liminix/examples/l2tp.nix

183 lines
5.4 KiB
Nix
Raw Normal View History

2024-05-11 21:48:06 +00:00
{
config,
pkgs,
lib,
...
}: let
secrets = import ./extneder-secrets.nix;
rsecrets = import ./rotuer-secrets.nix;
2024-06-20 09:15:54 +00:00
# https://support.aa.net.uk/Category:Incoming_L2TP says:
# "Please use the DNS name (l2tp.aa.net.uk) instead of hardcoding an
# IP address; IP addresses can and do change. If you have to use an
# IP, use 194.4.172.12, but do check the DNS for l2tp.aa.net.uk in
# case it changes."
# but (1) we don't want to use the wwan stick's dns as our main
# resolver: it's provided by some mobile ISP and they aren't
# necessarily the best at providing unfettered services without
# deciding to do something weird; (2) it's not simple to arrange
# that xl2tpd gets a different resolver than every other process;
# (3) there's no way to specify an lns address to xl2tpd at runtime
# except by rewriting its config file. So what we will do is lookup
# the lns hostname using the mobile ISP's dns server and then refuse
# to start l2tp unless the expected lns address is one of the
# addresses returned. I think this satisfies "do check the DNS"
lns = { hostname = "l2tp.aaisp.net.uk"; address = "194.4.172.12"; };
inherit (pkgs.liminix.services) oneshot longrun target;
2024-05-11 21:48:06 +00:00
inherit (pkgs.pseudofile) dir symlink;
2024-06-29 21:59:27 +00:00
inherit (pkgs) serviceFns;
2024-05-11 21:48:06 +00:00
svc = config.system.service;
wirelessConfig = {
country_code = "GB";
inherit (rsecrets) wpa_passphrase;
wmm_enabled = 1;
};
2024-05-11 21:48:06 +00:00
in rec {
boot = {
tftp = {
serverip = "10.0.0.1";
ipaddr = "10.0.0.8";
};
};
imports = [
../modules/wwan
2024-05-11 21:48:06 +00:00
../modules/network
# ../modules/vlan
2024-05-11 21:48:06 +00:00
../modules/ssh
../modules/usb.nix
# ../modules/watchdog
# ../modules/mount
2024-05-11 21:48:06 +00:00
../modules/ppp
2024-07-15 21:37:37 +00:00
../modules/round-robin
../modules/profiles/gateway.nix
2024-05-11 21:48:06 +00:00
];
hostname = "thing";
services.wwan = svc.wwan.huawei-e3372.build {
2024-05-15 16:36:16 +00:00
apn = "data.uk";
username = "user";
password = "one2one";
authType = "chap";
};
profile.gateway = {
lan = {
interfaces = with config.hardware.networkInterfaces;
[
# EDIT: these are the interfaces exposed by the gl.inet gl-ar750:
# if your device has more or differently named lan interfaces,
# specify them here
wlan wlan5
lan
];
inherit (rsecrets.lan) prefix;
address = {
family = "inet"; address ="${rsecrets.lan.prefix}.1"; prefixLength = 24;
};
dhcp = {
start = 10;
end = 240;
hosts = { } // lib.optionalAttrs (builtins.pathExists ./static-leases.nix) (import ./static-leases.nix);
localDomain = "lan";
2024-07-15 21:37:37 +00:00
};
};
wan = {
interface = let
pppoe = svc.pppoe.build {
interface = config.hardware.networkInterfaces.wan;
debug = true;
username = rsecrets.l2tp.name;
password = rsecrets.l2tp.password;
};
l2tp =
let
check-address = oneshot rec {
name = "check-lns-address";
up = "grep -Fx ${lns.address} $(output_path ${services.lns-address} addresses)";
dependencies = [ services.lns-address ];
};
route = svc.network.route.build {
via = "$(output ${services.bootstrap-dhcpc} router)";
target = lns.address;
dependencies = [services.bootstrap-dhcpc check-address];
};
in svc.l2tp.build {
lns = lns.address;
ppp-options = [
"debug" "+ipv6" "noauth"
"name" rsecrets.l2tp.name
"password" rsecrets.l2tp.password
];
dependencies = [config.services.lns-address route check-address];
2024-07-15 17:54:04 +00:00
};
in svc.round-robin.build {
name = "wan";
services = [ l2tp pppoe ];
};
dhcp6.enable = true;
2024-07-15 21:37:37 +00:00
};
2024-05-11 21:48:06 +00:00
wireless.networks = {
"${rsecrets.ssid}" = {
interface = config.hardware.networkInterfaces.wlan;
hw_mode = "g";
channel = "6";
ieee80211n = 1;
} // wirelessConfig;
"${rsecrets.ssid}5" = rec {
interface = config.hardware.networkInterfaces.wlan5;
hw_mode = "a";
channel = 36;
ht_capab = "[HT40+]";
vht_oper_chwidth = 1;
vht_oper_centr_freq_seg0_idx = channel + 6;
ieee80211n = 1;
ieee80211ac = 1;
} // wirelessConfig;
2024-05-11 21:48:06 +00:00
};
};
services.bootstrap-dhcpc = svc.network.dhcp.client.build {
interface = config.services.wwan;
dependencies = [ config.services.hostname ];
};
services.sshd = svc.ssh.build { };
2024-06-20 09:15:54 +00:00
services.lns-address = let
ns = "$(output_word ${services.bootstrap-dhcpc} dns 1)";
2024-06-20 09:15:54 +00:00
route-to-bootstrap-nameserver = svc.network.route.build {
via = "$(output ${services.bootstrap-dhcpc} router)";
2024-06-20 09:15:54 +00:00
target = ns;
dependencies = [services.bootstrap-dhcpc];
2024-06-20 09:15:54 +00:00
};
in oneshot rec {
name = "resolve-l2tp-server";
dependencies = [ services.bootstrap-dhcpc route-to-bootstrap-nameserver ];
2024-06-20 09:15:54 +00:00
up = ''
(in_outputs ${name}
DNSCACHEIP="${ns}" ${pkgs.s6-dns}/bin/s6-dnsip4 ${lns.hostname} \
> addresses
)
'';
2024-05-14 11:52:50 +00:00
};
# services.ntp = svc.ntp.build {
# pools = { "pool.ntp.org" = ["iburst"]; };
# makestep = { threshold = 1.0; limit = 3; };
# dependencies = with config.services; [ defaultroute4 defaultroute6 ];
# };
2024-06-20 09:15:54 +00:00
users.root = rsecrets.root;
2024-07-08 18:19:56 +00:00
programs.busybox.options = {
FEATURE_FANCY_TAIL = "y";
};
2024-05-11 21:48:06 +00:00
}