Compare commits
No commits in common. "5df6e93ae35383745221c32a2cd585e3bf52dc53" and "2347ba609d7b988f641f0bdbc86d9e2b2a4102c8" have entirely different histories.
5df6e93ae3
...
2347ba609d
2 changed files with 29 additions and 47 deletions
|
@ -3,33 +3,34 @@
|
||||||
{
|
{
|
||||||
networking.nat.enable = true;
|
networking.nat.enable = true;
|
||||||
networking.nat.enableIPv6 = true;
|
networking.nat.enableIPv6 = true;
|
||||||
networking.nat.internalInterfaces = [ "ve-pennykettle" ];
|
networking.nat.internalInterfaces = [ "ve-pennykettle1" ];
|
||||||
networking.nat.externalInterface = "ens3";
|
networking.nat.externalInterface = "ens3";
|
||||||
networking.nat.forwardPorts = [
|
networking.firewall.allowedUDPPorts = [ 51821 ];
|
||||||
{
|
|
||||||
sourcePort = 51820;
|
# RA = Router Advertisement (how a host finds a gateway IPv6 address for
|
||||||
destination = "10.231.136.2:51820";
|
# SLAAC or DHCPv6).
|
||||||
proto = "udp";
|
# networkd usually defaults this to true, but instead defaults it to false
|
||||||
}
|
# for ALL networks if ANY network has IPv6Forwarding enabled, on the
|
||||||
{
|
# (reasonable) assumption that a host doing IP forwarding is probably a
|
||||||
sourcePort = 51820;
|
# network bridge.
|
||||||
destination = "[fc00::2]:51820";
|
# The kernel's RA implementation does this too, and the NixOS networking.nat
|
||||||
proto = "udp";
|
# module explicitly overrides that with sysctl, but networkd doesn't pay
|
||||||
}
|
# attention to that.
|
||||||
];
|
# We thus explicitly enable it, as otherwise external IPv6 is broken.
|
||||||
networking.firewall.allowedUDPPorts = [ 51820 ];
|
systemd.network.networks."40-ens3".networkConfig.IPv6AcceptRA = true;
|
||||||
|
|
||||||
containers."pennykettle" = {
|
containers."pennykettle1" = {
|
||||||
privateNetwork = true;
|
privateNetwork = true;
|
||||||
extraVeths."ve-pennykettle" = {
|
extraVeths."ve-pennykettle1" = {
|
||||||
hostAddress = "10.231.136.1";
|
hostAddress = "10.231.136.1";
|
||||||
localAddress = "10.231.136.2";
|
localAddress = "10.231.136.2";
|
||||||
hostAddress6 = "fc00::1";
|
hostAddress6 = "fc00::1";
|
||||||
localAddress6 = "fc00::2";
|
localAddress6 = "fc00::2";
|
||||||
|
forwardPorts = [{ hostPort = 51821; }];
|
||||||
};
|
};
|
||||||
ephemeral = true;
|
ephemeral = true;
|
||||||
autoStart = true;
|
autoStart = true;
|
||||||
bindMounts."/run/secrets/wg-key".hostPath = config.age.secrets.protonvpn-pennykettle.path;
|
bindMounts."/run/secrets/wg-key".hostPath = config.age.secrets.protonvpn-pennykettle1.path;
|
||||||
|
|
||||||
config = { config, pkgs, ... }: {
|
config = { config, pkgs, ... }: {
|
||||||
system.stateVersion = "24.05";
|
system.stateVersion = "24.05";
|
||||||
|
@ -38,23 +39,24 @@
|
||||||
|
|
||||||
networking.useDHCP = false;
|
networking.useDHCP = false;
|
||||||
networking.useHostResolvConf = false;
|
networking.useHostResolvConf = false;
|
||||||
networking.firewall.allowedUDPPorts = [ 51820 ];
|
networking.firewall.allowedUDPPorts = [ 51821 ];
|
||||||
systemd.network = {
|
systemd.network = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|
||||||
networks."10-ve-pennykettle" = {
|
networks."10-ve" = {
|
||||||
matchConfig.Name = "ve-pennykettle";
|
matchConfig.Name = "ve-pennykettle1";
|
||||||
networkConfig.Address = [ "10.231.136.2/24" "fc00::2/64" ];
|
networkConfig.Address = [ "10.231.136.2/24" "fc00::2/64" ];
|
||||||
linkConfig.RequiredForOnline = "yes";
|
# linkConfig.RequiredForOnline = "routable";
|
||||||
routes = [{
|
routes = [{
|
||||||
