summaryrefslogtreecommitdiff
path: root/config/dns.nix
blob: b8986bee63825111b532f10e35c8e45dcd620198 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
# To generate keys:
# dnssec-keygen -K /secret/keys/example.net example.net
{ config, lib, pkgs, ... }:
let
  masterZones = [ "tommvo.com" "orbekk.com" "orbekk.no" ];
  zone-files = pkgs.callPackage ../pkgs/zone-files/default.nix { };
in
{
  networking.firewall = {
    allowedTCPPorts = [ 53 ];
    allowedUDPPorts = [ 53 ];
  };

  services.bind = {
    enable = true;
    forwarders = [
      "1.1.1.1"
      "1.0.0.1"
      "2606:4700:4700::1111"
      "2606:4700:4700::1001"
    ];
    cacheNetworks = [
      "::1/128"
      "127.0.0.0/24"
      "10.0.0.0/8"
    ];
    extraOptions = ''
      serial-update-method unixtime;
      listen-on-v6 { 2001:470:8e2e:20::d; };
    '';
    extraConfig = ''
      ${lib.concatMapStrings (zone: ''
        zone ${zone} {
          type master;
          file "/var/run/named/db.${zone}.zone";
          // auto-dnssec maintain;
          dnssec-policy default;
          // inline-signing yes;
          // sig-validity-interval 21 16;
          key-directory "/opt/secret/bind/${zone}";
          update-policy local;
          allow-query { any; };
          allow-transfer {
            ::1;
            193.35.52.61;               // trygve transfer
            2a00:1b60:1011::6def:e868;  // ns1
            2001:67c:29f4::61;          // ns2
            // 216.218.133.2;              // slave.dns.he.net
            2001:470:600::2;            // slave.dns.he.net
          };
          also-notify {
            193.35.52.61;               // trygve transfer
            2a00:1b60:1011::6def:e868;  // ns1
            2001:67c:29f4::61;          // ns2
            // 216.218.133.2;              // slave.dns.he.net
            2001:470:600::2;            // slave.dns.he.net
          };
          notify-source-v6 2001:470:8e2e:20::d;
          notify explicit;
        };
      '') masterZones}

      include "/opt/secret/bind/dynamic.orbekk.com/update/named.conf.key";
      zone dynamic.orbekk.com {
        type master;
        file "/var/run/named/db.dynamic.orbekk.com.zone";
        // auto-dnssec maintain;
        dnssec-policy default;
        key-directory "/opt/secret/bind/dynamic.orbekk.com";
        allow-query { any; };
        allow-transfer {
          ::1;
          193.35.52.61;               // trygve transfer
          2a00:1b60:1011::6def:e868;  // ns1
          2001:67c:29f4::61;          // ns2
          216.218.133.2;              // slave.dns.he.net
          2001:470:600::2;            // slave.dns.he.net
        };
        also-notify {
          193.35.52.61;               // trygve transfer
          2a00:1b60:1011::6def:e868;  // ns1
          2001:67c:29f4::61;          // ns2
          216.218.133.2;              // slave.dns.he.net
          2001:470:600::2;            // slave.dns.he.net
        };
        notify-source-v6 2001:470:8e2e:20::d;
        notify explicit;
        update-policy {
          grant dynamic.orbekk.com.key zonesub any;
        };
      };
    '';
  };

  systemd.services.bind = {
    preStart = lib.mkAfter ''
      #rm /var/run/named/*.jnl || true
      #rm /var/run/named/*.jbk || true
      echo "Copy zone files"
      for z in ${zone-files}/*; do
        if [[ $z =~ .*dynamic.* && -e "/var/run/named/$(basename $z)" ]]; then
          echo "Skip dynamic zone $z"
          continue
        fi
        echo "Copy zone $z"
        rm /var/run/named/$z.jnl || true
        rm /var/run/named/$z.jbk || true
        cp -f $z /var/run/named/
      done
      echo "Done copying zone files"
    '';
  };
}