This commit is contained in:
iFargle 2023-12-03 15:46:49 +09:00
parent a126b56b40
commit 2381911429
3 changed files with 128 additions and 9 deletions

View file

@ -1,7 +1,7 @@
{ config, lib, pkgs, modulesPath, desktop, username, ... }: {
imports = [
./disks.nix
./xinetd.nix
./firewall.nix
./wireguard.nix
];

View file

@ -0,0 +1,116 @@
{ config, lib, pkgs, ... }: {
networking.firewall.allowedUDPPorts = [
3478 # Headscale DERP UDP
10000 # Jitsi
];
networking.firewall.allowedTCPPorts = [
80 # HTTP
443 # HTTPS
25 # SMTP (explicit TLS => STARTTLS)
465 # ESMTP (implicit TLS)
587 # ESMTP (explicit TLS => STARTTLS)
143 # IMAP4 (explicit TLS => STARTTLS)
993 # IMAP4 (implicit TLS)
4190 # Sieve support
42420 # Vintage Story
25565 # Minecraft
1443 # Headscale DERP
4443 # jitsi-jvb
5222 # Jitsi
5347 # Jitsi
5280 # Jitsi
];
networking.firewall.extraCommands = ''
iptables -A FORWARD -i ens3 -o wireguard0 -p tcp --syn --dport 80 -m conntrack --ctstate NEW -j ACCEPT
iptables -A FORWARD -i ens3 -o wireguard0 -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
iptables -A FORWARD -i wireguard0 -o ens3 -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
# TCP PORTS ##################################################################################################
# PORT 80
iptables -t nat -A PREROUTING -i ens3 -p tcp --dport 80 -j DNAT --to-destination 10.100.0.2
iptables -t nat -A POSTROUTING -o wireguard0 -p tcp --dport 80 -d 10.100.0.2 -j SNAT --to-source 10.100.0.1
iptables -A FORWARD -i ens3 -o wireguard0 -p tcp --syn --dport 80 -m conntrack --ctstate NEW -j ACCEPT
# PORT 443
iptables -t nat -A PREROUTING -i ens3 -p tcp --dport 443 -j DNAT --to-destination 10.100.0.2
iptables -t nat -A POSTROUTING -o wireguard0 -p tcp --dport 443 -d 10.100.0.2 -j SNAT --to-source 10.100.0.1
iptables -A FORWARD -i ens3 -o wireguard0 -p tcp --syn --dport 443 -m conntrack --ctstate NEW -j ACCEPT
# PORT 25
iptables -t nat -A PREROUTING -i ens3 -p tcp --dport 25 -j DNAT --to-destination 10.100.0.2
iptables -t nat -A POSTROUTING -o wireguard0 -p tcp --dport 25 -d 10.100.0.2 -j SNAT --to-source 10.100.0.1
iptables -A FORWARD -i ens3 -o wireguard0 -p tcp --syn --dport 25 -m conntrack --ctstate NEW -j ACCEPT
# PORT 465
iptables -t nat -A PREROUTING -i ens3 -p tcp --dport 465 -j DNAT --to-destination 10.100.0.2
iptables -t nat -A POSTROUTING -o wireguard0 -p tcp --dport 465 -d 10.100.0.2 -j SNAT --to-source 10.100.0.1
iptables -A FORWARD -i ens3 -o wireguard0 -p tcp --syn --dport 465 -m conntrack --ctstate NEW -j ACCEPT
# PORT 587
iptables -t nat -A PREROUTING -i ens3 -p tcp --dport 587 -j DNAT --to-destination 10.100.0.2
iptables -t nat -A POSTROUTING -o wireguard0 -p tcp --dport 587 -d 10.100.0.2 -j SNAT --to-source 10.100.0.1
iptables -A FORWARD -i ens3 -o wireguard0 -p tcp --syn --dport 587 -m conntrack --ctstate NEW -j ACCEPT
# PORT 143
iptables -t nat -A PREROUTING -i ens3 -p tcp --dport 143 -j DNAT --to-destination 10.100.0.2
iptables -t nat -A POSTROUTING -o wireguard0 -p tcp --dport 143 -d 10.100.0.2 -j SNAT --to-source 10.100.0.1
iptables -A FORWARD -i ens3 -o wireguard0 -p tcp --syn --dport 143 -m conntrack --ctstate NEW -j ACCEPT
# PORT 993
iptables -t nat -A PREROUTING -i ens3 -p tcp --dport 993 -j DNAT --to-destination 10.100.0.2
iptables -t nat -A POSTROUTING -o wireguard0 -p tcp --dport 993 -d 10.100.0.2 -j SNAT --to-source 10.100.0.1
iptables -A FORWARD -i ens3 -o wireguard0 -p tcp --syn --dport 993 -m conntrack --ctstate NEW -j ACCEPT
# PORT 4190
iptables -t nat -A PREROUTING -i ens3 -p tcp --dport 4190 -j DNAT --to-destination 10.100.0.2
iptables -t nat -A POSTROUTING -o wireguard0 -p tcp --dport 4190 -d 10.100.0.2 -j SNAT --to-source 10.100.0.1
iptables -A FORWARD -i ens3 -o wireguard0 -p tcp --syn --dport 4190 -m conntrack --ctstate NEW -j ACCEPT
# PORT 42420
iptables -t nat -A PREROUTING -i ens3 -p tcp --dport 42420 -j DNAT --to-destination 10.100.0.2
iptables -t nat -A POSTROUTING -o wireguard0 -p tcp --dport 42420 -d 10.100.0.2 -j SNAT --to-source 10.100.0.1
iptables -A FORWARD -i ens3 -o wireguard0 -p tcp --syn --dport 42420 -m conntrack --ctstate NEW -j ACCEPT
# PORT 25565
iptables -t nat -A PREROUTING -i ens3 -p tcp --dport 25565 -j DNAT --to-destination 10.100.0.2
iptables -t nat -A POSTROUTING -o wireguard0 -p tcp --dport 25565 -d 10.100.0.2 -j SNAT --to-source 10.100.0.1
iptables -A FORWARD -i ens3 -o wireguard0 -p tcp --syn --dport 25565 -m conntrack --ctstate NEW -j ACCEPT
# PORT 1443
iptables -t nat -A PREROUTING -i ens3 -p tcp --dport 1443 -j DNAT --to-destination 10.100.0.2
iptables -t nat -A POSTROUTING -o wireguard0 -p tcp --dport 1443 -d 10.100.0.2 -j SNAT --to-source 10.100.0.1
iptables -A FORWARD -i ens3 -o wireguard0 -p tcp --syn --dport 1443 -m conntrack --ctstate NEW -j ACCEPT
# PORT 4443
iptables -t nat -A PREROUTING -i ens3 -p tcp --dport 4443 -j DNAT --to-destination 10.100.0.2
iptables -t nat -A POSTROUTING -o wireguard0 -p tcp --dport 4443 -d 10.100.0.2 -j SNAT --to-source 10.100.0.1
iptables -A FORWARD -i ens3 -o wireguard0 -p tcp --syn --dport 4443 -m conntrack --ctstate NEW -j ACCEPT
# PORT 5222
iptables -t nat -A PREROUTING -i ens3 -p tcp --dport 5222 -j DNAT --to-destination 10.100.0.2
iptables -t nat -A POSTROUTING -o wireguard0 -p tcp --dport 5222 -d 10.100.0.2 -j SNAT --to-source 10.100.0.1
iptables -A FORWARD -i ens3 -o wireguard0 -p tcp --syn --dport 5222 -m conntrack --ctstate NEW -j ACCEPT
# PORT 5347
iptables -t nat -A PREROUTING -i ens3 -p tcp --dport 5347 -j DNAT --to-destination 10.100.0.2
iptables -t nat -A POSTROUTING -o wireguard0 -p tcp --dport 5347 -d 10.100.0.2 -j SNAT --to-source 10.100.0.1
iptables -A FORWARD -i ens3 -o wireguard0 -p tcp --syn --dport 5347 -m conntrack --ctstate NEW -j ACCEPT
# PORT 5280
iptables -t nat -A PREROUTING -i ens3 -p tcp --dport 5280 -j DNAT --to-destination 10.100.0.2
iptables -t nat -A POSTROUTING -o wireguard0 -p tcp --dport 5280 -d 10.100.0.2 -j SNAT --to-source 10.100.0.1
iptables -A FORWARD -i ens3 -o wireguard0 -p tcp --syn --dport 5280 -m conntrack --ctstate NEW -j ACCEPT
# UDP PORTS ##################################################################################################
# PORT 10000
iptables -t nat -A PREROUTING -i ens3 -p udp --dport 10000 -j DNAT --to-destination 10.100.0.2
iptables -t nat -A POSTROUTING -o wireguard0 -p udp --dport 10000 -d 10.100.0.2 -j SNAT --to-source 10.100.0.1
iptables -A FORWARD -i ens3 -o wireguard0 -p udp --syn --dport 10000 -m conntrack --ctstate NEW -j ACCEPT
# PORT 3478
iptables -t nat -A PREROUTING -i ens3 -p udp --dport 3478 -j DNAT --to-destination 10.100.0.2
iptables -t nat -A POSTROUTING -o wireguard0 -p udp --dport 3478 -d 10.100.0.2 -j SNAT --to-source 10.100.0.1
iptables -A FORWARD -i ens3 -o wireguard0 -p udp --syn --dport 3478 -m conntrack --ctstate NEW -j ACCEPT
'';
}

