{ pkgs, config, lib, ... }: { imports = [ ./uni.nix ]; age.secrets = { wireless = { file = ../../../../secrets/thinkpad/wireless.age; }; "wireguard/dorm/private" = { file = ../../../../secrets/thinkpad/wireguard/dorm/private.age; owner = config.users.users.systemd-network.name; }; "wireguard/dorm/preshared" = { file = ../../../../secrets/thinkpad/wireguard/dorm/preshared.age; owner = config.users.users.systemd-network.name; }; }; environment.systemPackages = with pkgs; [ mtr whois inetutils openssl dnsutils nmap curlFull wireguard-tools etherape ]; services.timesyncd.servers = lib.mkForce [ ]; services.resolved = { fallbackDns = [ "9.9.9.9" "149.112.112.112" "2620:fe::fe" "2620:fe::9" ]; # allow downgrade since fritzbox at home doesn't support it (yet?) # dnssec = "allow-downgrade"; }; networking = { nftables.enable = true; useNetworkd = true; hostName = "thinkpad"; hostId = "d8d34032"; enableIPv6 = true; wireless = { enable = true; userControlled.enable = true; # sadly broken on my machine scanOnLowSignal = false; secretsFile = config.age.secrets.wireless.path; networks = { "Smoerrebroed" = { pskRaw = "ext:HOME_PSK"; authProtocols = [ "WPA-PSK" ]; }; "Cudy-6140" = { pskRaw = "ext:DORM_PSK"; authProtocols = [ "SAE" ]; extraConfig = "disabled=1"; }; "Cudy-6150" = { priority = 5; pskRaw = "ext:DORM_PSK"; authProtocols = [ "SAE" ]; extraConfig = "disabled=1"; }; "LKG-Gast" = { pskRaw = "ext:LKGDD_GUEST_PSK"; authProtocols = [ "WPA-PSK" ]; }; "Pxl" = { pskRaw = "ext:PIXEL_PSK"; authProtocols = [ "WPA-PSK" ]; }; "WIFI@DB" = { authProtocols = [ "NONE" ]; }; }; }; }; systemd.network = { enable = true; wait-online.enable = false; config = { networkConfig = { SpeedMeter = true; }; }; networks."10-loopback" = { matchConfig.Name = "lo"; }; networks."10-wired-default" = { matchConfig.Name = "en*"; linkConfig.RequiredForOnline = false; networkConfig = { DHCP = "yes"; IPv6AcceptRA = "yes"; IPv6PrivacyExtensions = "yes"; LLDP = true; EmitLLDP = "nearest-bridge"; }; dhcpV4Config = { RouteMetric = 10; }; }; networks."10-wireless-home" = { matchConfig = { Name = "wlp9s0"; SSID = "Smoerrebroed"; }; networkConfig = { DHCP = "yes"; IgnoreCarrierLoss = "3s"; IPv6AcceptRA = "yes"; IPv6PrivacyExtensions = "yes"; }; dhcpV4Config = { RouteMetric = 20; }; routes = [ # Route to the Model train network via raspi { Gateway = "192.168.178.63"; GatewayOnLink = true; Destination = "192.168.179.0/24"; } ]; }; networks."15-wireless-default" = { matchConfig.Name = "wlp9s0"; networkConfig = { DHCP = "yes"; IgnoreCarrierLoss = "3s"; IPv6AcceptRA = "yes"; IPv6PrivacyExtensions = "yes"; }; dhcpV4Config = { RouteMetric = 20; }; }; netdevs."30-wg0" = { netdevConfig = { Kind = "wireguard"; Name = "wg0"; }; wireguardConfig = { PrivateKeyFile = config.age.secrets."wireguard/dorm/private".path; ListenPort = 51820; RouteTable = "main"; RouteMetric = 30; }; wireguardPeers = [ { PublicKey = "Z5lwwHTCDr6OF4lfaCdSHNveunOn4RzuOQeyB+El9mQ="; PresharedKeyFile = config.age.secrets."wireguard/dorm/preshared".path; Endpoint = "nuc.rfive.de:51820"; AllowedIPs = "192.168.42.0/24, 192.168.43.0/24"; } ]; }; networks."30-wg0" = { matchConfig.Name = "wg0"; linkConfig.RequiredForOnline = false; addresses = [ { Address = "192.168.43.3/24"; AddPrefixRoute = false; } ]; networkConfig = { DNS = "192.168.43.1"; Domains = [ "~vpn.rfive.de" "~42.168.192.in-addr.arpa" "~43.168.192.in-addr.arpa" ]; DNSSEC = false; }; }; }; programs.wireshark = { enable = true; package = pkgs.wireshark-qt; }; users.groups.etherape = { }; security.wrappers.etherape = { source = "${pkgs.etherape}/bin/etherape"; capabilities = "cap_net_raw,cap_net_admin+eip"; owner = "root"; group = "etherape"; permissions = "u+rx,g+x"; }; }