summaryrefslogtreecommitdiff
path: root/modules/system/networking
diff options
context:
space:
mode:
Diffstat (limited to 'modules/system/networking')
-rw-r--r--modules/system/networking/fail2ban.nix16
-rw-r--r--modules/system/networking/firewall.nix17
2 files changed, 19 insertions, 14 deletions
diff --git a/modules/system/networking/fail2ban.nix b/modules/system/networking/fail2ban.nix
index fa45565..6311b14 100644
--- a/modules/system/networking/fail2ban.nix
+++ b/modules/system/networking/fail2ban.nix
@@ -1,18 +1,20 @@
-{ lib, config, ... }:
+{ pkgs, lib, ... }:
{
services.fail2ban = {
enable = false;
+ banaction = "nftables-multiport";
+ banaction-allports = lib.mkDefault "nftables-allport";
+
+ extraPackages = with pkgs; [
+ nftables
+ ipset
+ ];
ignoreIP = [
"10.0.0.0/8"
"172.16.0.0/12"
+ "100.64.0.0/16"
"192.168.0.0/16"
];
-
- jails.sshd.settings = {
- enabled = true;
- filter = "sshd[mode=aggressive]";
- port = lib.strings.concatStringsSep "," (map toString config.services.openssh.ports);
- };
};
}
diff --git a/modules/system/networking/firewall.nix b/modules/system/networking/firewall.nix
index 569089c..39c5b03 100644
--- a/modules/system/networking/firewall.nix
+++ b/modules/system/networking/firewall.nix
@@ -1,12 +1,15 @@
+{ lib, ... }:
+let
+ inherit (lib) mkForce;
+in
{
networking.firewall = {
enable = true;
- allowedUDPPorts = [ 53 ];
- allowPing = false;
-
- allowedTCPPorts = [
- 80
- 443
- ];
+ allowedUDPPorts = mkForce [ ];
+ allowedTCPPorts = mkForce [ ];
+ allowPing = mkForce false;
+ logReversePathDrops = true;
+ logRefusedConnections = false;
+ checkReversePath = mkForce false;
};
}