Compare commits

...

2 commits

Author SHA1 Message Date
ba3929c399
ns: redo dnssec policy 2024-03-11 12:40:23 +01:00
cb49b95c53
nuc: re-enable adguard dns 2024-03-11 12:40:04 +01:00
5 changed files with 31 additions and 11 deletions

6
flake.lock generated
View file

@ -281,11 +281,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1710040110, "lastModified": 1710120787,
"narHash": "sha256-PNAV8VdZkNoSGQHGQWDefNarl0BtKjVMCCzu16+vsr4=", "narHash": "sha256-tlLuB73OCOKtU2j83bQzSYFyzjJo3rjpITZE5MoofG8=",
"owner": "nix-community", "owner": "nix-community",
"repo": "nix-index-database", "repo": "nix-index-database",
"rev": "851fcfd130597c5c91071d46275111522d4fd595", "rev": "e76ff2df6bfd2abe06abd8e7b9f217df941c1b07",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -6,7 +6,7 @@ let
$ORIGIN rfive.de. $ORIGIN rfive.de.
rfive.de. 86400 IN SOA ns.rfive.de. hostmaster.rfive.de. ( rfive.de. 86400 IN SOA ns.rfive.de. hostmaster.rfive.de. (
2024031013 ; serial 2024031014 ; serial
10800 ; refresh 10800 ; refresh
3600 ; retry 3600 ; retry
604800 ; expire 604800 ; expire
@ -59,6 +59,16 @@ in
services.bind = rec { services.bind = rec {
enable = true; enable = true;
directory = "/var/lib/bind"; directory = "/var/lib/bind";
extraConfig = ''
dnssec-policy "split-keys" {
keys {
ksk lifetime unlimited algorithm ecdsap256sha256;
zsk lifetime 60d algorithm ecdsap256sha256;
};
publish-safety 1d;
retire-safety 1d;
};
'';
zones = { zones = {
"rfive.de" = { "rfive.de" = {
master = true; master = true;
@ -67,7 +77,7 @@ in
]; ];
extraConfig = '' extraConfig = ''
also-notify {${secondary};}; also-notify {${secondary};};
dnssec-policy default; dnssec-policy split-keys;
inline-signing yes; inline-signing yes;
serial-update-method date; serial-update-method date;
''; '';
@ -83,4 +93,5 @@ in
ip saddr ${secondary}/32 tcp dport 53 accept comment "Allow DNS AXFR access from INWX Servers" ip saddr ${secondary}/32 tcp dport 53 accept comment "Allow DNS AXFR access from INWX Servers"
ip saddr ${secondary}/32 udp dport 53 accept comment "Allow DNS access from INWX Servers" ip saddr ${secondary}/32 udp dport 53 accept comment "Allow DNS access from INWX Servers"
''; '';
environment.systemPackages = with pkgs; [ dig.out ];
} }

View file

@ -5,6 +5,7 @@
# Include the results of the hardware scan. # Include the results of the hardware scan.
./hardware-configuration.nix ./hardware-configuration.nix
./modules/networks ./modules/networks
./modules/adguard
./modules/backup ./modules/backup
./modules/cache ./modules/cache
./modules/matrix ./modules/matrix

View file

@ -0,0 +1,10 @@
{ ... }:
{
networking.firewall.allowedTCPPorts = [ 53 ];
networking.firewall.allowedUDPPorts = [ 53 ];
services.adguardhome = {
enable = true;
openFirewall = true;
settings.bind_port = 3000;
};
}

View file

@ -21,12 +21,10 @@
"2620:fe::fe" "2620:fe::fe"
"2620:fe::9" "2620:fe::9"
]; ];
# make room for the adguard dns extraConfig = ''
# extraConfig = '' [Resolve]
# [Resolve] DNSStubListener=no
# DNS=127.0.0.1 '';
# DNSStubListener=no
# '';
}; };
systemd.network = { systemd.network = {
enable = true; enable = true;