10 domain = "sourcephile.fr";
11 port = toString config.services.nebula.networks.${domain}.listen.port;
12 iface = config.services.nebula.networks.${domain}.tun.device;
13 IPv4Prefix = "10.0.0";
16 environment.systemPackages = with pkgs; [ nebula ];
17 systemd.services."nebula@${domain}" = {
18 reloadIfChanged = false;
19 stopIfChanged = false;
20 after = [ "chronyd.service" ];
21 serviceConfig.LoadCredentialEncrypted = [
23 builtins.path { path = inputs.self + "/hosts/${hostName}/nebula/${domain}/${hostName}.key.cred"; }
27 install.target = lib.mkDefault "\"\${NIXOS_TARGET:-root@${config.networking.hostName}.sp}\"";
29 "${IPv4Prefix}.1" = [ "mermet.sp" ];
30 "${IPv4Prefix}.2" = [ "losurdo.sp" ];
31 "${IPv4Prefix}.3" = [ "oignon.sp" ];
32 "${IPv4Prefix}.4" = [ "patate.sp" ];
33 "${IPv4Prefix}.5" = [ "carotte.sp" ];
34 "${IPv4Prefix}.6" = [ "aubergine.sp" ];
35 "${IPv4Prefix}.7" = [ "courge.sp" ];
36 "${IPv4Prefix}.8" = [ "blackberry.sp" ];
37 "${IPv4Prefix}.9" = [ "pumpkin.sp" ];
39 services.nebula.networks.${domain} = {
41 ca = lib.mkDefault (builtins.path { path = inputs.self + "/domains/${domain}/nebula/ca.crt"; });
42 cert = lib.mkDefault (
43 builtins.path { path = inputs.self + "/hosts/${hostName}/nebula/${domain}/${hostName}.crt"; }
45 key = "/run/credentials/nebula@${domain}.service/${hostName}.key";
46 listen.host = lib.mkDefault "0.0.0.0";
47 tun.device = lib.mkDefault "neb-sourcephile";
49 "${IPv4Prefix}.1" = [ "mermet.${domain}:10001" ];
50 "${IPv4Prefix}.2" = [ "losurdo.${domain}:10002" ];
86 default_timeout = "10m";
90 level = lib.mkDefault "info";
92 pki.disconnect_invalid = true;
96 #cipher = "chachapoly";
100 listen = "127.0.0.1:8080";
102 namespace = "prometheusns";
103 subsystem = "nebula";
105 message_metrics = false;
106 lighthouse_metrics = false;
111 networking.nftables.ruleset =
115 udp dport ${port} counter accept comment "Nebula ${domain}"
118 udp sport ${port} counter accept comment "Nebula ${domain}"
121 udp dport ${port} counter accept comment "Nebula ${domain}"
124 udp sport ${port} counter accept comment "Nebula ${domain}"
126 chain input-${iface} {
127 tcp dport ssh counter accept comment "SSH"
128 udp dport 60000-60100 counter accept comment "Mosh"
130 chain output-${iface} {
131 tcp dport ssh counter accept comment "SSH"
132 tcp dport {http,https} counter accept comment "HTTP"
133 udp dport 60000-60100 counter accept comment "Mosh"
136 iifname ${iface} jump input-${iface} comment "MUST be before the address-based jumps to input-lan"
137 iifname ${iface} log level warn prefix "input-${iface}: " counter drop
140 oifname ${iface} jump output-${iface}
141 oifname ${iface} log level warn prefix "output-${iface}: " counter drop
145 + lib.optionalString config.services.printing.enable ''
147 chain output-${iface} {
148 tcp dport { ipp, ipps } counter accept comment "printing: IPP"
152 + lib.optionalString config.hardware.sane.enable ''
154 chain output-${iface} {
155 tcp dport sane-port counter accept comment "sane-net: SANE"
159 networking.networkmanager.unmanaged = [ iface ];
160 services.fail2ban.ignoreIP = [
161 "${IPv4Prefix}.1" # mermet.sp
162 "${IPv4Prefix}.2" # losurdo.sp
163 "${IPv4Prefix}.3" # oignon.sp
164 "${IPv4Prefix}.9" # pumpkin.sp