WIP: router firewall
This commit is contained in:
parent
5559e6bc95
commit
b5d11fe2d7
@ -1,95 +1,100 @@
|
|||||||
# Edit this configuration file to define what should be installed on
|
|
||||||
# your system. Help is available in the configuration.nix(5) man page
|
|
||||||
# and in the NixOS manual (accessible by running ‘nixos-help’).
|
|
||||||
|
|
||||||
{ config, lib, pkgs, ... }:
|
{ config, lib, pkgs, ... }:
|
||||||
|
|
||||||
let
|
let
|
||||||
lan_ip6 = "fd97:530d:73ec:f00::";
|
if_wan = "wan";
|
||||||
|
if_lan = "lan";
|
||||||
|
if_lan10 = "lan.10";
|
||||||
|
if_lan20 = "lan.20";
|
||||||
|
|
||||||
|
lan_p4 = "10.19.1"; # .0/24
|
||||||
|
lan10_p4 = "10.19.10"; # .0/24
|
||||||
|
lan20_p4 = "10.19.20"; # .0/24
|
||||||
|
|
||||||
|
pd_from_wan = ""; # ::/60
|
||||||
|
lan_p6 = "${pd_from_wan}9"; # ::/64
|
||||||
|
lan10_p6 = "${pd_from_wan}a"; # ::/64
|
||||||
|
lan20_p6 = "${pd_from_wan}2"; # ::/64
|
||||||
|
|
||||||
|
ula_p = "fdab:07d3:581d"; # ::/48
|
||||||
|
ula_p_lan = "${ula_p}:0000"; # ::/56
|
||||||
|
ula_p_lan10 = "${ula_p}:1000"; # ::/56
|
||||||
|
ula_p_lan20 = "${ula_p}:2000"; # ::/56
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
imports =
|
imports =
|
||||||
[ # Include the results of the hardware scan.
|
[ # Include the results of the hardware scan.
|
||||||
./hardware-configuration.nix
|
./hardware-configuration.nix
|
||||||
];
|
];
|
||||||
mods.kb-input.enable = false;
|
|
||||||
boot.growPartition = true;
|
|
||||||
|
|
||||||
# Bootloader.
|
# Bootloader.
|
||||||
boot.loader.systemd-boot.enable = true;
|
boot.loader.systemd-boot.enable = true;
|
||||||
boot.loader.efi.canTouchEfiVariables = true;
|
boot.loader.efi.canTouchEfiVariables = false;
|
||||||
boot.plymouth.enable = true;
|
|
||||||
boot.plymouth.theme = "breeze";
|
|
||||||
boot.kernelParams = [
|
boot.kernelParams = [
|
||||||
"sysrq_always_enabled=1"
|
"sysrq_always_enabled=1"
|
||||||
];
|
];
|
||||||
|
|
||||||
boot.loader.systemd-boot.configurationLimit = 5;
|
boot.loader.systemd-boot.configurationLimit = 5;
|
||||||
boot.kernelPackages = pkgs.linuxKernel.packages.linux_6_12;
|
boot.kernelPackages = pkgs.linuxKernel.packages.linux_6_12;
|
||||||
boot.extraModulePackages = with config.boot.kernelPackages; [ zfs ];
|
boot.growPartition = true;
|
||||||
|
|
||||||
environment.etc.hosts.mode = "0644";
|
environment.etc.hosts.mode = "0644";
|
||||||
|
networking.hostName = "grouter";
