1 { pkgs, lib, config, machines, ... }:
3 inherit (builtins) hasAttr readFile;
4 inherit (pkgs.lib) unlinesAttrs;
5 inherit (config.users) users groups;
8 networking.firewall.enable = false;
9 security.lockKernelModules = false;
10 systemd.services.disable-kernel-module-loading.after = [ "nftables.service" ];
11 # echo -e "$(nix eval machines.losurdo.config.networking.nftables.ruleset)"
13 networking.nftables = {
15 ruleset = lib.mkBefore ''
18 # Some .nix append rules here with: add rule inet filter net2fw ...
21 tcp dport {80,443} counter accept comment "HTTP"
22 udp dport 123 skuid ${users.systemd-timesync.name} counter accept comment "NTP"
23 tcp dport 9418 counter accept comment "Git"
25 # Some .nix append rules here with: add rule inet filter fw2net ...
29 # Some .nix append rules here with: add rule inet filter lan2fw ...
33 # Some .nix append rules here with: add rule inet filter fw2lan ...
37 type filter hook input priority 0
42 # accept traffic already established
43 ct state {established, related} accept
47 tcp dport 22 counter accept comment "SSH"
48 udp dport 60000-61000 counter accept comment "Mosh"
51 #ip6 nexthdr icmpv6 icmpv6 type { destination-unreachable, packet-too-big, time-exceeded, parameter-problem, nd-router-advert, nd-neighbor-solicit, nd-neighbor-advert, mld-listener-query, nd-router-solicit } accept
52 ip protocol icmp icmp type { destination-unreachable, router-advertisement, time-exceeded, parameter-problem } accept
55 #ip6 nexthdr icmpv6 icmpv6 type echo-request accept
56 ip protocol icmp icmp type echo-request accept
58 # Some .nix append gotos here with: add rule inet filter input iffname ... goto ...
61 type filter hook output priority 0
66 ct state {related,established} accept
69 icmp type echo-request counter accept comment "Ping"
70 tcp dport 22 counter accept comment "SSH"
72 # Some .nix append gotos here with: add rule inet filter output oifname ... goto ...
75 type filter hook forward priority 0