depot/hosts/VEGAS/services/dns/default.nix

60 lines
1.4 KiB
Nix
Raw Normal View History

2021-10-16 21:20:16 +03:00
{ config, hosts, ... }:
# TODO: is this secure?
let
inherit (hosts.${config.networking.hostName}) interfaces;
stevenBlack = builtins.fetchurl {
url = "https://raw.githubusercontent.com/StevenBlack/hosts/9ac56f6b39644cb9a30451cf5195a80714eba3c2/hosts";
sha256 = "sha256-1QdfL/D9yfgZva25ybx4r1loYEzqtxIuGaGrwYZHJxE=";
};
2021-10-16 21:20:16 +03:00
in {
imports = [ ./zones.nix ];
networking.firewall = {
allowedTCPPorts = [ 53 ];
allowedUDPPorts = [ 53 ];
};
services.coredns = {
enable = true;
config = ''
. {
bind ${interfaces.vstub.addr}
hosts ${stevenBlack} {
2021-10-16 21:20:16 +03:00
fallthrough
}
chaos "Private Void DNS" info@privatevoid.net
forward . 127.0.0.1
}
'';
};
services.bind = {
enable = true;
# TODO: un-hardcode all ip addresses
listenOn = [ interfaces.primary.addr "127.0.0.1" ];
ipv4Only = true;
cacheNetworks = [ "10.0.0.0/8" ];
extraConfig = ''
acl "trusted" {
127.0.0.0/8;
::1/128;
${interfaces.primary.addr}/32;
${interfaces.vstub.addr}/32;
10.100.0.0/16;
10.10.0.0/16;
};
acl "publicservers" {
${interfaces.primary.addr}/32;
116.202.226.86/32;
};
'';
extraOptions = ''
recursion yes;
allow-recursion { trusted; };
dnssec-enable yes;
dnssec-validation no;
'';
};
}