|
||||||
|
|
||||||
# managed by cloud-init
|
# It is impossible to do multiple prefix requests with networkd,
|
||||||
# networking.hostName = "nixos"; # Define your hostname.
|
# so I use dhcpcd for this
|
||||||
# networking.wireless.enable = true; # Enables wireless support via wpa_supplicant.
|
|
||||||
|
|
||||||
# Configure network proxy if necessary
|
|
||||||
# networking.proxy.default = "http://user:password@proxy:port/";
|
|
||||||
# networking.proxy.noProxy = "127.0.0.1,localhost,internal.domain";
|
|
||||||
|
|
||||||
# Enable networking
|
|
||||||
# networking.networkmanager.enable = true;
|
|
||||||
|
|
||||||
# It is impossible to do multiple prefix requests with networkd
|
|
||||||
# https://github.com/systemd/systemd/issues/22571
|
# https://github.com/systemd/systemd/issues/22571
|
||||||
networking.dhcpcd.enable = true;
|
networking.dhcpcd.enable = true;
|
||||||
# https://github.com/systemd/systemd/issues/22571#issuecomment-2094905496
|
# https://github.com/systemd/systemd/issues/22571#issuecomment-2094905496
|
||||||
# https://gist.github.com/csamsel/0f8cca3b2e64d7e4cc47819ec5ba9396
|
# https://gist.github.com/csamsel/0f8cca3b2e64d7e4cc47819ec5ba9396
|
||||||
networking.dhcpcd.extraConfig = ''
|
networking.dhcpcd.extraConfig = ''
|
||||||
duid
|
duid
|
||||||
nodelay
|
|
||||||
ipv6only
|
ipv6only
|
||||||
# noarp
|
|
||||||
# nodhcp
|
|
||||||
nodhcp6
|
nodhcp6
|
||||||
# noipv4
|
|
||||||
# noipv4ll
|
|
||||||
noipv6rs
|
noipv6rs
|
||||||
|
|
||||||
nohook resolv.conf, yp, hostname, ntp
|
nohook resolv.conf, yp, hostname, ntp
|
||||||
|
|
||||||
option rapid_commit
|
option rapid_commit
|
||||||
|
|
||||||
interface wan
|
interface ${if_wan}
|
||||||
ipv6rs
|
ipv6rs
|
||||||
# ipv6ra_noautoconf
|
|
||||||
dhcp6
|
dhcp6
|
||||||
|
|
||||||
# iaid 1
|
# this doesn't play well with networkd
|
||||||
# ia_na 0
|
# ia_na
|
||||||
ia_na
|
# ia_pd 1 ${if_lan}/0
|
||||||
ia_pd 1 lan/0
|
# ia_pd 2 ${if_lan10}/0
|
||||||
ia_pd 2 lan.10/0
|
# ia_pd 3 ${if_lan20}/0
|
||||||
ia_pd 3 lan.20/0
|
|
||||||
|
# request the leases just for routing (so that the att box knows we're here)
|
||||||
|
# actual ip assignments are static, based on $pd_from_wan
|
||||||
|
ia_pd 1 -
|
||||||
|
ia_pd 2 -
|
||||||
|
# ia_pd 3 -
|
||||||
|
# ia_pd 4 -
|
||||||
|
# ia_pd 5 -
|
||||||
|
# ia_pd 6 -
|
||||||
|
# ia_pd 7 -
|
||||||
|
# ia_pd 8 -
|
||||||
'';
|
'';
|
||||||
|
|
||||||
networking.useNetworkd = true;
|
networking.useNetworkd = true;
|
||||||
systemd.network.enable = true;
|
systemd.network.enable = true;
|
||||||
systemd.network = {
|
systemd.network = {
|
||||||
|
# Global options
|
||||||
|
config.networkConfig = {
|
||||||
|
IPv4Forwarding = true;
|
||||||
|
IPv6Forwarding = true;
|
||||||
|
};
|
||||||
|
|
||||||
# This is applied by udev, not networkd
|
# This is applied by udev, not networkd
|
||||||
# https://nixos.wiki/wiki/Systemd-networkd
|
# https://nixos.wiki/wiki/Systemd-networkd
|
||||||
# https://nixos.org/manual/nixos/stable/#sec-rename-ifs
|
# https://nixos.org/manual/nixos/stable/#sec-rename-ifs
|
||||||
links = {
|
links = {
|
||||||
"10-wan" = {
|
"10-wan" = {
|
||||||
# matchConfig.Name = "enp6s18";
|
|
||||||
matchConfig.PermanentMACAddress = "bc:24:11:4f:c9:c4";
|
matchConfig.PermanentMACAddress = "bc:24:11:4f:c9:c4";
|
||||||
linkConfig.Name = "wan";
|
linkConfig.Name = if_wan;
|
||||||
};
|
};
|
||||||
"10-lan" = {
|
"10-lan" = {
|
||||||
# matchConfig.Name = "enp6s18";
|
|
||||||
matchConfig.PermanentMACAddress = "bc:24:11:83:d8:de";
|
matchConfig.PermanentMACAddress = "bc:24:11:83:d8:de";
|
||||||
linkConfig.Name = "lan";
|
linkConfig.Name = if_lan;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -97,14 +102,14 @@ in
|
|||||||
"10-vlan10" = {
|
"10-vlan10" = {
|
||||||
netdevConfig = {
|
netdevConfig = {
|
||||||
Kind = "vlan";
|
Kind = "vlan";
|
||||||
Name = "lan.10";
|
Name = if_lan10;
|
||||||
};
|
};
|
||||||
vlanConfig.Id = 10;
|
vlanConfig.Id = 10;
|
||||||
};
|
};
|
||||||
"10-vlan20" = {
|
"10-vlan20" = {
|
||||||
netdevConfig = {
|
netdevConfig = {
|
||||||
Kind = "vlan";
|
Kind = "vlan";
|
||||||
Name = "lan.20";
|
Name = if_lan20;
|
||||||
};
|
};
|
||||||
vlanConfig.Id = 20;
|
vlanConfig.Id = 20;
|
||||||
};
|
};
|
||||||
@ -112,62 +117,169 @@ in
|
|||||||
|
|
||||||
networks = {
|
networks = {
|
||||||
"10-wan" = {
|
"10-wan" = {
|
||||||
matchConfig.Name = "wan";
|
matchConfig.Name = if_wan;
|
||||||
networkConfig = {
|
networkConfig = {
|
||||||
# start a DHCP Client for IPv4 Addressing/Routing
|
# start a DHCP Client for IPv4 Addressing/Routing
|
||||||
DHCP = "ipv4";
|
DHCP = "ipv4";
|
||||||
# accept Router Advertisements for Stateless IPv6 Autoconfiguraton (SLAAC)
|
# accept Router Advertisements for Stateless IPv6 Autoconfiguraton (SLAAC)
|
||||||
# let dhcpcd manage this
|
# let dhcpcd handle this
|
||||||
IPv6AcceptRA = false;
|
IPv6AcceptRA = false;
|
||||||
};
|
};
|
||||||
# make routing on this interface a dependency for network-online.target
|
# make routing on this interface a dependency for network-online.target
|
||||||
linkConfig.RequiredForOnline = "routable";
|
linkConfig.RequiredForOnline = "routable";
|
||||||
|
|
||||||
};
|
};
|
||||||
"20-lan" = {
|
"20-lan" = {
|
||||||
matchConfig.Name = "lan";
|
matchConfig.Name = "lan";
|
||||||
vlan = [
|
vlan = [
|
||||||
"lan.10"
|
if_lan10
|
||||||
"lan.20"
|
if_lan20
|
||||||
];
|
];
|
||||||
networkConfig = {
|
networkConfig = {
|
||||||
|
IPv4Forwarding = true;
|
||||||
IPv6SendRA = true;
|
IPv6SendRA = true;
|
||||||
Address = [ "10.19.1.1/24" ];
|
Address = [ "${lan_p4}.1/24" ];
|
||||||
# IPMasquerade = "ipv4";
|
};
|
||||||
IPMasquerade = "both";
|
ipv6Prefixes = [
|
||||||
# DHCPServer = true;
|
{
|
||||||
# DHCPPrefixDelegation = true;
|
# AddressAutoconfiguration = false;
|
||||||
|
Prefix = "${lan_p6}::/64";
|
||||||
|
Assign = true;
|
||||||
|
Token = [ "static:::1" "eui64" ];
|
||||||
|
}
|
||||||
|
{
|
||||||
|
Prefix = "${ula_p_lan}::/64";
|
||||||
|
Assign = true;
|
||||||
|
Token = [ "static:::1" "eui64" ];
|
||||||
|
}
|
||||||
|
];
|
||||||
|
ipv6SendRAConfig = {
|
||||||
|
Managed = true;
|
||||||
|
OtherInformation = true;
|
||||||
|
EmitDNS = true;
|
||||||
|
DNS = [ "2606:4700:4700::1111" ];
|
||||||
};
|
};
|
||||||
# dhcpServerConfig = {
|
|
||||||
# PoolOffset = 100;
|
|
||||||
# PoolSize = 100;
|
|
||||||
# };
|
|
||||||
# dhcpPrefixDelegationConfig = {
|
|
||||||
# UplinkInterface = "enp6s18";
|
|
||||||
# SubnetId = 0;
|
|
||||||
