nix/nixos/hosts/osaka-linode-01/firewall.nix

154 lines
5.3 KiB
Nix
Raw Normal View History

2023-12-05 05:27:06 +01:00
{ config, lib, pkgs, ... }: {
networking.firewall.allowedUDPPorts = [
3478 # Headscale DERP UDP
10000 # Jitsi
];
networking.firewall.allowedTCPPorts = [
80 # HTTP
443 # HTTPS
25 # SMTP (explicit TLS => STARTTLS)
465 # ESMTP (implicit TLS)
587 # ESMTP (explicit TLS => STARTTLS)
143 # IMAP4 (explicit TLS => STARTTLS)
993 # IMAP4 (implicit TLS)
4190 # Sieve support
42420 # Vintage Story
25565 # Minecraft
1443 # Headscale DERP
4443 # jitsi-jvb
5222 # Jitsi
5347 # Jitsi
5280 # Jitsi
];
networking.firewall.extraCommands = ''
2023-12-06 12:38:38 +01:00
iptables -A FORWARD -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
2023-12-06 13:33:09 +01:00
iptables -t nat -A POSTROUTING -s 10.100.0.2 -j SNAT --to `:%s/\=
2023-12-06 12:38:38 +01:00
# TCP PORTS ##################################################################################################
# PORT 80
2023-12-06 13:33:09 +01:00
iptables -t nat -A PREROUTING -p tcp --dport 80 -j DNAT --to-destination 10.100.0.2
iptables -t nat -A POSTROUTING -p tcp --dport 80 -j MASQUERADE
2023-12-06 12:38:38 +01:00
# PORT 443
2023-12-06 13:33:09 +01:00
iptables -t nat -A PREROUTING -p tcp --dport 443 -j DNAT --to-destination 10.100.0.2
iptables -t nat -A POSTROUTING -p tcp --dport 443 -j MASQUERADE
2023-12-06 12:38:38 +01:00
2023-12-06 14:23:02 +01:00
# # PORT 25
# iptables -t nat -A PREROUTING -p tcp --dport 25 -j DNAT --to-destination 10.100.0.2
# iptables -t nat -A POSTROUTING -p tcp --dport 25 -j MASQUERADE
#
# # PORT 465
# iptables -t nat -A PREROUTING -p tcp --dport 465 -j DNAT --to-destination 10.100.0.2
# iptables -t nat -A POSTROUTING -p tcp --dport 465 -j MASQUERADE
#
# # PORT 587
# iptables -t nat -A PREROUTING -p tcp --dport 587 -j DNAT --to-destination 10.100.0.2
# iptables -t nat -A POSTROUTING -p tcp --dport 587 -j MASQUERADE
#
# # PORT 143
# iptables -t nat -A PREROUTING -p tcp --dport 143 -j DNAT --to-destination 10.100.0.2
# iptables -t nat -A POSTROUTING -p tcp --dport 143 -j MASQUERADE
#
# # PORT 993
# iptables -t nat -A PREROUTING -p tcp --dport 993 -j DNAT --to-destination 10.100.0.2
# iptables -t nat -A POSTROUTING -p tcp --dport 993 -j MASQUERADE
#
# # PORT 4190
# iptables -t nat -A PREROUTING -p tcp --dport 4190 -j DNAT --to-destination 10.100.0.2
# iptables -t nat -A POSTROUTING -p tcp --dport 4190 -j MASQUERADE
2023-12-06 12:38:38 +01:00
# PORT 42420
2023-12-06 13:33:09 +01:00
iptables -t nat -A PREROUTING -p tcp --dport 42420 -j DNAT --to-destination 10.100.0.2
iptables -t nat -A POSTROUTING -p tcp --dport 42420 -j MASQUERADE
2023-12-06 12:38:38 +01:00
# PORT 25565
2023-12-06 13:33:09 +01:00
iptables -t nat -A PREROUTING -p tcp --dport 25565 -j DNAT --to-destination 10.100.0.2
