mullvad: add vpn config file
This commit is contained in:
		
							parent
							
								
									d9f56ffc93
								
							
						
					
					
						commit
						db80138e53
					
				
					 2 changed files with 32 additions and 10 deletions
				
			
		| 
						 | 
				
			
			@ -2,7 +2,7 @@
 | 
			
		|||
# your system.  Help is available in the configuration.nix(5) man page
 | 
			
		||||
# and in the NixOS manual (accessible by running ‘nixos-help’).
 | 
			
		||||
{ config, pkgs, inputs, ... }: {
 | 
			
		||||
  imports = [ ./gamemode.nix ./cachix.nix ./media-packages.nix ./boot.nix ];
 | 
			
		||||
  imports = [ ./gamemode.nix ./cachix.nix ./media-packages.nix ./boot.nix ./vpn.nix ];
 | 
			
		||||
  packages.media-packages.enable = true;
 | 
			
		||||
 | 
			
		||||
  boot.kernelPackages = pkgs.linuxPackages_latest;
 | 
			
		||||
| 
						 | 
				
			
			@ -141,15 +141,6 @@
 | 
			
		|||
    enableSSHSupport = true;
 | 
			
		||||
    pinentryFlavor = "curses";
 | 
			
		||||
  };
 | 
			
		||||
  # List services that you want to enable:
 | 
			
		||||
  # Enable the OpenSSH daemon.
 | 
			
		||||
  # services.openssh.enable = true;
 | 
			
		||||
  # Open ports in the firewall.
 | 
			
		||||
  # networking.firewall.allowedTCPPorts = [ ... ];
 | 
			
		||||
  # networking.firewall.allowedUDPPorts = [ ... ];
 | 
			
		||||
  # Or disable the firewall altogether.
 | 
			
		||||
  networking.firewall.enable = false;
 | 
			
		||||
  services.mullvad-vpn.enable = true;
 | 
			
		||||
  security.sudo.wheelNeedsPassword = false;
 | 
			
		||||
 | 
			
		||||
  nix.registry.nixpkgs.flake = inputs.nixpkgs;
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
							
								
								
									
										31
									
								
								system/vpn.nix
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										31
									
								
								system/vpn.nix
									
										
									
									
									
										Normal file
									
								
							| 
						 | 
				
			
			@ -0,0 +1,31 @@
 | 
			
		|||
{ pkgs, ... }: {
 | 
			
		||||
  networking.firewall.enable = false;
 | 
			
		||||
 | 
			
		||||
  services.mullvad-vpn.enable = true;
 | 
			
		||||
  networking.nftables = {
 | 
			
		||||
    enable = true;
 | 
			
		||||
    ruleset = ''
 | 
			
		||||
      table inet allowSSH {
 | 
			
		||||
          chain allowIncoming {
 | 
			
		||||
              type filter hook input priority -100; policy accept;
 | 
			
		||||
              tcp dport 9022 ct mark set 0x00000f41 meta mark set 0x6d6f6c65
 | 
			
		||||
          }
 | 
			
		||||
          chain allowOutgoing {
 | 
			
		||||
              type route hook output priority -100; policy accept;
 | 
			
		||||
              tcp sport 9022 ct mark set 0x00000f41 meta mark set 0x6d6f6c65
 | 
			
		||||
          }
 | 
			
		||||
      }
 | 
			
		||||
 | 
			
		||||
      table inet allowNixServe {
 | 
			
		||||
          chain allowIncoming {
 | 
			
		||||
              type filter hook input priority -100; policy accept;
 | 
			
		||||
              tcp dport 5000 ct mark set 0x00000f41 meta mark set 0x6d6f6c65
 | 
			
		||||
          }
 | 
			
		||||
          chain allowOutgoing {
 | 
			
		||||
              type route hook output priority -100; policy accept;
 | 
			
		||||
              tcp sport 5000 ct mark set 0x00000f41 meta mark set 0x6d6f6c65
 | 
			
		||||
          }
 | 
			
		||||
      }
 | 
			
		||||
    '';
 | 
			
		||||
  };
 | 
			
		||||
}
 | 
			
		||||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue