{ config, lib, pkgs, ... }: with lib; let cfg = config.orbekk.router; devices = ["eno1" "eno2"]; mullvadMark = 2; heMark = 1; mullvadPort = config.orbekk.mullvad.listenPort; vpnPort = config.orbekk.vpn.listenPort; router-netns-up = pkgs.writeScript "router-netns-up" '' #!${pkgs.bash}/bin/bash if ip netns list | grep -q router; then echo "Netns setup is not idempotent. Needs restart." exit 0 fi ip netns add router ip netns exec router ip link set lo up ${lib.concatMapStrings (device: '' ip link set ${device} netns router '') devices} ip link add router-vport type veth peer name dragon-vport netns router ip link add vpn-vport type veth peer name dragonvpn-vport netns router ip netns add vpn ip netns exec vpn ip link set lo up ip link set vpn-vport netns vpn ip netns exec router ${pkgs.procps}/bin/sysctl -w net.ipv4.conf.default.forwarding=1 ip netns exec router ${pkgs.procps}/bin/sysctl -w net.ipv4.conf.all.forwarding=1 ip netns exec router ${pkgs.procps}/bin/sysctl -w net.ipv6.conf.default.forwarding=1 ip netns exec router ${pkgs.procps}/bin/sysctl -w net.ipv6.conf.all.forwarding=1 ''; router-netns-down = pkgs.writeScript "router-netns-down" '' #!${pkgs.bash}/bin/bash ''; router-config = { config, lib, pkgs, ... }: { system.stateVersion = "22.05"; environment.systemPackages = with pkgs; [ tcpdump ]; virtualisation.vswitch.enable = true; virtualisation.vswitch.resetOnStart = false; networking.vswitches.kjlan = { interfaces.wan-vport = { vlan = 10; type = "internal"; }; interfaces.lan-vport = { vlan = 100; type = "internal"; }; interfaces.vpnlan-vport = { vlan = 30; type = "internal"; }; interfaces.servers-vport = { vlan = 20; type = "internal"; }; interfaces.admin-vport = { vlan = 255; type = "internal"; }; interfaces.dragon-vport = { vlan = 20; }; interfaces.dragonvpn-vport = { vlan = 30; }; extraOvsctlCmds = '' add-bond kjlan bond0 eno1 eno2 lacp=active set interface wan-vport mac=\"3c:97:0e:19:7e:5c\" ''; }; networking.interfaces.eno1 = {}; networking.interfaces.eno2 = {}; networking.interfaces.wan-vport = { useDHCP = true; }; networking.interfaces.lan-vport = { ipv4.addresses = [{address = "172.20.100.1"; prefixLength = 24;}]; ipv6.addresses = [{address = "2001:470:8e2e:100::1"; prefixLength = 64;}]; }; networking.interfaces.servers-vport = { ipv4.addresses = [{address = "172.20.20.1"; prefixLength = 24;}]; ipv6.addresses = [{address = "2001:470:8e2e:20::1"; prefixLength = 64;}]; }; networking.interfaces.admin-vport = { ipv4.addresses = [{address = "10.10.255.18"; prefixLength = 24;}]; ipv4.routes = [{address = "10.10.255.0"; prefixLength = 24;}]; }; networking.interfaces.vpnlan-vport = { ipv4.addresses = [{address = "172.20.30.1"; prefixLength = 24;}]; ipv6.addresses = [{address = "2001:470:8e2e:30::1"; prefixLength = 64;}]; }; networking.sits.he0 = { dev = "wan-vport"; remote = "209.51.161.14"; }; networking.interfaces.he0.ipv6.addresses = [{ address = "2001:470:1f06:1194::2"; prefixLength = 64; }]; systemd.services.he0-netdev.after = ["kjlan-netdev.service"]; networking.iproute2.enable = true; networking.iproute2.rttablesExtraConfig = '' ${toString mullvadMark} mullvad ${toString heMark} he ''; systemd.services.network-route-setup = { description = "HE tunnel route setup"; requires = [ "network-online.target" ]; after = [ "network.target" "network-online.target" ]; wantedBy = [ "multi-user.target" ]; path = [ pkgs.iproute ]; script = '' ip -6 rule