diff --git a/hosts/carbon/configuration.nix b/hosts/carbon/configuration.nix index 31b132d..fd13f2e 100644 --- a/hosts/carbon/configuration.nix +++ b/hosts/carbon/configuration.nix @@ -53,27 +53,27 @@ networking.wireguard.enable = true; networking.wireguard.interfaces = { - wg-gatekeeper = { + wg-gatekeeper4 = { ips = [ "fe80::127:2/64" "169.254.127.2/24" ]; peers = [ { allowedIPs = [ "0.0.0.0/0" "::/0" ]; - endpoint = "gatekeeper.net.clerie.de:50127"; + endpoint = "78.47.183.82:50127"; publicKey = "y+Bk5eIHgmnq9xuBDD+fk/OIkKRZU6AE4ISx4RdDDyg="; persistentKeepalive = 25; } ]; allowedIPsAsRoutes = false; - privateKeyFile = "/var/src/secrets/wireguard/wg-gatekeeper"; + privateKeyFile = "/var/src/secrets/wireguard/wg-gatekeeper4"; }; - wg-porter = { + wg-porter4 = { ips = [ "fe80::138:2/64" "169.254.138.2/24" ]; peers = [ { allowedIPs = [ "0.0.0.0/0" "::/0" ]; - endpoint = "porter.net.clerie.de:50138"; + endpoint = "188.34.158.206:50138"; publicKey = "aP6optNE7nVk6coo+USkSDtB62rAc/isfofRML9V2HM="; persistentKeepalive = 25; } ]; allowedIPsAsRoutes = false; - privateKeyFile = "/var/src/secrets/wireguard/wg-porter"; + privateKeyFile = "/var/src/secrets/wireguard/wg-porter4"; }; }; @@ -218,11 +218,11 @@ export all; }; area 0 { - interface "wg-gatekeeper" { + interface "wg-gatekeeper4" { cost 80; type pointopoint; }; - interface "wg-porter" { + interface "wg-porter4" { cost 80; type pointopoint; }; @@ -236,11 +236,11 @@ export all; }; area 0 { - interface "wg-gatekeeper" { + interface "wg-gatekeeper4" { cost 80; type pointopoint; }; - interface "wg-porter" { + interface "wg-porter4" { cost 80; type pointopoint; };