1
0

Compare commits

...

3 Commits

Author SHA1 Message Date
Flake Update Bot
045c9abfb6 Update nixpkgs 2025-12-16-02-03 2025-12-16 03:04:07 +01:00
93107849d1 hosts/carbon: Remove network bridges 2025-12-15 22:30:56 +01:00
398fcc74b7 hosts/carbon: Disable mdns support 2025-12-15 22:01:06 +01:00
6 changed files with 23 additions and 54 deletions

6
flake.lock generated
View File

@@ -650,11 +650,11 @@
},
"nixpkgs_5": {
"locked": {
"lastModified": 1764667669,
"narHash": "sha256-7WUCZfmqLAssbDqwg9cUDAXrSoXN79eEEq17qhTNM/Y=",
"lastModified": 1765779637,
"narHash": "sha256-KJ2wa/BLSrTqDjbfyNx70ov/HdgNBCBBSQP3BIzKnv4=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "418468ac9527e799809c900eda37cbff999199b6",
"rev": "1306659b587dc277866c7b69eb97e5f07864d8c4",
"type": "github"
},
"original": {

View File

@@ -7,7 +7,6 @@
./dns.nix
./ds-lite-ncfttb.nix
./mdns.nix
./net-dsl.nix
./net-heimnetz.nix
./net-iot.nix

View File

@@ -1,17 +0,0 @@
{ pkgs, ... }:
{
services.avahi = {
enable = true;
nssmdns4 = true;
allowInterfaces = [
"net-heimnetz"
"net-iot"
];
reflector = true;
};
}

View File

@@ -6,22 +6,19 @@
id = 205;
interface = "enp1s0";
};
networking.bridges."net-iot".interfaces = [
"enp1s0.205"
];
networking.interfaces."net-iot".ipv6.addresses = [
networking.interfaces."enp1s0.205".ipv6.addresses = [
{ address = "fe80::1"; prefixLength = 64; }
{ address = "fd00:152:152:205::1"; prefixLength = 64; }
];
networking.interfaces."net-iot".ipv4.addresses = [
networking.interfaces."enp1s0.205".ipv4.addresses = [
{ address = "10.152.205.1"; prefixLength = 24; }
];
# Enable NTP
networking.firewall.interfaces."net-iot".allowedUDPPorts = [ 123 ];
networking.firewall.interfaces."enp1s0.205".allowedUDPPorts = [ 123 ];
services.radvd.config = ''
interface net-iot {
interface enp1s0.205 {
AdvSendAdvert on;
MaxRtrAdvInterval 30;
prefix ::/64 {
@@ -36,7 +33,7 @@
services.kea.dhcp4 = {
settings = {
interfaces-config = {
interfaces = [ "net-iot" ];
interfaces = [ "enp1s0.205" ];
};
subnet4 = [
{
@@ -72,9 +69,9 @@
clerie.firewall.extraForwardFilterCommands = ''
# Allow access from Heimnetz to IOT devices
ip46tables -A forward-filter -i net-heimnetz -o net-iot -j ACCEPT
ip46tables -A forward-filter -i net-iot -j DROP
ip46tables -A forward-filter -o net-iot -j DROP
ip46tables -A forward-filter -i enp2s0 -o enp1s0.205 -j ACCEPT
ip46tables -A forward-filter -i enp1s0.205 -j DROP
ip46tables -A forward-filter -o enp1s0.205 -j DROP
'';
}

View File

@@ -6,19 +6,16 @@
id = 203;
interface = "enp1s0";
};
networking.bridges."net-mgmt".interfaces = [
"enp1s0.203"
];
networking.interfaces."net-mgmt".ipv6.addresses = [
networking.interfaces."enp1s0.203".ipv6.addresses = [
{ address = "fe80::1"; prefixLength = 64; }
{ address = "fd00:152:152:203::1"; prefixLength = 64; }
];
networking.interfaces."net-mgmt".ipv4.addresses = [
networking.interfaces."enp1s0.203".ipv4.addresses = [
{ address = "10.152.203.1"; prefixLength = 24; }
];
services.radvd.config = ''
interface net-mgmt {
interface enp1s0.203 {
AdvSendAdvert on;
MaxRtrAdvInterval 30;
prefix ::/64 {
@@ -31,7 +28,7 @@
services.kea.dhcp4 = {
settings = {
interfaces-config = {
interfaces = [ "net-mgmt" ];
interfaces = [ "enp1s0.203" ];
};
subnet4 = [
{
@@ -55,9 +52,9 @@
clerie.firewall.extraForwardFilterCommands = ''
# Allow access from Heimnetz to MGMT network
ip46tables -A forward-filter -i net-heimnetz -o net-mgmt -j ACCEPT
ip46tables -A forward-filter -i net-mgmt -j DROP
ip46tables -A forward-filter -o net-mgmt -j DROP
ip46tables -A forward-filter -i enp2s0 -o enp1s0.203 -j ACCEPT
ip46tables -A forward-filter -i enp1s0.203 -j DROP
ip46tables -A forward-filter -o enp1s0.203 -j DROP
'';
}

View File

@@ -5,17 +5,14 @@
id = 206;
interface = "enp1s0";
};
networking.bridges."net-printer".interfaces = [
"enp1s0.206"
];
networking.interfaces."net-printer".ipv4.addresses = [
networking.interfaces."enp1s0.206".ipv4.addresses = [
{ address = "10.152.206.1"; prefixLength = 24; }
];
services.kea.dhcp4 = {
settings = {
interfaces-config = {
interfaces = [ "net-printer" ];
interfaces = [ "enp1s0.206" ];
};
subnet4 = [
{
@@ -37,15 +34,11 @@
};
};
# Enable scan-to-gpg
networking.firewall.interfaces."net-printer".allowedTCPPorts = [ 2121 ];
networking.firewall.interfaces."net-printer".allowedTCPPortRanges = [ { from = 2130; to = 2134; } ];
clerie.firewall.extraForwardFilterCommands = ''
# Allow access from Heimnetz to printer
ip46tables -A forward-filter -i net-heimnetz -o net-printer -j ACCEPT
ip46tables -A forward-filter -i net-printer -j DROP
ip46tables -A forward-filter -o net-printer -j DROP
ip46tables -A forward-filter -i enp2s0 -o enp1s0.206 -j ACCEPT
ip46tables -A forward-filter -i enp1s0.206 -j DROP
ip46tables -A forward-filter -o enp1s0.206 -j DROP
'';
}