snmp (161)
|
|
||||||
ip saddr $snmp_allow udp dport {snmp} accept
|
|
||||||
|
|
||||||
# open tcp ports: nrpe (5666)
|
|
||||||
ip saddr $nrpe_allow tcp dport {nrpe} accept
|
|
||||||
|
|
||||||
# open tcp ports: http (80,443)
|
|
||||||
tcp dport {http,https} accept
|
|
||||||
}
|
|
||||||
chain forward {
|
|
||||||
type filter hook forward priority 0;
|
|
||||||
}
|
|
||||||
chain output {
|
|
||||||
type filter hook output priority 0;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
table ip nat {
|
|
||||||
chain postrouting {
|
|
||||||
}
|
|
||||||
chain prerouting {
|
|
||||||
}
|
|
||||||
}
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# Set your time zone.
|
# Set your time zone.
|
||||||
time.timeZone = "Europe/Amsterdam";
|
time.timeZone = "Europe/Amsterdam";
|
||||||
|
|
||||||
|
@ -182,11 +74,6 @@
|
||||||
wget
|
wget
|
||||||
];
|
];
|
||||||
|
|
||||||
# List services that you want to enable:
|
|
||||||
|
|
||||||
# Enable the OpenSSH daemon.
|
|
||||||
services.openssh.enable = true;
|
|
||||||
|
|
||||||
# This value determines the NixOS release from which the default
|
# This value determines the NixOS release from which the default
|
||||||
# settings for stateful data, like file locations and database versions
|
# settings for stateful data, like file locations and database versions
|
||||||
# on your system were taken. It‘s perfectly fine and recommended to leave
|
# on your system were taken. It‘s perfectly fine and recommended to leave
|
||||||
|
@ -194,5 +81,4 @@
|
||||||
# Before changing this value read the documentation for this option
|
# Before changing this value read the documentation for this option
|
||||||
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
|
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
|
||||||
system.stateVersion = "24.05"; # Did you read the comment?
|
system.stateVersion = "24.05"; # Did you read the comment?
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,122 +1,18 @@
|
||||||
{ pkgs, ... }:
|
{ pkgs, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
|
imports = [ ../common ];
|
||||||
|
|
||||||
|
procolix.vm = {
|
||||||
|
name = "vm02186";
|
||||||
|
ip4 = "185.206.232.186";
|
||||||
|
ip6 = "2a00:51c0:12:1201::186";
|
||||||
|
};
|
||||||
|
|
||||||
# Use the systemd-boot EFI boot loader.
|
# Use the systemd-boot EFI boot loader.
|
||||||
boot.loader.systemd-boot.enable = true;
|
boot.loader.systemd-boot.enable = true;
|
||||||
boot.loader.efi.canTouchEfiVariables = true;
|
boot.loader.efi.canTouchEfiVariables = true;
|
||||||
|
|
||||||
networking = {
|
|
||||||
hostName = "vm02186";
|
|
||||||
domain = "procolix.com";
|
|
||||||
interfaces = {
|
|
||||||
eth0 = {
|
|
||||||
ipv4 = {
|
|
||||||
addresses = [
|
|
||||||
{
|
|
||||||
address = "185.206.232.186";
|
|
||||||
prefixLength = 24;
|
|
||||||
}
|
|
||||||
];
|
|
||||||
};
|
|
||||||
ipv6 = {
|
|
||||||
addresses = [
|
|
||||||
{
|
|
||||||
address = "2a00:51c0:12:1201::186";
|
|
||||||
prefixLength = 64;
|
|
||||||
}
|
|
||||||
