{ pkgs, config, ... }: let zonefile = pkgs.writeText "rfive.de.zone.txt" '' $TTL 3600 $ORIGIN rfive.de. rfive.de. 86400 IN SOA ns.rfive.de. hostmaster.rfive.de. 2024030838 10800 3600 604800 3600 @ NS ns0.rfive.de. @ NS ns.inwx.de. @ NS ns2.inwx.de. @ NS ns3.inwx.eu. ns0 A 23.88.121.184 ns0 AAAA 2a01:4f8:c012:49de::1 @ A 23.88.121.184 @ AAAA 2a01:4f8:c012:49de::1 @ CAA 0 iodef "mailto:ca@rfive.de" @ CAA 0 issue "letsencrypt.org" @ CAA 0 issuewild ";" nuc A 141.30.227.6 falkenstein A 23.88.121.184 falkenstein AAAA 2a01:4f8:c012:49de::1 falkenstein SSHFP 1 1 DE42CA418093CF94EABC124E101AE4D8DE02C69F falkenstein SSHFP 1 2 149100F5C3CA333E20E7B03EB463B0FB23D34FFE1FC65EFAADDDBE51 8EC35990 falkenstein SSHFP 4 1 70A38677DEE50C5B67AA11400A6BCD4984355C2A falkenstein SSHFP 4 2 B25AD18A23C885AE965875C4C9EDA4E4EDFD3503334B10F0BFE7527B EB178CB2 @ MX 1 mail.rfive.de. mail A 23.88.121.184 mail AAAA 2a01:4f8:c012:49de::1 @ TXT "v=spf1 mx ~all" rspamd._domainkey TXT "v=DKIM1; k=rsa;p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDoirUMubro4nlmY6a8JMwK9QB2agAXiJzexDU/7ba6KCggONfoSTfUHlrM/XeM1GG/9oKpngApxDPP97adJuxc8/EELyo4HjTyYD8GBFZhg0AN7V8IPaJ1o5k6dGDk8ZLh41ZCnlAVWkhVSKs5pYtzkrlJIfUSzyuoe8nuFsVe3QIDAQAB" _dmarc TXT "v=DMARC1; p=none; adkim=s; fo=1; rua=mailto:dmarc@rfive.de; ruf=mailto:dmarc@rfive.de" _discord TXT "dh=0bcca75b0a56c304f0c23fbdb3f12009411e8c0c" cache CNAME nuc.rfive.de. chat CNAME nuc.rfive.de. img.trucks CNAME falkenstein.rfive.de. matrix CNAME nuc.rfive.de. purge CNAME falkenstein.rfive.de. rspamd CNAME falkenstein.rfive.de. seafile CNAME nuc.rfive.de. trucks CNAME falkenstein.rfive.de. vault CNAME nuc.rfive.de. ''; in { services.bind = rec { enable = true; directory = "/var/lib/bind"; zones = { "rfive.de" = { master = true; slaves = [ "185.181.104.96" ]; extraConfig = '' also-notify {185.181.104.96;}; dnssec-policy default; inline-signing yes; ''; file = "${directory}/rfive.de.zone.txt"; }; }; }; systemd.services.bind.preStart = '' # copy the file manually to its destination since signing requires a writable directory ${pkgs.coreutils}/bin/cp ${zonefile} ${config.services.bind.directory}/rfive.de.zone.txt ''; networking.firewall.allowedUDPPorts = [ 53 ]; networking.firewall.allowedTCPPorts = [ 53 ]; }