blob: 6cff39055e928aa9a686f854c156c71e773618d2 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
|
{ config, ... }:
let
wgInterface = "wg";
wanInterface = "ppp0";
subnet = "10.0.1.0";
prefix = 24;
port = 51820;
in
{
sops.secrets."misc/wireguard" = {};
networking = {
nat = {
enable = true;
externalInterface = wanInterface;
internalInterfaces = [ wgInterface ];
};
firewall = {
allowedUDPPorts = [ port ];
extraCommands = ''
iptables -t nat -I POSTROUTING 1 -s ${subnet}/${toString prefix} -o ${wanInterface} -j MASQUERADE
'';
};
wireguard.interfaces.${wgInterface} = {
ips = [ "10.0.1.1/${toString prefix}" ];
listenPort = port;
mtu = 1300; # 1380 (ppp0) - 80
privateKeyFile = config.sops.secrets."misc/wireguard".path;
peers = [
{ # cez
publicKey = "IcMpAs/D0u8O/AcDBPC7pFUYSeFQXQpTqHpGOeVpjS8=";
allowedIPs = [ "10.0.1.2/32" ];
}
{ # vex
publicKey = "bJ9aqGYD2Jh4MtWIL7q3XxVHFuUdwGJwO8p7H3nNPj8=";
allowedIPs = [ "10.0.1.3/32" ];
}
{ # nevin-server
publicKey = "4OrIu3Ol7Wux9eso+K9SceVPsZrrngj30vzirnnXyho=";
allowedIPs = [ "10.0.1.4/32" ];
}
{ # nevin-pc
publicKey = "1aL9HNy3JeWgDt6s2IxzIjKnp4ntJO6aufuyEwRp9WM=";
allowedIPs = [ "10.0.1.5/32" ];
}
];
};
};
services.dnsmasq.settings = {
no-dhcp-interface = wgInterface;
interface = [ wgInterface ];
};
}
|