xin/hosts/router/default.nix

364 lines
9.0 KiB
Nix
Raw Normal View History

{ config, pkgs, lib, ... }:
2022-10-04 21:17:52 -06:00
let
pubKeys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIO7v+/xS8832iMqJHCWsxUZ8zYoMWoZhjj++e26g1fLT europa"
];
userBase = { openssh.authorizedKeys.keys = pubKeys; };
wan = "enp5s0f0";
trunk = "enp5s0f1";
interfaces = {
"${wan}" = { useDHCP = true; };
"${trunk}" = rec {
ipv4.addresses = [{
address = "10.99.99.1";
prefixLength = 24;
}];
info = {
route = false;
network =
"10.99.99.0/${toString (builtins.head ipv4.addresses).prefixLength}";
};
};
enp1s0f0 = rec {
ipv4.addresses = [{
address = "10.99.1.1";
prefixLength = 24;
}];
info = {
route = true;
network =
"10.99.1.0/${toString (builtins.head ipv4.addresses).prefixLength}";
};
};
enp2s0f1 = rec {
ipv4.addresses = [{
address = "10.98.1.1";
prefixLength = 24;
}];
info = {
route = false;
network =
"10.98.1.0/${toString (builtins.head ipv4.addresses).prefixLength}";
};
};
badwifi = rec {
ipv4.addresses = [{
address = "10.10.0.1";
prefixLength = 24;
}];
info = {
route = true;
network =
"10.10.0.0/${toString (builtins.head ipv4.addresses).prefixLength}";
};
};
goodwifi = rec {
ipv4.addresses = [{
address = "10.12.0.1";
prefixLength = 24;
}];
info = {
route = false;
network =
"10.12.0.0/${toString (builtins.head ipv4.addresses).prefixLength}";
};
};
lab = rec {
ipv4.addresses = [{
address = "10.3.0.1";
prefixLength = 24;
}];
info = {
route = true;
network =
"10.3.0.0/${toString (builtins.head ipv4.addresses).prefixLength}";
};
};
external = rec {
ipv4.addresses = [{
address = "10.20.30.1";
prefixLength = 24;
}];
info = {
route = true;
network =
"10.20.30.0/${toString (builtins.head ipv4.addresses).prefixLength}";
};
};
common = rec {
ipv4.addresses = [{
address = "10.6.0.1";
prefixLength = 24;
}];
info = {
route = true;
vlanID = 5;
network =
"10.6.0.0/${toString (builtins.head ipv4.addresses).prefixLength}";
staticIPs = [
{
name = "tal";
mac = "3c:7c:3f:1d:95:9c";
address = "10.6.0.110";
}
{
name = "namish";
mac = "b8:ae:ed:78:b5:37";
address = "10.6.0.78";
}
{
name = "g5";
mac = "00:0a:95:a8:26:42";
address = "10.6.0.111";
}
{
name = "box";
mac = "d0:50:99:c2:b5:4b";
address = "10.6.0.15";
}
{
name = "greenhouse";
mac = "6c:0b:84:1b:20:07";
address = "10.6.0.20";
}
{
name = "inside";
mac = "6c:0b:84:cb:a7:59";
address = "10.6.0.21";
}
{
name = "weather";
mac = "b8:27:eb:3e:5b:4e";
address = "10.6.0.22";
}
];
};
};
voip = rec {
ipv4.addresses = [{
address = "10.7.0.1";
prefixLength = 24;
}];
info = {
route = true;
network =
"10.7.0.0/${toString (builtins.head ipv4.addresses).prefixLength}";
};
};
};
2022-10-04 21:17:52 -06:00
in {
_module.args.isUnstable = false;
imports = [ ./hardware-configuration.nix ];
2022-10-14 16:55:25 -06:00
boot.kernel.sysctl = {
"net.ipv4.conf.all.forwarding" = true;
"net.ipv6.conf.all.forwarding" = true;
};
2022-10-20 08:25:29 -06:00
autoUpdate.enable = false;
2022-10-14 16:55:25 -06:00
sops.secrets = {
wireguard_private_key = {
sopsFile = config.xin-secrets.router.networking;
};
};
networking = {
hostName = "router";
useDHCP = false;
firewall.enable = false;
2022-10-14 16:55:25 -06:00
# TODO: iterate over interfaces where .<name>.vlanID is set
2022-10-14 16:55:25 -06:00
vlans = {
badwifi = {
id = 10;
interface = "${trunk}";
2022-10-14 16:55:25 -06:00
};
goodwifi = {
id = 11;
interface = "${trunk}";
2022-10-14 16:55:25 -06:00
};
lab = {
id = 2;
interface = "${trunk}";
2022-10-14 16:55:25 -06:00
};
common = {
id = 5;
interface = "${trunk}";
2022-10-14 16:55:25 -06:00
};
voip = {
id = 6;
interface = "${trunk}";
