2021-02-17 13:09:41 +01:00
|
|
|
# A simple, in-kernel VPN service
|
|
|
|
#
|
|
|
|
# Strongly inspired by [1].
|
|
|
|
# [1]: https://github.com/delroth/infra.delroth.net/blob/master/roles/wireguard-peer.nix
|
|
|
|
{ config, lib, pkgs, ... }:
|
|
|
|
let
|
|
|
|
cfg = config.my.services.wireguard;
|
|
|
|
hostName = config.networking.hostName;
|
|
|
|
|
|
|
|
peers = config.my.secrets.wireguard.peers;
|
|
|
|
thisPeer = peers."${hostName}";
|
|
|
|
otherPeers = lib.filterAttrs (name: _: name != hostName) peers;
|
2021-02-18 01:10:45 +01:00
|
|
|
|
|
|
|
extIface = config.my.networking.externalInterface;
|
2021-02-17 13:09:41 +01:00
|
|
|
in
|
|
|
|
{
|
|
|
|
options.my.services.wireguard = with lib; {
|
|
|
|
enable = mkEnableOption "Wireguard VPN service";
|
|
|
|
|
|
|
|
iface = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = "wg";
|
|
|
|
example = "wg0";
|
|
|
|
description = "Name of the interface to configure";
|
|
|
|
};
|
|
|
|
|
|
|
|
port = mkOption {
|
|
|
|
type = types.port;
|
|
|
|
default = 51820;
|
|
|
|
example = 55555;
|
|
|
|
description = "Port to configure for Wireguard";
|
|
|
|
};
|
|
|
|
|
|
|
|
net = {
|
|
|
|
v4 = {
|
|
|
|
subnet = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = "10.0.0";
|
|
|
|
example = "10.100.0";
|
|
|
|
description = "Which prefix to use for internal IPs";
|
|
|
|
};
|
|
|
|
mask = mkOption {
|
|
|
|
type = types.int;
|
|
|
|
default = 24;
|
|
|
|
example = 28;
|
|
|
|
description = "The CIDR mask to use on internal IPs";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
v6 = {
|
|
|
|
subnet = mkOption {
|
|
|
|
type = types.str;
|
|
|
|
default = "fd42:42:42";
|
|
|
|
example = "fdc9:281f:04d7:9ee9";
|
|
|
|
description = "Which prefix to use for internal IPs";
|
|
|
|
};
|
|
|
|
mask = mkOption {
|
|
|
|
type = types.int;
|
|
|
|
default = 64;
|
|
|
|
example = 68;
|
|
|
|
description = "The CIDR mask to use on internal IPs";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
config.networking = lib.mkIf cfg.enable {
|
2021-02-17 16:31:47 +01:00
|
|
|
wg-quick.interfaces."${cfg.iface}" = {
|
2021-02-17 13:09:41 +01:00
|
|
|
listenPort = cfg.port;
|
2021-02-17 16:31:47 +01:00
|
|
|
address = with cfg.net; with lib; [
|
2021-02-17 13:09:41 +01:00
|
|
|
"${v4.subnet}.${toString thisPeer.clientNum}/${toString v4.mask}"
|
|
|
|
"${v6.subnet}::${toString thisPeer.clientNum}/${toHexString v6.mask}"
|
|
|
|
];
|
|
|
|
# Insecure, I don't care
|
|
|
|
privateKey = thisPeer.privateKey;
|
|
|
|
|
|
|
|
peers = lib.mapAttrsToList
|
|
|
|
(_: peer: {
|
|
|
|
inherit (peer) publicKey;
|
|
|
|
} // lib.optionalAttrs (thisPeer ? externalIp) {
|
|
|
|
# Only forward from server to clients
|
|
|
|
allowedIPs = with cfg.net; [
|
|
|
|
"${v4.subnet}.${toString peer.clientNum}/32"
|
|
|
|
"${v6.subnet}::${toString peer.clientNum}/128"
|
|
|
|
];
|
|
|
|
} // lib.optionalAttrs (peer ? externalIp) {
|
|
|
|
# Known addresses
|
|
|
|
endpoint = "${peer.externalIp}:${toString cfg.port}";
|
|
|
|
} // lib.optionalAttrs (!(thisPeer ? externalIp)) {
|
|
|
|
# Forward all traffic to server
|
|
|
|
allowedIPs = with cfg.net; [
|
|
|
|
"0.0.0.0/0"
|
|
|
|
"::/0"
|
|
|
|
];
|
|
|
|
# Roaming clients need to keep NAT-ing active
|
|
|
|
persistentKeepalive = 10;
|
2021-02-17 16:31:47 +01:00
|
|
|
# Use server DNS
|
2021-02-17 13:09:41 +01:00
|
|
|
})
|
|
|
|
otherPeers;
|
|
|
|
} // lib.optionalAttrs (thisPeer ? externalIp) {
|
|
|
|
# Setup forwarding on server
|
2021-02-17 16:31:47 +01:00
|
|
|
postUp = with cfg.net; ''
|
|
|
|
${pkgs.iptables}/bin/iptables -A FORWARD -i ${cfg.iface} -j ACCEPT
|
2021-02-18 01:10:45 +01:00
|
|
|
${pkgs.iptables}/bin/iptables -t nat -A POSTROUTING -s ${v4.subnet}.1/${toString v4.mask} -o ${extIface} -j MASQUERADE
|
2021-02-17 16:31:47 +01:00
|
|
|
${pkgs.iptables}/bin/ip6tables -A FORWARD -i ${cfg.iface} -j ACCEPT
|
2021-02-18 01:10:45 +01:00
|
|
|
${pkgs.iptables}/bin/ip6tables -t nat -A POSTROUTING -s ${v6.subnet}::1/${toString v6.mask} -o ${extIface} -j MASQUERADE
|
2021-02-17 13:09:41 +01:00
|
|
|
'';
|
2021-02-17 16:31:47 +01:00
|
|
|
preDown = with cfg.net; ''
|
|
|
|
${pkgs.iptables}/bin/iptables -D FORWARD -i ${cfg.iface} -j ACCEPT
|
2021-02-18 01:10:45 +01:00
|
|
|
${pkgs.iptables}/bin/iptables -t nat -D POSTROUTING -s ${v4.subnet}.1/${toString v4.mask} -o ${extIface} -j MASQUERADE
|
2021-02-17 16:31:47 +01:00
|
|
|
${pkgs.iptables}/bin/ip6tables -D FORWARD -i ${cfg.iface} -j ACCEPT
|
2021-02-18 01:10:45 +01:00
|
|
|
${pkgs.iptables}/bin/ip6tables -t nat -D POSTROUTING -s ${v6.subnet}::1/${toString v6.mask} -o ${extIface} -j MASQUERADE
|
2021-02-17 13:09:41 +01:00
|
|
|
'';
|
2021-02-17 16:31:47 +01:00
|
|
|
|
2021-02-17 13:09:41 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
nat = lib.optionalAttrs (thisPeer ? externalIp) {
|
|
|
|
enable = true;
|
2021-02-18 01:10:45 +01:00
|
|
|
externalInterface = extIface;
|
2021-02-17 13:09:41 +01:00
|
|
|
internalInterfaces = [ cfg.iface ];
|
|
|
|
};
|
|
|
|
|
2021-02-17 16:31:47 +01:00
|
|
|
firewall.allowedUDPPorts = [ cfg.port ];
|
2021-02-17 13:09:41 +01:00
|
|
|
};
|
|
|
|
}
|