feat: add neodymium peer
This commit is contained in:
parent
4b3af2be48
commit
5f3695a5a3
|
@ -15,9 +15,11 @@
|
||||||
443 # https
|
443 # https
|
||||||
];
|
];
|
||||||
allowedUDPPorts = [
|
allowedUDPPorts = [
|
||||||
53 # DNS (blocky)
|
|
||||||
5553 # wireguard
|
5553 # wireguard
|
||||||
];
|
];
|
||||||
|
interfaces."wg0".allowedUDPPorts = [
|
||||||
|
53 # dns
|
||||||
|
];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -26,22 +28,30 @@
|
||||||
maxretry = 5;
|
maxretry = 5;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
networking.nat.enable = true;
|
||||||
|
networking.nat.internalInterfaces = [ "wg0" ];
|
||||||
networking.wireguard.interfaces = {
|
networking.wireguard.interfaces = {
|
||||||
wg0 = {
|
wg0 = {
|
||||||
ips = [ "10.0.0.1/24" ];
|
ips = [ "10.0.0.1/24" ];
|
||||||
listenPort = 5553;
|
listenPort = 5553;
|
||||||
privateKeyFile = "/root/wg-private";
|
privateKeyFile = "/root/wg-private";
|
||||||
peers = [{ # pixel
|
peers = [
|
||||||
|
{ # pixel
|
||||||
publicKey = "HS2q+PpPPwxqT1jCD7D4puqr4ZyaXV5TostavlYWBx0=";
|
publicKey = "HS2q+PpPPwxqT1jCD7D4puqr4ZyaXV5TostavlYWBx0=";
|
||||||
allowedIPs = [ "10.0.0.2/32" ];
|
allowedIPs = [ "10.0.0.2/32" ];
|
||||||
}];
|
}
|
||||||
|
{ # neodymium
|
||||||
|
publicKey = "IFeRvelEilNRLkhWgFKL9HrJ9XYsm+r4yvv23CigETk=";
|
||||||
|
allowedIPs = [ "10.0.0.3/32" ];
|
||||||
|
}
|
||||||
|
];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
services.blocky = {
|
services.blocky = {
|
||||||
enable = true;
|
enable = true;
|
||||||
settings = {
|
settings = {
|
||||||
upstream.default = [ "1.1.1.2" "1.0.0.2" ];
|
upstream.default = [ "208.67.222.222" "208.67.220.220" ];
|
||||||
blocking = {
|
blocking = {
|
||||||
refreshPeriod = "24h";
|
refreshPeriod = "24h";
|
||||||
clientGroupsBlock.default =
|
clientGroupsBlock.default =
|
||||||
|
|
|
@ -33,6 +33,20 @@ in {
|
||||||
networking.firewall.allowedTCPPorts = [ ];
|
networking.firewall.allowedTCPPorts = [ ];
|
||||||
networking.firewall.allowedUDPPorts = [ ];
|
networking.firewall.allowedUDPPorts = [ ];
|
||||||
|
|
||||||
|
networking.wg-quick.interfaces = {
|
||||||
|
wg0 = {
|
||||||
|
address = [ "10.0.0.3/32" ];
|
||||||
|
dns = [ "10.0.0.1" ];
|
||||||
|
privateKeyFile = "/root/wireguard-keys/private";
|
||||||
|
|
||||||
|
peers = [{
|
||||||
|
publicKey = "y36/EpLUerwM6NSGsVDCkb37Wj/Z3CI0mPFGatVa0Ws=";
|
||||||
|
allowedIPs = [ "10.0.0.1/24" ];
|
||||||
|
endpoint = "fainsin.bzh:5553";
|
||||||
|
}];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
# use systemd-boot EFI boot loader
|
# use systemd-boot EFI boot loader
|
||||||
boot.loader.systemd-boot.enable = true;
|
boot.loader.systemd-boot.enable = true;
|
||||||
boot.loader.efi.canTouchEfiVariables = true;
|
boot.loader.efi.canTouchEfiVariables = true;
|
||||||
|
|
Loading…
Reference in a new issue