View file

@ -21,14 +21,17 @@
5280 # Jitsi
];
networking.firewall.extraCommands = ''
${pkgs.iptables}/bin/iptables -t nat -A PREROUTING -i eth0 -p tcp --dport 80 -j DNAT --to 64.176.54.57:80
${pkgs.iptables}/bin/iptables -t nat -A OUTPUT -d 10.100.0.2 -p tcp --dport 80 -j DNAT --to 64.176.54.57:80
${pkgs.iptables}/bin/iptables -t nat -A PREROUTING -i eth0 -p tcp --dport 443 -j DNAT --to 64.176.54.57:443
${pkgs.iptables}/bin/iptables -t nat -A OUTPUT -d 10.100.0.2 -p tcp --dport 443 -j DNAT --to 64.176.54.57:443
${pkgs.iptables}/bin/iptables -t nat -A PREROUTING -i eth0 -p udp --dport 10000 -j DNAT --to 64.176.54.57:10000
${pkgs.iptables}/bin/iptables -t nat -A OUTPUT -d 10.100.0.2 -p udp --dport 10000 -j DNAT --to 64.176.54.57:10000
'';
networking.firewall.extraCommands = ''
${pkgs.iptables}/bin/iptables -A FORWARD -i ens3 -o wireguard0 -p tcp --syn --dport 80 -m conntrack --ctstate NEW -j ACCEPT
${pkgs.iptables}/bin/iptables -A FORWARD -i ens3 -o wireguard0 -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
${pkgs.iptables}/bin/iptables -A FORWARD -i wireguard0 -o ens3 -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
${pkgs.iptables}/bin/iptables -t nat -A PREROUTING -i ens3 -p tcp --dport 80 -j DNAT --to-destination 10.100.0.2
${pkgs.iptables}/bin/iptables -t nat -A POSTROUTING -o wireguard0 -p tcp --dport 80 -d 10.100.0.2 -j SNAT --to-source 10.100.0.1
${pkgs.iptables}/bin/iptables -A FORWARD -i ens3 -o wireguard0 -p tcp --syn --dport 80 -m conntrack --ctstate NEW -j ACCEPT
${pkgs.iptables}/bin/iptables -t nat -A PREROUTING -i ens3 -p tcp --dport 443 -j DNAT --to-destination 10.100.0.2
${pkgs.iptables}/bin/iptables -t nat -A POSTROUTING -o wireguard0 -p tcp --dport 443 -d 10.100.0.2 -j SNAT --to-source 10.100.0.1
${pkgs.iptables}/bin/iptables -A FORWARD -i ens3 -o wireguard0 -p tcp --syn --dport 443 -m conntrack --ctstate NEW -j ACCEPT
'';
services.xinetd = {
enable = false;