# Token = "static:::1";
|
|
||||||
# };
|
|
||||||
};
|
};
|
||||||
"30-vlan10" = {
|
"30-vlan10" = {
|
||||||
matchConfig.Name = "lan.10";
|
matchConfig.Name = if_lan10;
|
||||||
networkConfig = {
|
networkConfig = {
|
||||||
IPv6SendRA = true;
|
IPv6SendRA = true;
|
||||||
|
Address = [
|
||||||
|
"${lan10_p4}.1/24"
|
||||||
|
"${lan10_p6}::1/64"
|
||||||
|
];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
"30-vlan20" = {
|
"30-vlan20" = {
|
||||||
matchConfig.Name = "lan.20";
|
matchConfig.Name = if_lan20;
|
||||||
networkConfig = {
|
networkConfig = {
|
||||||
IPv6SendRA = true;
|
IPv6SendRA = true;
|
||||||
|
Address = [
|
||||||
|
"${lan20_p4}.1/24"
|
||||||
|
"${lan20_p6}::1/64"
|
||||||
|
];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
networking.firewall.enable = false;
|
||||||
|
networking.nftables.enable = true;
|
||||||
|
networking.nftables.tables.firewall = {
|
||||||
|
family = "inet";
|
||||||
|
content = ''
|
||||||
|
define WAN_IF = "${if_wan}"
|
||||||
|
define LAN_IF = "${if_lan}"
|
||||||
|
define LAN_IPV4_SUBNET = ${lan_p4}.0/24
|
||||||
|
define LAN_IPV6_SUBNET = ${lan_p6}::/64
|
||||||
|
define LAN_IPV4_HOST = ${lan_p4}.100
|
||||||
|
define LAN_IPV6_HOST = ${lan_p6}::1:1000
|
||||||
|
|
||||||
|
define ALLOWED_TCP_PORTS = { ssh, 19999 }
|
||||||
|
define ALLOWED_UDP_PORTS = { 53 }
|
||||||
|
|
||||||
|
chain input {
|
||||||
|
type filter hook input priority filter; policy drop;
|
||||||
|
# type filter hook input priority filter; policy accept;
|
||||||
|
|
||||||
|
# Allow established and related connections
|
||||||
|
ct state established,related accept
|
||||||
|
|
||||||
|
# Allow all traffic from loopback interface
|
||||||
|
iifname lo accept
|
||||||
|
|
||||||
|
# Allow ICMPv6 on link local addrs
|
||||||
|
ip6 nexthdr icmpv6 ip6 saddr fe80::/10 accept
|
||||||
|
ip6 nexthdr icmpv6 ip6 daddr fe80::/10 accept # TODO: not sure if necessary
|
||||||
|
|
||||||
|
# Allow all ICMPv6 from LAN
|
||||||
|
iifname $LAN_IF ip6 saddr $LAN_IPV6_SUBNET ip6 nexthdr icmpv6 accept
|
||||||
|
# Allow DHCPv6 client traffic
|
||||||
|
ip6 daddr { fe80::/10, ff02::/16 } udp dport dhcpv6-server accept
|
||||||
|
|
||||||
|
# Allow all ICMP from LAN
|
||||||
|
iifname $LAN_IF ip saddr $LAN_IPV4_SUBNET ip protocol icmp accept
|
||||||
|
|
||||||
|
# Allow specific services from LAN
|
||||||
|
iifname $LAN_IF ip saddr $LAN_IPV4_SUBNET tcp dport $ALLOWED_TCP_PORTS accept
|
||||||
|
iifname $LAN_IF ip6 saddr $LAN_IPV6_SUBNET tcp dport $ALLOWED_TCP_PORTS accept
|
||||||
|
iifname $LAN_IF ip saddr $LAN_IPV4_SUBNET udp dport $ALLOWED_UDP_PORTS accept
|
||||||
|
iifname $LAN_IF ip6 saddr $LAN_IPV6_SUBNET udp dport $ALLOWED_UDP_PORTS accept
|
||||||
|
|
||||||
|
# Allow SSH from WAN (if needed)
|
||||||
|
iifname $WAN_IF tcp dport ssh accept
|
||||||
|
}
|
||||||
|
|
||||||
|
chain forward {
|
||||||
|
type filter hook forward priority filter; policy drop;
|
||||||
|
# type filter hook forward priority filter; policy accept;
|
||||||
|
|
||||||
|
# Allow established and related connections
|
||||||
|
ct state established,related accept
|
||||||
|
|
||||||
|
# Port forwarding
|
||||||
|
iifname $WAN_IF tcp dport https ip daddr $LAN_IPV4_HOST accept
|
||||||
|
|
||||||