];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
defaultGateway = {
|
|
||||||
address = "185.206.232.1";
|
|
||||||
interface = "eth0";
|
|
||||||
};
|
|
||||||
defaultGateway6 = {
|
|
||||||
address = "2a00:51c0:12:1201::1";
|
|
||||||
interface = "eth0";
|
|
||||||
};
|
|
||||||
nameservers = [
|
|
||||||
"95.215.185.6"
|
|
||||||
"95.215.185.7"
|
|
||||||
];
|
|
||||||
firewall.enable = false;
|
|
||||||
nftables = {
|
|
||||||
enable = true;
|
|
||||||
ruleset = ''
|
|
||||||
#!/usr/sbin/nft -f
|
|
||||||
|
|
||||||
flush ruleset
|
|
||||||
|
|
||||||
########### define usefull variables here #####################
|
|
||||||
define wan = eth0
|
|
||||||
define ssh_allow = {
|
|
||||||
83.161.147.127/32, # host801 ipv4
|
|
||||||
95.215.185.92/32, # host088 ipv4
|
|
||||||
95.215.185.211/32, # host089 ipv4
|
|
||||||
95.215.185.34/32, # nagios2 ipv4
|
|
||||||
95.215.185.181/32, # ansible.procolix.com
|
|
||||||
95.215.185.235/32, # ansible-hq
|
|
||||||
}
|
|
||||||
define snmp_allow = {
|
|
||||||
95.215.185.31/32, # cacti ipv4
|
|
||||||
}
|
|
||||||
define nrpe_allow = {
|
|
||||||
95.215.185.34/32, # nagios2 ipv4
|
|
||||||
}
|
|
||||||
|
|
||||||
########### here starts the automated bit #####################
|
|
||||||
table inet filter {
|
|
||||||
chain input {
|
|
||||||
type filter hook input priority 0;
|
|
||||||
policy drop;
|
|
||||||
|
|
||||||
# established/related connections
|
|
||||||
ct state established,related accept
|
|
||||||
ct state invalid drop
|
|
||||||
|
|
||||||
# Limit ping requests.
|
|
||||||
ip protocol icmp icmp type echo-request limit rate over 10/second burst 50 packets drop
|
|
||||||
ip6 nexthdr icmpv6 icmpv6 type echo-request limit rate over 10/second burst 50 packets drop
|
|
||||||
|
|
||||||
# loopback interface
|
|
||||||
iifname lo accept
|
|
||||||
|
|
||||||
# icmp
|
|
||||||
ip protocol icmp icmp type { destination-unreachable, echo-reply, echo-request, source-quench, time-exceeded } accept
|
|
||||||
# Without the nd-* ones ipv6 will not work.
|
|
||||||
ip6 nexthdr icmpv6 icmpv6 type { destination-unreachable, echo-reply, echo-request, nd-neighbor-solicit, nd-router-advert, nd-neighbor-advert, packet-too-big, parameter-problem, time-exceeded } accept
|
|
||||||
|
|
||||||
# open tcp ports: sshd (22)
|
|
||||||
tcp dport {ssh} accept
|
|
||||||
|
|
||||||
# open tcp ports: snmp (161)
|
|
||||||
ip saddr $snmp_allow udp dport {snmp} accept
|
|
||||||
|
|
||||||
# open tcp ports: nrpe (5666)
|
|
||||||
ip saddr $nrpe_allow tcp dport {nrpe} accept
|
|
||||||
|
|
||||||
# open tcp ports: http (80,443)
|
|
||||||
tcp dport {http,https} accept
|
|
||||||
}
|
|
||||||
chain forward {
|
|
||||||
type filter hook forward priority 0;
|
|
||||||
}
|
|
||||||
chain output {
|
|
||||||
type filter hook output priority 0;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
table ip nat {
|
|
||||||
chain postrouting {
|
|
||||||
}
|
|
||||||
chain prerouting {
|
|
||||||
}
|
|
||||||
}
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# Set your time zone.
