Luke Granger-Brown
57725ef3ec
git-subtree-dir: third_party/nixpkgs git-subtree-split: 76612b17c0ce71689921ca12d9ffdc9c23ce40b2
109 lines
2.8 KiB
Nix
109 lines
2.8 KiB
Nix
{
|
|
config,
|
|
lib,
|
|
pkgs,
|
|
...
|
|
}:
|
|
|
|
let
|
|
cfg = config.services.technitium-dns-server;
|
|
stateDir = "/var/lib/technitium-dns-server";
|
|
inherit (lib)
|
|
mkEnableOption
|
|
mkPackageOption
|
|
mkOption
|
|
mkIf
|
|
types
|
|
;
|
|
in
|
|
{
|
|
options.services.technitium-dns-server = {
|
|
enable = mkEnableOption "Technitium DNS Server";
|
|
|
|
package = mkPackageOption pkgs "technitium-dns-server" { };
|
|
|
|
openFirewall = mkOption {
|
|
type = types.bool;
|
|
default = false;
|
|
description = ''
|
|
Whether to open ports in the firewall.
|
|
Standard ports are 53 (UDP and TCP, for DNS), 5380 and 53443 (TCP, HTTP and HTTPS for web interface).
|
|
Specify different or additional ports in options firewallUDPPorts and firewallTCPPorts if necessary.
|
|
'';
|
|
};
|
|
|
|
firewallUDPPorts = mkOption {
|
|
type = with types; listOf int;
|
|
default = [ 53 ];
|
|
description = ''
|
|
List of UDP ports to open in firewall.
|
|
'';
|
|
};
|
|
|
|
firewallTCPPorts = mkOption {
|
|
type = with types; listOf int;
|
|
default = [
|
|
53
|
|
5380 # web interface HTTP
|
|
53443 # web interface HTTPS
|
|
];
|
|
description = ''
|
|
List of TCP ports to open in firewall.
|
|
You might want to open ports 443 and 853 if you intend to use DNS over HTTPS or DNS over TLS.
|
|
'';
|
|
};
|
|
};
|
|
|
|
config = mkIf cfg.enable {
|
|
systemd.services.technitium-dns-server = {
|
|
description = "Technitium DNS Server";
|
|
wantedBy = [ "multi-user.target" ];
|
|
after = [ "network.target" ];
|
|
|
|
serviceConfig = {
|
|
ExecStart = "${cfg.package}/bin/technitium-dns-server ${stateDir}";
|
|
|
|
DynamicUser = true;
|
|
|
|
StateDirectory = "technitium-dns-server";
|
|
WorkingDirectory = stateDir;
|
|
BindPaths = stateDir;
|
|
|
|
Restart = "always";
|
|
RestartSec = 10;
|
|
TimeoutStopSec = 10;
|
|
KillSignal = "SIGINT";
|
|
|
|
# Harden the service
|
|
LockPersonality = true;
|
|
NoNewPrivileges = true;
|
|
PrivateDevices = true;
|
|
PrivateMounts = true;
|
|
PrivateTmp = true;
|
|
ProtectClock = true;
|
|
ProtectControlGroups = true;
|
|
ProtectHome = true;
|
|
ProtectHostname = true;
|
|
ProtectKernelLogs = true;
|
|
ProtectKernelModules = true;
|
|
ProtectKernelTunables = true;
|
|
ProtectSystem = "strict";
|
|
RemoveIPC = true;
|
|
RestrictAddressFamilies = "AF_INET AF_INET6 AF_UNIX AF_NETLINK";
|
|
RestrictNamespaces = true;
|
|
RestrictRealtime = true;
|
|
RestrictSUIDSGID = true;
|
|
|
|
AmbientCapabilities = [ "CAP_NET_BIND_SERVICE" ];
|
|
CapabilityBoundingSet = [ "CAP_NET_BIND_SERVICE" ];
|
|
};
|
|
};
|
|
|
|
networking.firewall = mkIf cfg.openFirewall {
|
|
allowedUDPPorts = cfg.firewallUDPPorts;
|
|
allowedTCPPorts = cfg.firewallTCPPorts;
|
|
};
|
|
};
|
|
|
|
meta.maintainers = with lib.maintainers; [ fabianrig ];
|
|
}
|