fiddeling around with fail2ban and unlock via ssh
Some checks failed
Build all NixOS Configurations / nix build (push) Failing after 11m30s

This commit is contained in:
Ingolf Wagner 2024-08-02 23:40:57 +02:00
parent cff3407b46
commit 46a2b0cfa1
Signed by: palo
GPG key ID: 76BF5F1928B9618B
5 changed files with 8 additions and 3 deletions

View file

@ -11,6 +11,7 @@ with lib;
environment.systemPackages = [ pkgs.fail2ban pkgs.ipset ];
services.fail2ban = {
enable = true;
#package = pkgs.legacy_2311.fail2ban;
jails = { };
};
})

View file

@ -74,6 +74,7 @@ in
(mkIf cfg.sshguard.enable {
environment.systemPackages = [ pkgs.ipset ];
services.sshguard.enable = lib.mkDefault true;
#boot.kernelModules = ["xt_set"];
})
(mkIf (cfg.onlyTincAccess && cfg.enable) {

View file

@ -64,7 +64,7 @@ with types;
#};
# tor setup
clan.core.facts.services.initrd_tor = factsGenerator.tor { name = "initrd"; };
clan.core.facts.services.initrd_tor = factsGenerator.tor { name = ""; };
boot.initrd.secrets = {
"/etc/tor/onion/bootup/tor.priv" = config.clan.core.facts.services.initrd_tor.secret."tor.initrd.priv".path;

View file

@ -462,8 +462,8 @@
homeManagerModules
stylixModules
srvos.nixosModules.hardware-hetzner-online-intel
srvos.nixosModules.server
srvos.nixosModules.mixins-terminfo
#srvos.nixosModules.server
#srvos.nixosModules.mixins-terminfo
{
# not needed for servers in general
boot.initrd.systemd.emergencyAccess = false;

View file

@ -53,6 +53,9 @@
components.network.fail2ban.enable = true;
components.network.sshd.sshguard.enable = false;
components.nixos.boot.enable = true;
components.nixos.boot.tor.enable = false;
components.monitor.enable = true;
networking.firewall.interfaces.wg0.allowedTCPPorts = [ 4317 ];
networking.firewall.interfaces.wg0.allowedUDPPorts = [ 4317 ];