add fwmark ${toString heMark} table he || true ip -6 route replace default dev he0 table he ip -6 route flush cache ip rule add fwmark ${toString mullvadMark} table mullvad || true ip -6 rule add fwmark ${toString mullvadMark} table mullvad || true ip route replace default dev mullvad table mullvad ip -6 route replace default dev mullvad table mullvad ip route flush cache ''; }; services.dnsmasq = { enable = true; servers = [ "1.1.1.1" "8.8.8.8" "8.8.4.4" ]; resolveLocalQueries = false; extraConfig = '' no-resolv no-hosts log-debug dhcp-authoritative enable-ra address=/localhost/::1 address=/localhost/127.0.0.1 dhcp-range=tag:servers-vport,172.20.20.10,172.20.20.254,5m dhcp-option=tag:servers-vport,option:router,172.20.20.1 dhcp-option=tag:servers-vport,option:dns-server,172.20.20.1 dhcp-range=tag:servers-vport,::,static,constructor:servers-vport,5m dhcp-host=id:dragon,tag:servers-vport,172.20.20.2 dhcp-host=id:00:01:00:01:21:a2:4e:a8:d0:bf:9c:45:a6:ec,tag:servers-vport,[::d] # dhcp-host=id:dragon,::d dhcp-range=tag:lan-vport,172.20.100.10,172.20.100.254,5m dhcp-option=tag:lan-vport,option:router,172.20.100.1 dhcp-option=tag:lan-vport,option:dns-server,172.20.100.1 dhcp-range=tag:lan-vport,::2,::1000,constructor:lan-vport,ra-only dhcp-range=tag:vpnlan-vport,172.20.30.10,172.20.30.254,5m dhcp-option=tag:vpnlan-vport,option:router,172.20.30.1 dhcp-option=tag:vpnlan-vport,option:dns-server,193.138.218.74 dhcp-range=tag:vpnlan-vport,::2,::1000,constructor:vpnlan-vport,ra-only,5m dhcp-host=id:00:04:33:32:31:37:37:31:58:4d:32:35:31:37:30:30:4a:44,tag:vpnlan-vport,[::2] dhcp-host=id:vpn,tag:vpnlan-vport,172.20.30.2 ''; }; networking.dhcpcd = { enable = true; extraConfig = '' noipv6rs noipv6 nohook resolv.conf interface wan-vport dhcp ''; }; networking.firewall.enable = false; networking.nftables.enable = true; networking.nftables.ruleset = let ports-to-csv = ports: concatStringsSep "," (map toString ports); in '' define SERVER_WAN_PORTS = { ssh, domain, http, https, ${toString mullvadPort}, ${toString vpnPort} } define SERVER_LAN_PORTS = { tftp, 139, 445, 137, 138, 1080, # socks } table inet filter { chain input { type filter hook input priority 0 iifname lo accept ct state {established, related} counter accept meta l4proto {tcp, udp} th dport {bootps, bootpc, domain, dhcpv6-client, dhcpv6-server} counter accept ip protocol ipv6 counter accept comment "sit tunnel" ip protocol icmp limit rate 4/second counter accept comment "icmp v4" ip6 nexthdr ipv6-icmp counter accept comment "accept all ICMP types" iifname wan-vport counter drop meta nftrace set 1 counter drop } chain output { type filter hook output priority 0 counter accept } chain forward { type filter hook forward priority 0; policy drop ip protocol icmp limit rate 4/second counter accept comment "icmp v4" ip6 nexthdr ipv6-icmp limit rate 4/second counter accept comment "accept all ICMP types" ct state vmap { established : accept, related : accept, invalid : drop } oifname he0 counter accept oifname wan-vport counter accept oifname mullvad counter accept ip daddr 172.20.20.2 th dport {9091, 56732} counter accept; oifname servers-vport meta l4proto {tcp, udp} th dport $SERVER_WAN_PORTS counter accept iifname lan-vport oifname servers-vport meta l4proto {tcp, udp} th dport $SERVER_LAN_PORTS counter accept iifname vpnlan-vport oifname servers-vport meta l4proto {tcp, udp} th dport $SERVER_LAN_PORTS