|
# Set your time zone.
|
||||||
time.timeZone = "Europe/Amsterdam";
|
time.timeZone = "Europe/Amsterdam";
|
||||||
|
|
||||||
|
@ -182,11 +78,6 @@
|
||||||
wget
|
wget
|
||||||
];
|
];
|
||||||
|
|
||||||
# List services that you want to enable:
|
|
||||||
|
|
||||||
# Enable the OpenSSH daemon.
|
|
||||||
services.openssh.enable = true;
|
|
||||||
|
|
||||||
# This value determines the NixOS release from which the default
|
# This value determines the NixOS release from which the default
|
||||||
# settings for stateful data, like file locations and database versions
|
# settings for stateful data, like file locations and database versions
|
||||||
# on your system were taken. It‘s perfectly fine and recommended to leave
|
# on your system were taken. It‘s perfectly fine and recommended to leave
|
||||||
|
|
|
@ -1,14 +1,13 @@
|
||||||
# Edit this configuration file to define what should be installed on
|
|
||||||
# your system. Help is available in the configuration.nix(5) man page
|
|
||||||
# and in the NixOS manual (accessible by running ‘nixos-help’).
|
|
||||||
|
|
||||||
{ pkgs, ... }:
|
{ pkgs, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
imports = [
|
imports = [ ../common ];
|
||||||
# Include the results of the hardware scan.
|
|
||||||
./hardware-configuration.nix
|
procolix.vm = {
|
||||||
];
|
name = "vm02187";
|
||||||
|
ip4 = "185.206.232.187";
|
||||||
|
ip6 = "2a00:51c0:12:1201::187";
|
||||||
|
};
|
||||||
|
|
||||||
# Use the systemd-boot EFI boot loader.
|
# Use the systemd-boot EFI boot loader.
|
||||||
boot.loader.systemd-boot.enable = true;
|
boot.loader.systemd-boot.enable = true;
|
||||||
|
@ -33,7 +32,7 @@
|
||||||
$wgUseImageMagick = true;
|
$wgUseImageMagick = true;
|
||||||
$wgMaxShellMemory = 524288;
|
$wgMaxShellMemory = 524288;
|
||||||
$wgSVGMetadataCutoff = 1024*1024;
|
$wgSVGMetadataCutoff = 1024*1024;
|
||||||
$wgAllowExternalImages = false;
|
$wgAllowExternalImages = false;
|
||||||
|
|
||||||
## Permissions
|
## Permissions
|
||||||
$wgGroupPermissions['*']['edit'] = false;
|
$wgGroupPermissions['*']['edit'] = false;
|
||||||
|
@ -76,119 +75,6 @@
|
||||||
|
|
||||||
users.users.nginx.extraGroups = [ "acme" ];
|
users.users.nginx.extraGroups = [ "acme" ];
|
||||||
|
|
||||||
networking = {
|
|
||||||
hostName = "vm02187";
|
|
||||||
domain = "procolix.com";
|
|
||||||
interfaces = {
|
|
||||||
eth0 = {
|
|
||||||
ipv4 = {
|
|
||||||
addresses = [
|
|
||||||
{
|
|
||||||
address = "185.206.232.187";
|
|
||||||
prefixLength = 24;
|
|
||||||
}
|
|
||||||
];
|
|
||||||
};
|
|
||||||
ipv6 = {
|
|
||||||
addresses = [
|
|
||||||
{
|
|
||||||
address = "2a00:51c0:12:1201::187";
|
|
||||||
prefixLength = 64;
|
|
||||||
}
|
|
||||||
];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
defaultGateway = {
|
|
||||||
address = "185.206.232.1";
|
|
||||||
interface = "eth0";
|
|
||||||
};
|
|
||||||
defaultGateway6 = {
|
|
||||||
address = "2a00:51c0:12:1201::1";
|
|
||||||
interface = "eth0";
|
|
||||||
};
|
|
||||||
nameservers = [
|
|
||||||
"95.215.185.6"
|
|
||||||
"95.215.185.7"
|
|
||||||
];
|
|
||||||
firewall.enable = false;
|
|
||||||
nftables = {
|
|
||||||
enable = true;
|
|
||||||
ruleset = ''
|
|
||||||
#!/usr/sbin/nft -f
|
|
||||||
|
|
||||||
flush ruleset
|
|
||||||
|
|
||||||
########### define usefull variables here #####################
|
|
||||||
define wan = eth0
|
|
||||||
define ssh_allow = {
|
|
||||||
83.161.147.127/32, # host801 ipv4
|
|
||||||
95.215.185.92/32, # host088 ipv4
|
|
||||||
95.215.185.211/32, # host089 ipv4
|
|
||||||
95.215.185.34/32, # nagios2 ipv4
|
|
||||||
95.215.185.181/32, # ansible.procolix.com
|
|
||||||
95.215.185.235, # ansible-hq
|
|
||||||
}
|
|
||||||
define snmp_allow = {
|
|
||||||
95.215.185.31/32, # cacti ipv4
|
|
||||||
}
|
|
||||||
define nrpe_allow = {
|
|
||||||
95.215.185.34/32, # nagios2 ipv4
|
|
||||||
}
|
|
||||||
|
|
||||||
########### here starts the automated bit #####################
|
|
||||||
table inet filter {
|
|
||||||
chain input {
|
|
||||||
type filter hook input priority 0;
|
|
||||||
policy drop;