iptables -t nat -A POSTROUTING -p tcp --dport 25565 -j MASQUERADE
2023-12-06 12:38:38 +01:00
# PORT 1443
2023-12-06 13:33:09 +01:00
iptables -t nat -A PREROUTING -p tcp --dport 1443 -j DNAT --to-destination 10.100.0.2
iptables -t nat -A POSTROUTING -p tcp --dport 1443 -j MASQUERADE
2023-12-06 12:38:38 +01:00
# PORT 4443
2023-12-06 13:33:09 +01:00
iptables -t nat -A PREROUTING -p tcp --dport 4443 -j DNAT --to-destination 10.100.0.2
iptables -t nat -A POSTROUTING -p tcp --dport 4443 -j MASQUERADE
2023-12-06 12:38:38 +01:00
# PORT 5222
2023-12-06 13:33:09 +01:00
iptables -t nat -A PREROUTING -p tcp --dport 5222 -j DNAT --to-destination 10.100.0.2
iptables -t nat -A POSTROUTING -p tcp --dport 5222 -j MASQUERADE
2023-12-06 12:38:38 +01:00
# PORT 5347
2023-12-06 13:33:09 +01:00
iptables -t nat -A PREROUTING -p tcp --dport 5347 -j DNAT --to-destination 10.100.0.2
iptables -t nat -A POSTROUTING -p tcp --dport 5347 -j MASQUERADE
2023-12-06 12:38:38 +01:00
# PORT 5280
2023-12-06 13:33:09 +01:00
iptables -t nat -A PREROUTING -p tcp --dport 5280 -j DNAT --to-destination 10.100.0.2
iptables -t nat -A POSTROUTING -p tcp --dport 5280 -j MASQUERADE
2023-12-06 12:38:38 +01:00
# UDP PORTS ##################################################################################################
# PORT 10000
2023-12-06 13:33:09 +01:00
iptables -t nat -A PREROUTING -p udp --dport 10000 -j DNAT --to-destination 10.100.0.2
iptables -t nat -A POSTROUTING -p udp --dport 10000 -j MASQUERADE
2023-12-06 12:38:38 +01:00
# PORT 3478
2023-12-06 13:33:09 +01:00
iptables -t nat -A PREROUTING -p udp --dport 3478 -j DNAT --to-destination 10.100.0.2
iptables -t nat -A POSTROUTING -p udp --dport 3478 -j MASQUERADE
2023-12-05 05:27:06 +01:00
'';
2023-12-06 14:23:02 +01:00
services.xinetd = {
enable = true;
services = [
{
name = "mail 25";
port = 25;
protocol = "tcp";
unlisted = true;
server = "/usr/bin/env"; # Placeholder.
extraConfig = "redirect = 10.100.0.2 25";
}
{
name = "mail 465";
port = 465;
protocol = "tcp";
unlisted = true;
server = "/usr/bin/env"; # Placeholder.
extraConfig = "redirect = 10.100.0.2 465";
}
{
name = "mail 587";
port = 587;
protocol = "tcp";
unlisted = true;
server = "/usr/bin/env"; # Placeholder.
extraConfig = "redirect = 10.100.0.2 587";
}
{
name = "mail 143";
port = 143;
protocol = "tcp";
unlisted = true;
server = "/usr/bin/env"; # Placeholder.
extraConfig = "redirect = 10.100.0.2 143";
}
{
name = "mail 993";
port = 993;
protocol = "tcp";
unlisted = true;
server = "/usr/bin/env"; # Placeholder.
extraConfig = "redirect = 10.100.0.2 993";
}
{
name = "mail 4190";
port = 4190;
protocol = "tcp";
unlisted = true;
server = "/usr/bin/env"; # Placeholder.
extraConfig = "redirect = 10.100.0.2 4190";
}
];
};
2023-12-05 05:27:06 +01:00
}