From 21db2e5762854966fb735e68d001e4ab6dbbbcbf Mon Sep 17 00:00:00 2001 From: Fuwn Date: Thu, 5 Sep 2024 02:14:50 -0700 Subject: Bump --- modules/system/networking/fail2ban.nix | 16 +++++++++------- modules/system/networking/firewall.nix | 17 ++++++++++------- 2 files changed, 19 insertions(+), 14 deletions(-) (limited to 'modules/system/networking') diff --git a/modules/system/networking/fail2ban.nix b/modules/system/networking/fail2ban.nix index fa45565..6311b14 100644 --- a/modules/system/networking/fail2ban.nix +++ b/modules/system/networking/fail2ban.nix @@ -1,18 +1,20 @@ -{ lib, config, ... }: +{ pkgs, lib, ... }: { services.fail2ban = { enable = false; + banaction = "nftables-multiport"; + banaction-allports = lib.mkDefault "nftables-allport"; + + extraPackages = with pkgs; [ + nftables + ipset + ]; ignoreIP = [ "10.0.0.0/8" "172.16.0.0/12" + "100.64.0.0/16" "192.168.0.0/16" ]; - - jails.sshd.settings = { - enabled = true; - filter = "sshd[mode=aggressive]"; - port = lib.strings.concatStringsSep "," (map toString config.services.openssh.ports); - }; }; } diff --git a/modules/system/networking/firewall.nix b/modules/system/networking/firewall.nix index 569089c..39c5b03 100644 --- a/modules/system/networking/firewall.nix +++ b/modules/system/networking/firewall.nix @@ -1,12 +1,15 @@ +{ lib, ... }: +let + inherit (lib) mkForce; +in { networking.firewall = { enable = true; - allowedUDPPorts = [ 53 ]; - allowPing = false; - - allowedTCPPorts = [ - 80 - 443 - ]; + allowedUDPPorts = mkForce [ ]; + allowedTCPPorts = mkForce [ ]; + allowPing = mkForce false; + logReversePathDrops = true; + logRefusedConnections = false; + checkReversePath = mkForce false; }; } -- cgit v1.2.3