|
|
||||||
|
|
||||||
# established/related connections
|
|
||||||
ct state established,related accept
|
|
||||||
ct state invalid drop
|
|
||||||
|
|
||||||
# Limit ping requests.
|
|
||||||
ip protocol icmp icmp type echo-request limit rate over 10/second burst 50 packets drop
|
|
||||||
ip6 nexthdr icmpv6 icmpv6 type echo-request limit rate over 10/second burst 50 packets drop
|
|
||||||
|
|
||||||
# loopback interface
|
|
||||||
iifname lo accept
|
|
||||||
|
|
||||||
# icmp
|
|
||||||
ip protocol icmp icmp type { destination-unreachable, echo-reply, echo-request, source-quench, time-exceeded } accept
|
|
||||||
# Without the nd-* ones ipv6 will not work.
|
|
||||||
ip6 nexthdr icmpv6 icmpv6 type { destination-unreachable, echo-reply, echo-request, nd-neighbor-solicit, nd-router-advert, nd-neighbor-advert, packet-too-big, parameter-problem, time-exceeded } accept
|
|
||||||
|
|
||||||
# open tcp ports: sshd (22)
|
|
||||||
# ip saddr $ssh_allow tcp dport {ssh} accept
|
|
||||||
tcp dport {ssh} accept
|
|
||||||
|
|
||||||
# open tcp ports: snmp (161)
|
|
||||||
ip saddr $snmp_allow udp dport {snmp} accept
|
|
||||||
|
|
||||||
# open tcp ports: nrpe (5666)
|
|
||||||
ip saddr $nrpe_allow tcp dport {nrpe} accept
|
|
||||||
|
|
||||||
# open tcp ports: http (80,443)
|
|
||||||
tcp dport {http,https} accept
|
|
||||||
}
|
|
||||||
chain forward {
|
|
||||||
type filter hook forward priority 0;
|
|
||||||
}
|
|
||||||
chain output {
|
|
||||||
type filter hook output priority 0;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
table ip nat {
|
|
||||||
chain postrouting {
|
|
||||||
}
|
|
||||||
chain prerouting {
|
|
||||||
}
|
|
||||||
}
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# Set your time zone.
|
# Set your time zone.
|
||||||
time.timeZone = "Europe/Amsterdam";
|
time.timeZone = "Europe/Amsterdam";
|
||||||
|
|
||||||
|
@ -244,11 +130,6 @@
|
||||||
wget
|
wget
|
||||||
];
|
];
|
||||||
|
|
||||||
# List services that you want to enable:
|
|
||||||
|
|
||||||
# Enable the OpenSSH daemon.
|
|
||||||
services.openssh.enable = true;
|
|
||||||
services.openssh.settings.PasswordAuthentication = false;
|
|
||||||
security.sudo.wheelNeedsPassword = false;
|
security.sudo.wheelNeedsPassword = false;
|
||||||
|
|
||||||
# This value determines the NixOS release from which the default
|
# This value determines the NixOS release from which the default
|
||||||
|
|
Loading…
Reference in a new issue