Gateway = [ "10.231.136.1" "fc00::1" ];
|
Gateway = [ "10.231.136.1" "fc00::1" ];
|
||||||
Destination = "217.138.216.162";
|
Destination = "217.138.216.162";
|
||||||
}];
|
}];
|
||||||
};
|
};
|
||||||
|
|
||||||
networks."30-wg-protonvpn" = {
|
networks."30-protonvpn" = {
|
||||||
matchConfig.Name = "wg-protonvpn";
|
matchConfig.Name = "wg-protonvpn";
|
||||||
networkConfig = {
|
networkConfig = {
|
||||||
|
DefaultRouteOnDevice = true;
|
||||||
Address = [ "10.2.0.2/32" ];
|
Address = [ "10.2.0.2/32" ];
|
||||||
DNS = "10.2.0.1";
|
DNS = "10.2.0.1";
|
||||||
};
|
};
|
||||||
|
@ -62,54 +64,33 @@
|
||||||
RequiredForOnline = "yes";
|
RequiredForOnline = "yes";
|
||||||
ActivationPolicy = "always-up";
|
ActivationPolicy = "always-up";
|
||||||
};
|
};
|
||||||
routes = [
|
|
||||||
{ Gateway = [ "0.0.0.0" ]; }
|
|
||||||
{ Gateway = [ "::" ]; } # TODO: ipv6 out is still not working for unclear reasons
|
|
||||||
];
|
|
||||||
};
|
};
|
||||||
|
|
||||||
netdevs."30-wg-protonvpn" = {
|
netdevs."30-protonvpn" = {
|
||||||
netdevConfig = {
|
netdevConfig = {
|
||||||
Name = "wg-protonvpn";
|
Name = "wg-protonvpn";
|
||||||
Kind = "wireguard";
|
Kind = "wireguard";
|
||||||
Description = "WireGuard tunnel to ProtonVPN (DE#1; NAT: strict, no port forwarding)";
|
Description = "WireGuard tunnel to ProtonVPN (DE#1; NAT: strict, no port forwarding)";
|
||||||
};
|
};
|
||||||
wireguardConfig = {
|
wireguardConfig = {
|
||||||
ListenPort = 51820;
|
ListenPort = 51821;
|
||||||
PrivateKeyFile = "/run/secrets/wg-key";
|
PrivateKeyFile = "/run/secrets/wg-key";
|
||||||
};
|
};
|
||||||
wireguardPeers = [{
|
wireguardPeers = [{
|
||||||
PublicKey = "C+u+eQw5yWI2APCfVJwW6Ovj3g4IrTOfe+tMZnNz43s=";
|
PublicKey = "C+u+eQw5yWI2APCfVJwW6Ovj3g4IrTOfe+tMZnNz43s=";
|
||||||
AllowedIPs = [ "0.0.0.0/0" "::/0" ];
|
AllowedIPs = "0.0.0.0/0";
|
||||||
Endpoint = "217.138.216.162:51820";
|
Endpoint = "217.138.216.162:51820";
|
||||||
PersistentKeepalive = 5;
|
PersistentKeepalive = 5;
|
||||||
}];
|
}];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
networking.nat.enable = true;
|
|
||||||
networking.nat.enableIPv6 = true;
|
|
||||||
networking.nat.internalInterfaces = [ "ve-pennykettle" ];
|
|
||||||
networking.nat.externalInterface = "wg-protonvpn";
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
age.secrets.protonvpn-pennykettle = {
|
age.secrets.protonvpn-pennykettle1 = {
|
||||||
file = ../../../secrets/protonvpn-pennykettle1.age;
|
file = ../../../secrets/protonvpn-pennykettle1.age;
|
||||||
owner = "root";
|
owner = "root";
|
||||||
group = "systemd-network";
|
group = "systemd-network";
|
||||||
mode = "640";
|
mode = "640";
|
||||||
};
|
};
|
||||||
|
|
||||||
# TODO: password-protect the proxy instead of relying on only listening over Tailscale
|
|
||||||
services.microsocks = {
|
|
||||||
enable = true;
|
|
||||||
port = 1080;
|
|
||||||
ip = "::";
|
|
||||||
outgoingBindIp = "fc00::2";
|
|
||||||
# authUsername = "testusername123";
|
|
||||||
# authPasswordFile = pkgs.writeText "testpassword" "testpassworddonotuse";
|
|
||||||
# execWrapper = "${lib.getExe pkgs.strace}";
|
|
||||||
};
|
|
||||||
networking.firewall.interfaces."tailscale0".allowedTCPPorts = [ 1080 ];
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
{ config, lib, pkgs, ... }:
|
{ config, lib, pkgs, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
|
networking.useNetworkd = true;
|
||||||
networking.interfaces.ens3.useDHCP = true;
|
networking.interfaces.ens3.useDHCP = true;
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue