2024-01-02 19:03:24 -08:00
|
|
|
{ config, pkgs, ...}:
|
2024-01-02 17:52:56 -08:00
|
|
|
|
|
|
|
let
|
|
|
|
in
|
|
|
|
{
|
2024-01-02 19:03:24 -08:00
|
|
|
networking.firewall = {
|
|
|
|
allowedUDPPorts = [
|
|
|
|
53
|
|
|
|
config.services.protonvpn.interface.port
|
|
|
|
];
|
|
|
|
allowedTCPPorts = [
|
|
|
|
53
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
|
|
|
networking.wg-quick.interfaces."protonvpn" = {
|
2024-01-02 17:52:56 -08:00
|
|
|
autostart = false;
|
2024-01-02 19:03:24 -08:00
|
|
|
#dns = [ 10.2.0.1 ];
|
|
|
|
privateKeyFile = "/home/nixolas/.passfiles/protonvpn";
|
|
|
|
address = [ "10.2.0.2/32" ];
|
|
|
|
listenPort = 51820;
|
|
|
|
|
|
|
|
peers = [
|
|
|
|
{
|
|
|
|
publicKey = "yB6ySO0kjqbgVWanDYKDgWoAMwM3X//nBiKXwaqmiwU=";
|
|
|
|
allowedIPs = [ "0.0.0.0/0" "::/0" ];
|
|
|
|
endpoint = "89.187.180.55:51820";
|
|
|
|
}
|
|
|
|
];
|
|
|
|
|
|
|
|
# This allows the wireguard server to route your traffic to the internet and hence be like a VPN
|
|
|
|
postUp = ''
|
|
|
|
# ${pkgs.iptables}/bin/iptables -A FORWARD -i wg0 -j ACCEPT
|
|
|
|
# ${pkgs.iptables}/bin/iptables -t nat -A POSTROUTING -s 10.0.0.1/24 -o eth0 -j MASQUERADE
|
|
|
|
# ${pkgs.iptables}/bin/ip6tables -A FORWARD -i wg0 -j ACCEPT
|
|
|
|
# ${pkgs.iptables}/bin/ip6tables -t nat -A POSTROUTING -s fdc9:281f:04d7:9ee9::1/64 -o eth0 -j MASQUERADE
|
|
|
|
'';
|
|
|
|
|
|
|
|
# Undo the above
|
|
|
|
preDown = ''
|
|
|
|
# ${pkgs.iptables}/bin/iptables -D FORWARD -i wg0 -j ACCEPT
|
|
|
|
# ${pkgs.iptables}/bin/iptables -t nat -D POSTROUTING -s 10.0.0.1/24 -o eth0 -j MASQUERADE
|
|
|
|
# ${pkgs.iptables}/bin/ip6tables -D FORWARD -i wg0 -j ACCEPT
|
|
|
|
# ${pkgs.iptables}/bin/ip6tables -t nat -D POSTROUTING -s fdc9:281f:04d7:9ee9::1/64 -o eth0 -j MASQUERADE
|
|
|
|
'';
|
2024-01-02 17:52:56 -08:00
|
|
|
};
|
|
|
|
|
|
|
|
}
|