4 ../../nixos/profiles/dnscrypt-proxy2.nix
5 ../../nixos/profiles/networking/ssh.nix
6 ../../nixos/profiles/networking/wifi.nix
7 #../../nixos/profiles/openvpn/calyx.nix
8 networking/nftables.nix
10 install.substituteOnDestination = false;
11 #networking.domain = "sourcephile.fr";
12 networking.useDHCP = false;
14 environment.systemPackages = [
15 #pkgs.tor-ctrl # Not packaged yet
20 HashedControlPassword = lib.readFile tor/HashedControlPassword.clear;
21 # https://metrics.torproject.org/rs.html#search/flag:exit%20country:be%20running:true
22 # https://nusenu.github.io/OrNetStats/w/relay/58B81035FC28AACA8F0E85E46C8EBAD7FCFA8404.html
24 "*.gcp.cloud.es.io *.gcp.cloud.es.io.58B81035FC28AACA8F0E85E46C8EBAD7FCFA8404.exit"
25 "*.redbee.live *.redbee.live.58B81035FC28AACA8F0E85E46C8EBAD7FCFA8404.exit"
26 "*.rtbf.be *.rtbf.be.58B81035FC28AACA8F0E85E46C8EBAD7FCFA8404.exit"
32 networking.nftables.ruleset = lib.mkAfter ''
38 ip daddr 10.0.0.0/8 counter goto output-lan
39 ip daddr 172.16.0.0/12 counter goto output-lan
40 ip daddr 192.168.0.0/16 counter goto output-lan
41 ip daddr 224.0.0.0/3 counter goto output-lan
43 log level warn prefix "output-net: " counter drop
49 #"80.67.180.129" = ["salons.sourcephile.fr"];
52 networking.interfaces = { };
54 networking.networkmanager = {
59 environment.etc."NetworkManager/system-connections/Prixtel.nmconnection" = {
64 uuid=b223f550-dff1-4ba3-9755-cd4557faaa5a
67 permissions=user:julm:;
80 addr-gen-mode=stable-privacy
87 environment.systemPackages = [
88 pkgs.modem-manager-gui
89 #pkgs.tor-ctrl # Not packaged yet
92 systemd.services.sshd.serviceConfig.LoadCredentialEncrypted = [
93 "host.key:${ssh/host.key.cred}"