4     ../../nixos/profiles/dnscrypt-proxy2.nix
 
   5     ../../nixos/profiles/networking/ssh.nix
 
   6     ../../nixos/profiles/networking/wifi.nix
 
   7     #../../nixos/profiles/openvpn/calyx.nix
 
   8     networking/nftables.nix
 
  10   install.substituteOnDestination = false;
 
  11   #networking.domain = "sourcephile.fr";
 
  12   networking.useDHCP = false;
 
  16       HashedControlPassword = lib.readFile tor/HashedControlPassword.clear;
 
  17       # https://metrics.torproject.org/rs.html#search/flag:exit%20country:be%20running:true
 
  18       # https://nusenu.github.io/OrNetStats/w/relay/58B81035FC28AACA8F0E85E46C8EBAD7FCFA8404.html
 
  20         "*.gcp.cloud.es.io *.gcp.cloud.es.io.58B81035FC28AACA8F0E85E46C8EBAD7FCFA8404.exit"
 
  21         "*.redbee.live         *.redbee.live.58B81035FC28AACA8F0E85E46C8EBAD7FCFA8404.exit"
 
  22         "*.rtbf.be                 *.rtbf.be.58B81035FC28AACA8F0E85E46C8EBAD7FCFA8404.exit"
 
  28   networking.nftables.ruleset = lib.mkAfter ''
 
  34         ip daddr 10.0.0.0/8 counter goto output-lan
 
  35         ip daddr 172.16.0.0/12 counter goto output-lan
 
  36         ip daddr 192.168.0.0/16 counter goto output-lan
 
  37         ip daddr 224.0.0.0/3 counter goto output-lan
 
  39         log level warn prefix "output-net: " counter drop
 
  45     #"80.67.180.129" = ["salons.sourcephile.fr"];
 
  48   networking.interfaces = { };
 
  50   networking.networkmanager = {
 
  55   environment.etc."NetworkManager/system-connections/Prixtel.nmconnection" = {
 
  60       uuid=b223f550-dff1-4ba3-9755-cd4557faaa5a
 
  63       permissions=user:julm:;
 
  76       addr-gen-mode=stable-privacy
 
  83   environment.systemPackages = [
 
  84     pkgs.modem-manager-gui
 
  85     #pkgs.tor-ctrl # Not packaged yet
 
  88   systemd.services.sshd.serviceConfig.LoadCredentialEncrypted = [
 
  89     "host.key:${ssh/host.key.cred}"