|
# Allowed IPv6 ports
|
||||||
|
iifname $WAN_IF tcp dport https ip6 daddr $LAN_IPV6_HOST accept
|
||||||
|
|
||||||
|
# Allow traffic from LAN to WAN
|
||||||
|
iifname $LAN_IF ip saddr $LAN_IPV4_SUBNET oifname $WAN_IF accept
|
||||||
|
iifname $LAN_IF ip6 saddr $LAN_IPV6_SUBNET oifname $WAN_IF accept
|
||||||
|
}
|
||||||
|
|
||||||
|
chain output {
|
||||||
|
# Accept anything out of self by default
|
||||||
|
type filter hook output priority filter; policy accept;
|
||||||
|
}
|
||||||
|
|
||||||
|
chain prerouting {
|
||||||
|
# Initial step, accept by default
|
||||||
|
type nat hook prerouting priority dstnat; policy accept;
|
||||||
|
|
||||||
|
# Port forwarding
|
||||||
|
iifname $WAN_IF tcp dport https dnat ip to $LAN_IPV4_HOST
|
||||||
|
}
|
||||||
|
|
||||||
|
chain postrouting {
|
||||||
|
# Last step, accept by default
|
||||||
|
type nat hook postrouting priority srcnat; policy accept;
|
||||||
|
|
||||||
|
# Masquerade LAN addrs
|
||||||
|
# theoretically shouldn't need to check the input interface here,
|
||||||
|
# as it would be filtered by the forwarding rules
|
||||||
|
oifname $WAN_IF ip saddr $LAN_IPV4_SUBNET masquerade
|
||||||
|
|
||||||
|
# Optional IPv6 masquerading (big L if enabled)
|
||||||
|
# oifname $WAN_IF ip6 saddr $LAN_IPV6_SUBNET masquerade
|
||||||
|
}
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
services.kea.dhcp4.enable = true;
|
services.kea.dhcp4.enable = true;
|
||||||
services.kea.dhcp4.settings = {
|
services.kea.dhcp4.settings = {
|
||||||
interfaces-config = {
|
interfaces-config = {
|
||||||
interfaces = [
|
interfaces = [
|
||||||
"lan"
|
if_lan
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
lease-database = {
|
lease-database = {
|
||||||
@ -177,12 +289,12 @@ in
|
|||||||
subnet4 = [
|
subnet4 = [
|
||||||
{
|
{
|
||||||
id = 1;
|
id = 1;
|
||||||
subnet = "10.19.1.0/24";
|
subnet = "${lan_p4}.0/24";
|
||||||
pools = [ { pool = "10.19.1.100 - 10.19.1.199"; } ];
|
pools = [ { pool = "${lan_p4}.100 - ${lan_p4}.199"; } ];
|
||||||
option-data = [
|
option-data = [
|
||||||
{
|
{
|
||||||
name = "routers";
|
name = "routers";
|
||||||
data = "10.19.1.1";
|
data = "${lan_p4}.1";
|
||||||
}
|
}
|
||||||
{
|
{
|
||||||
name = "domain-name-servers";
|
name = "domain-name-servers";
|
||||||
@ -197,7 +309,7 @@ in
|
|||||||
services.kea.dhcp6.settings = {
|
services.kea.dhcp6.settings = {
|
||||||
interfaces-config = {
|
interfaces-config = {
|
||||||
interfaces = [
|
interfaces = [
|
||||||
"lan"
|
if_lan
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
lease-database = {
|
lease-database = {
|
||||||
@ -207,9 +319,15 @@ in
|
|||||||
subnet6 = [
|
subnet6 = [
|
||||||
{
|
{
|
||||||
id = 1;
|
id = 1;
|
||||||
subnet = "${lan_ip6}/64";
|
interface = if_lan;
|
||||||
pools = [ { pool = "${lan_ip6}1:1000/116"; } ];
|
subnet = "${lan_p6}::/64";
|
||||||
|
rapid-commit = true;
|
||||||
|
pools = [ { pool = "${lan_p6}::1:1000/116"; } ];
|
||||||
option-data = [
|
option-data = [
|
||||||
|
{
|
||||||
|
name = "dns-servers";
|
||||||
|
data = "2606:4700:4700::1111";
|
||||||
|
}
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
@ -222,14 +340,14 @@ in
|
|||||||
services.xserver.enable = false;
|
services.xserver.enable = false;
