nixcfg/systems/x86_64-linux/sgx/network.nix
Harald Hoyer d3413a581c feat(sgx): add support for port 5355 in firewall configuration
- Allow TCP and UDP traffic on port 5355 for SGX networking.
- This enhances compatibility with multicast DNS resolution (mDNS).
2025-02-22 08:41:56 +01:00

66 lines
1.5 KiB
Nix

{
pkgs,
lib,
config,
...
}:
{
services.resolved.enable = true;
services.resolved.dnssec = "allow-downgrade";
services.resolved.extraConfig = ''
ResolveUnicastSingleLabel=yes
'';
networking.hostName = "sgx"; # Define your hostname.
networking.useDHCP = false;
#networking.domain = "fritz.box";
networking.wireless.enable = false; # Enables wireless support via wpa_supplicant.
networking.networkmanager.enable = false; # use networkd
networking.dhcpcd.enable = false; # use networkd
# services.nscd.enableNsncd = false;
# systemd-networkd
systemd.network.enable = true;
#systemd.network.wait-online.anyInterface = true;
#systemd.services."systemd-networkd".environment.SYSTEMD_LOG_LEVEL = "debug";
systemd.network.networks."10-br0" = {
matchConfig.Name = "br0";
DHCP = "yes";
linkConfig.RequiredForOnline = "routable";
linkConfig.RequiredFamilyForOnline = "both";
};
systemd.network.netdevs."br0" = {
netdevConfig = {
Name = "br0";
Kind = "bridge";
MACAddress = "20:7b:d5:1a:36:3e";
};
};
systemd.network.networks."11-en" = {
linkConfig.RequiredForOnline = "enslaved";
matchConfig.Name = "enp0s20f0u2u1";
networkConfig = {
Bridge = "br0";
};
};
networking.firewall.allowedTCPPorts = [
80
443
5355
8384
22000
config.services.netatalk.port
];
networking.firewall.allowedUDPPorts = [
5355
22000
21027
];
networking.firewall.allowPing = true;
}