{ pkgs, lib, ... }: { imports = [ ../../nixos/profiles/dnscrypt-proxy.nix ../../nixos/profiles/networking/ssh.nix ../../nixos/profiles/networking/wifi.nix ../../nixos/profiles/kubo.nix #../../nixos/profiles/openvpn/calyx.nix networking/nftables.nix openvpn/riseup.nix ]; install.substituteOnDestination = true; #networking.domain = "sourcephile.fr"; networking.useDHCP = false; networking.nftables.ruleset = lib.mkAfter '' table inet filter { chain input { ip daddr 10.0.0.0/8 counter goto input-lan ip daddr 172.16.0.0/12 counter goto input-lan ip daddr 192.168.0.0/16 counter goto input-lan ip daddr 224.0.0.0/3 counter goto input-lan goto input-net } chain output { ip daddr 10.0.0.0/8 counter goto output-lan ip daddr 172.16.0.0/12 counter goto output-lan ip daddr 192.168.0.0/16 counter goto output-lan ip daddr 224.0.0.0/3 counter goto output-lan jump output-net log level warn prefix "output-net: " counter drop } } ''; networking.hosts = { #"80.67.180.129" = ["salons.sourcephile.fr"]; }; networking.interfaces = { }; networking.networkmanager = { enable = true; unmanaged = [ ]; }; systemd.services.sshd.serviceConfig.LoadCredentialEncrypted = [ "host.key:${ssh/host.key.cred}" ]; programs.wireshark = { enable = true; package = pkgs.wireshark-qt; }; }