|
||||||
|
|
||||||
# Enable the KDE Plasma Desktop Environment.
|
# Enable the KDE Plasma Desktop Environment.
|
||||||
services.displayManager.sddm.enable = true;
|
# Useful for debugging with wireshark.
|
||||||
|
services.displayManager.sddm.enable = false;
|
||||||
services.displayManager.sddm.wayland.enable = true;
|
services.displayManager.sddm.wayland.enable = true;
|
||||||
services.desktopManager.plasma6.enable = true;
|
services.desktopManager.plasma6.enable = true;
|
||||||
services.flatpak.enable = true;
|
# No need for audio in VM
|
||||||
|
services.pipewire.enable = false;
|
||||||
|
|
||||||
# VM services
|
# VM services
|
||||||
services.cloud-init.enable = true;
|
|
||||||
# services.cloud-init.network.enable = false;
|
|
||||||
services.qemuGuest.enable = true;
|
services.qemuGuest.enable = true;
|
||||||
services.spice-vdagentd.enable = true;
|
services.spice-vdagentd.enable = true;
|
||||||
services.openssh.enable = true;
|
services.openssh.enable = true;
|
||||||
@ -256,54 +374,35 @@ in
|
|||||||
extraGroups = [ "wheel" "docker" "wireshark" ];
|
extraGroups = [ "wheel" "docker" "wireshark" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
# Install firefox.
|
|
||||||
programs.firefox.enable = true;
|
programs.firefox.enable = true;
|
||||||
programs.fish.enable = true;
|
programs.fish.enable = true;
|
||||||
programs.git.enable = true;
|
programs.git.enable = true;
|
||||||
programs.neovim.enable = true;
|
programs.neovim.enable = true;
|
||||||
|
|
||||||
programs.bat.enable = true;
|
programs.bat.enable = true;
|
||||||
programs.htop.enable = true;
|
programs.htop.enable = true;
|
||||||
programs.wireshark.enable = true;
|
programs.wireshark.enable = true;
|
||||||
|
programs.wireshark.package = pkgs.wireshark; # wireshark-cli by default
|
||||||
# List packages installed in system profile. To search, run:
|
|
||||||
# $ nix search wget
|
|
||||||
|
|
||||||
# https://github.com/flatpak/flatpak/issues/2861
|
|
||||||
xdg.portal.extraPortals = [ pkgs.xdg-desktop-portal-gtk ];
|
|
||||||
|
|
||||||
# workarounds.flatpak.enable = true;
|
|
||||||
fonts.packages = with pkgs; [
|
|
||||||
noto-fonts-cjk-sans
|
|
||||||
noto-fonts-cjk-serif
|
|
||||||
fantasque-sans-mono
|
|
||||||
nerd-fonts.fantasque-sans-mono
|
|
||||||
jetbrains-mono
|
|
||||||
];
|
|
||||||
|
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
dust
|
dust
|
||||||
eza
|
eza
|
||||||
fastfetch
|
fastfetch
|
||||||
fd
|
fd
|
||||||
host-spawn # for flatpaks
|
|
||||||
kdePackages.flatpak-kcm
|
|
||||||
kdePackages.filelight
|
kdePackages.filelight
|
||||||
kdePackages.kate
|
kdePackages.kate
|
||||||
kdePackages.yakuake
|
kdePackages.yakuake
|
||||||
ldns
|
ldns
|
||||||
|
lsof
|
||||||
micro
|
micro
|
||||||
mpv
|
mpv
|
||||||
ripgrep
|
ripgrep
|
||||||
|
rustscan
|
||||||
starship
|
starship
|
||||||
tealdeer
|
tealdeer
|
||||||
waypipe
|
waypipe
|
||||||
whois
|
whois
|
||||||
zfs
|
|
||||||
];
|
];
|
||||||
|
|
||||||
# networking.firewall.enable = false;
|
|
||||||
|
|
||||||
# This value determines the NixOS release from which the default
|
# This value determines the NixOS release from which the default
|
||||||
# settings for stateful data, like file locations and database versions
|
# settings for stateful data, like file locations and database versions
|
||||||
# on your system were taken. It‘s perfectly fine and recommended to leave
|
# on your system were taken. It‘s perfectly fine and recommended to leave
|
||||||
|
Loading…
x
Reference in New Issue
Block a user