nixcfg/hosts/baal/default.nix
2025-08-17 02:08:26 -04:00

72 lines
1.8 KiB
Nix

{ config, lib, pkgs, modulesPath, inputs, ... }:
{
imports = [
./hardware.nix
./secrets.nix
../../common/system.nix
../../common/users.nix
../../common/services.nix
../../host-secrets.nix
];
boot = {
loader = {
systemd-boot.enable = true;
efi = {
canTouchEfiVariables = true;
efiSysMountPoint = "/boot";
};
};
initrd.systemd.enable = true;
};
system.stateVersion = "24.11";
nixpkgs.hostPlatform = lib.mkDefault "aarch64-linux";
systemd.targets.multi-user.enable = true;
networking = {
hostName = "baal";
hostId = "aaaaaaaa";
networkmanager.enable = true;
};
services.fail2ban = {
enable = true;
# Ban IP after 5 failures
maxretry = 5;
ignoreIP = [
"10.0.0.0/8" "172.16.0.0/12" "192.168.0.0/16" "100.64.0.0/10"
];
bantime = "24h"; # Ban IPs for one day on the first ban
bantime-increment = {
enable = true; # Enable increment of bantime after each violation
multipliers = "1 2 4 8 16 32 64";
maxtime = "168h"; # Do not ban for more than 1 week
overalljails = true; # Calculate the bantime based on all the violations
};
jails = {
apache-nohome-iptables.settings = {
# Block an IP address if it accesses a non-existent
# home directory more than 5 times in 10 minutes,
# since that indicates that it's scanning.
filter = "apache-nohome";
action = ''iptables-multiport[name=HTTP, port="http,https"]'';
logpath = "/var/log/httpd/error_log*";
backend = "auto";
findtime = 600;
bantime = 600;
maxretry = 5;
};
};
};
virtualisation.docker = {
enable = true;
enableOnBoot = true;
};
documentation.enable = false;
}