counter accept iifname servers-vport counter accept counter drop } } table inet mangle { chain prerouting { type filter hook prerouting priority -150 # ip6 saddr 2001:470:8e2e::/48 ip6 daddr != 2001:470:8e2e::/48 ip6 daddr != fe80::/64 meta nftrace set 1 ip6 saddr 2001:470:8e2e::/48 ip6 daddr != 2001:470:8e2e::/48 ip6 daddr != fe80::/64 meta mark set ${toString heMark} meta nfproto ipv4 iifname vpnlan-vport ip daddr != 172.20.0.0/16 meta mark set ${toString mullvadMark} meta nfproto ipv6 ip6 daddr != 2001:470:8e2e::/48 ip6 daddr != fe80::/60 iifname vpnlan-vport meta mark set ${toString mullvadMark} } } table inet nat { chain prerouting { type nat hook prerouting priority -100; policy accept meta nfproto ipv4 iifname wan-vport tcp dport 20000 counter dnat to 172.20.100.214 meta nfproto ipv4 iifname wan-vport tcp dport $SERVER_WAN_PORTS counter dnat to 172.20.20.2 meta nfproto ipv4 iifname mullvad tcp dport 56732 counter dnat to 172.20.20.2 } chain postrouting { type nat hook postrouting priority 100; policy accept ip saddr 172.16.0.0/12 oifname {"wan-vport"} counter masquerade ip saddr 172.16.0.0/12 oifname {"mullvad"} counter masquerade # Nat66 on VPN :( meta nfproto ipv6 oifname {"mullvad"} counter masquerade } } ''; }; in { options = { orbekk.router = { enable = mkEnableOption "Enable router config"; }; }; config = mkIf cfg.enable { boot.kernel.sysctl = { "net.ipv4.conf.all.forwarding" = true; "net.ipv4.conf.default.forwarding" = true; "net.ipv6.conf.all.forwarding" = true; "net.ipv6.conf.default.forwarding" = true; }; systemd.services."router-netns" = { description = "router network namespace"; before = ["network.target"]; after = ["network-interfaces.target"]; path = with pkgs; [bash iproute]; serviceConfig = { Type = "oneshot"; RemainAfterExit = "yes"; ExecStart = "${router-netns-up}"; ExecStop = "${router-netns-down}"; }; }; orbekk.mullvad.enable = true; networking.wireguard.interfaces.mullvad.interfaceNamespace = "router"; systemd.services."container@router" = { after = ["router-netns.service"]; requires = ["router-netns.service"]; wantedBy = ["network.target"]; }; systemd.services.dhcpcd.partOf = ["container@router.service"]; containers.router = { autoStart = true; extraFlags = ["--network-namespace-path" "/var/run/netns/router"]; privateNetwork = false; config = router-config; additionalCapabilities = ["CAP_SYS_ADMIN" "CAP_NET_ADMIN"]; }; containers.vpn = { autoStart = true; extraFlags = ["--network-namespace-path" "/var/run/netns/vpn"]; privateNetwork = false; config = { config, lib, pkgs, ... }: { system.stateVersion = "22.11"; networking.firewall.enable = false; networking.interfaces.vpn-vport.useDHCP = true; networking.dhcpcd.extraConfig = '' clientid vpn ''; }; additionalCapabilities = ["CAP_NET_ADMIN"]; }; services.ddclient = { enable = true; configFile = "/opt/secret/he-ddclient.conf"; }; # FIXME: Workaround for ddclient.conf not being available to ddclient. systemd.services.ddclient.serviceConfig.DynamicUser = lib.mkForce false; systemd.timers.update-dynamic-dns = { wantedBy = ["multi-user.target"]; timerConfig = { Persistent = true; OnBootSec = "5m"; OnUnitActiveSec = "5m"; }; }; systemd.services.update-dynamic-dns = { description = "Update dynamic dns records"; after = ["container@router.target"]; path = with pkgs; [ bash dnsutils nettools gawk iproute curl ]; startLimitIntervalSec = 5; script = toString ../tools/update-dns.sh; }; }; }