nixos-config/hosts/falkenstein/modules/dns/default.nix

78 lines
2.6 KiB
Nix
Raw Normal View History

2024-03-09 23:22:02 +01:00
{ pkgs, config, ... }:
let
zonefile = pkgs.writeText "rfive.de.zone.txt" ''
$TTL 3600
$ORIGIN rfive.de.
rfive.de. 86400 IN SOA ns.rfive.de. hostmaster.rfive.de. 2024030838 10800 3600 604800 3600
@ NS ns0.rfive.de.
@ NS ns.inwx.de.
@ NS ns2.inwx.de.
@ NS ns3.inwx.eu.
ns0 A 23.88.121.184
ns0 AAAA 2a01:4f8:c012:49de::1
@ A 23.88.121.184
@ AAAA 2a01:4f8:c012:49de::1
@ CAA 0 iodef "mailto:ca@rfive.de"
@ CAA 0 issue "letsencrypt.org"
@ CAA 0 issuewild ";"
nuc A 141.30.227.6
falkenstein A 23.88.121.184
falkenstein AAAA 2a01:4f8:c012:49de::1
falkenstein SSHFP 1 1 DE42CA418093CF94EABC124E101AE4D8DE02C69F
falkenstein SSHFP 1 2 149100F5C3CA333E20E7B03EB463B0FB23D34FFE1FC65EFAADDDBE51 8EC35990
falkenstein SSHFP 4 1 70A38677DEE50C5B67AA11400A6BCD4984355C2A
falkenstein SSHFP 4 2 B25AD18A23C885AE965875C4C9EDA4E4EDFD3503334B10F0BFE7527B EB178CB2
@ MX 1 mail.rfive.de.
mail A 23.88.121.184
mail AAAA 2a01:4f8:c012:49de::1
@ TXT "v=spf1 mx ~all"
rspamd._domainkey TXT "v=DKIM1; k=rsa;p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDoirUMubro4nlmY6a8JMwK9QB2agAXiJzexDU/7ba6KCggONfoSTfUHlrM/XeM1GG/9oKpngApxDPP97adJuxc8/EELyo4HjTyYD8GBFZhg0AN7V8IPaJ1o5k6dGDk8ZLh41ZCnlAVWkhVSKs5pYtzkrlJIfUSzyuoe8nuFsVe3QIDAQAB"
_dmarc TXT "v=DMARC1; p=none; adkim=s; fo=1; rua=mailto:dmarc@rfive.de; ruf=mailto:dmarc@rfive.de"
_discord TXT "dh=0bcca75b0a56c304f0c23fbdb3f12009411e8c0c"
cache CNAME nuc.rfive.de.
chat CNAME nuc.rfive.de.
img.trucks CNAME falkenstein.rfive.de.
matrix CNAME nuc.rfive.de.
purge CNAME falkenstein.rfive.de.
rspamd CNAME falkenstein.rfive.de.
seafile CNAME nuc.rfive.de.
trucks CNAME falkenstein.rfive.de.
vault CNAME nuc.rfive.de.
'';
in
{
2024-03-09 23:22:02 +01:00
services.bind = rec {
enable = true;
2024-03-09 23:22:02 +01:00
directory = "/var/lib/bind";
zones = {
"rfive.de" = {
master = true;
slaves = [
"185.181.104.96"
];
extraConfig = ''
also-notify {185.181.104.96;};
2024-03-09 23:22:02 +01:00
dnssec-policy default;
inline-signing yes;
'';
2024-03-09 23:22:02 +01:00
file = "${directory}/rfive.de.zone.txt";
};
};
};
2024-03-09 23:22:02 +01:00
systemd.services.bind.preStart = ''
# copy the file manually to its destination since signing requires a writable directory
${pkgs.coreutils}/bin/cp ${zonefile} ${config.services.bind.directory}/rfive.de.zone.txt
'';
networking.firewall.allowedUDPPorts = [ 53 ];
networking.firewall.allowedTCPPorts = [ 53 ];
}