diff options
| author | Fuwn <[email protected]> | 2024-09-11 00:52:32 -0700 |
|---|---|---|
| committer | Fuwn <[email protected]> | 2024-09-11 00:52:32 -0700 |
| commit | b6956dd32fbe4bd6a83336a66c3ff73ec47c7b9c (patch) | |
| tree | 5e61c8151b6cde865405d61fb9c1f7bd65c9f662 /modules/software/access | |
| parent | Bump: swift (diff) | |
| download | nixos-config-b6956dd32fbe4bd6a83336a66c3ff73ec47c7b9c.tar.xz nixos-config-b6956dd32fbe4bd6a83336a66c3ff73ec47c7b9c.zip | |
Bump: i2p
Diffstat (limited to 'modules/software/access')
| -rw-r--r-- | modules/software/access/default.nix | 7 | ||||
| -rw-r--r-- | modules/software/access/gnupg.nix | 18 | ||||
| -rw-r--r-- | modules/software/access/mosh.nix | 6 | ||||
| -rw-r--r-- | modules/software/access/ssh.nix | 35 |
4 files changed, 66 insertions, 0 deletions
diff --git a/modules/software/access/default.nix b/modules/software/access/default.nix new file mode 100644 index 0000000..7db7629 --- /dev/null +++ b/modules/software/access/default.nix @@ -0,0 +1,7 @@ +{ + imports = [ + ./gnupg.nix + ./mosh.nix + ./ssh.nix + ]; +} diff --git a/modules/software/access/gnupg.nix b/modules/software/access/gnupg.nix new file mode 100644 index 0000000..e60da30 --- /dev/null +++ b/modules/software/access/gnupg.nix @@ -0,0 +1,18 @@ +{ pkgs, ... }: +{ + programs.gnupg.agent = { + enable = true; + enableSSHSupport = true; + pinentryPackage = pkgs.pinentry-curses; + enableExtraSocket = true; + enableBrowserSocket = true; + + settings = { + enable-ssh-support = ""; + ttyname = "$GPG_TTY"; + default-cache-ttl = 34560000; # 60 + max-cache-ttl = 34560000; # 120 + allow-loopback-pinentry = ""; + }; + }; +} diff --git a/modules/software/access/mosh.nix b/modules/software/access/mosh.nix new file mode 100644 index 0000000..c9af5bf --- /dev/null +++ b/modules/software/access/mosh.nix @@ -0,0 +1,6 @@ +{ + programs.mosh = { + enable = true; + openFirewall = false; + }; +} diff --git a/modules/software/access/ssh.nix b/modules/software/access/ssh.nix new file mode 100644 index 0000000..8a2b30d --- /dev/null +++ b/modules/software/access/ssh.nix @@ -0,0 +1,35 @@ +{ lib, config, ... }: +{ + programs.ssh.startAgent = false; + + services = { + fail2ban.jails.sshd.settings = { + enabled = true; + filter = "sshd[mode=aggressive]"; + port = lib.strings.concatStringsSep "," (map toString config.services.openssh.ports); + }; + + openssh = { + enable = true; + ports = [ 22 ]; + openFirewall = false; + + settings = { + KexAlgorithms = [ + "curve25519-sha256" + "diffie-hellman-group16-sha512" + "diffie-hellman-group18-sha512" + "diffie-hellman-group-exchange-sha256" + ]; + + Macs = [ + ]; + }; + }; + }; +} |