2022-10-14 16:55:25 -06:00
};
external = {
id = 20;
interface = "${trunk}";
2022-10-14 16:55:25 -06:00
};
};
interfaces =
lib.attrsets.filterAttrsRecursive (n: v: n != "info") interfaces;
2022-10-14 16:55:25 -06:00
nftables = {
enable = true;
ruleset = ''
define DEV_PRIVATE = enp1s0f0
define DEV_HAM = enp2s0f1
2022-10-14 16:55:25 -06:00
table ip global {
2022-10-14 16:55:25 -06:00
chain inbound_world {
#icmp type echo-request limit rate 5/second accept
tcp dport ssh limit rate 1/minute accept
}
chain inbound_private {
icmp type echo-request limit rate 5/second accept
ip protocol . th dport vmap {
tcp . 22 : accept,
udp . 53 : accept,
tcp . 53 : accept,
udp . 67 : accept
}
}
chain inbound {
type filter hook input priority 0; policy drop;
ct state vmap { established : accept, related : accept, invalid : drop }
iifname vmap {
lo : accept,
${wan} : jump inbound_world,
$DEV_PRIVATE : jump inbound_private,
$DEV_HAM : jump inbound_private,
common : jump inbound_private,
badwifi : jump inbound_private,
external : jump inbound_private,
voip : jump inbound_private
}
}
chain forward {
type filter hook forward priority 0; policy drop;
ct state vmap { established : accept, related : accept, invalid : drop }
oifname $DEV_HAM iifname != $DEV_HAM drop
iifname $DEV_PRIVATE accept
iifname $DEV_HAM accept
iifname common accept
iifname badwifi accept
iifname external accept
iifname voip accept
}
chain postrouting {
type nat hook postrouting priority 100; policy accept;
oifname ${wan} masquerade
}
}
'';
};
2022-10-14 16:55:25 -06:00
};
services.atftpd = {
enable = true;
extraOptions = [
"--bind-address ${
(builtins.head config.networking.interfaces.lab.ipv4.addresses).address
}"
];
};
services.dhcpd4 = {
enable = true;
extraConfig = ''
option subnet-mask 255.255.255.0;
option domain-name-servers 45.90.28.147, 45.90.30.147;
2022-10-14 16:55:25 -06:00
subnet 10.99.1.0 netmask 255.255.255.0 {
option routers 10.99.1.1;
2022-10-14 16:55:25 -06:00
range 10.99.1.100 10.99.1.199;
}
subnet 10.98.1.0 netmask 255.255.255.0 {
option routers 10.98.1.1;
range 10.98.1.100 10.98.1.199;
}
2022-10-20 08:25:29 -06:00
subnet 10.6.0.0 netmask 255.255.255.0 {
option routers 10.6.0.1;
range 10.6.0.100 10.6.0.199;
${
builtins.concatStringsSep "\n" (map (e:
''
host ${e.name} {
hardware ethernet ${e.mac};
fixed-address ${e.address};
}
'') interfaces.common.info.staticIPs)
}
2022-10-20 08:25:29 -06:00
}
subnet 10.10.0.0 netmask 255.255.255.0 {
option routers 10.10.0.1;
range 10.10.0.10 10.10.0.199;
}
subnet 10.99.99.0 netmask 255.255.255.0 {
option routers 10.99.99.1;
range 10.99.99.10 10.99.99.199;
host doublemint {
hardware ethernet 74:83:c2:19:9e:51;
fixed-address 10.99.99.54;
}
host switch0 {
hardware ethernet 18:e8:29:b5:48:15;
fixed-address 10.99.99.4;
}
host switch1 {
hardware ethernet fc:ec:da:4e:2e:51;
fixed-address 10.99.99.5;
}
host switch2 {
hardware ethernet fc:ec:da:d4:10:81;
fixed-address 10.99.99.6;
}
host ap2 {
hardware ethernet 74:83:c2:89:0b:52;
fixed-address 10.99.99.7;
}
host ap1 {
hardware ethernet 80:2a:a8:96:50:76;
fixed-address 10.99.99.8;
}
}
2022-10-14 16:55:25 -06:00
'';
interfaces = [ "enp1s0f0" "enp2s0f1" "common" "badwifi" "${trunk}" ];
2022-10-14 16:55:25 -06:00
};
2022-10-04 21:17:52 -06:00
environment.systemPackages = with pkgs; [ bmon tcpdump ];
2022-10-20 08:25:29 -06:00
2022-10-04 21:17:52 -06:00
users.users.root = userBase;
users.users.qbit = userBase;
2022-10-13 21:38:18 -06:00
system = {
autoUpgrade = {
allowReboot = true;
rebootWindow = {
upper = "03:00";
lower = "01:00";
};
};
stateVersion = "22.05";
};
2022-10-04 21:17:52 -06:00
}