lakjsd
This commit is contained in:
@@ -88,7 +88,7 @@ let
|
||||
nord = mk "pbsds.net" "x86_64-linux" input-views.inputs-2505 "24.11" [ ts1 au ];
|
||||
sopp = mk "pbsds.net" "x86_64-linux" input-views.inputs-edge "24.11" [ ts1 au nixld p1005 ];
|
||||
bjarte = mk "pbsds.net" "x86_64-linux" input-views.inputs-edge "24.11" [ ts1 nixld ];
|
||||
bolle = mk "pbsds.net" "x86_64-linux" input-views.inputs-edge "24.11" [ ts2 au ];
|
||||
bolle = mk "pbsds.net" "x86_64-linux" input-views.inputs-edge "24.11" [ ts2 au tse ];
|
||||
eple = mk "pbsds.net" "x86_64-linux" input-views.inputs-2505 "24.11" [ ts1 au tse dns64 ];
|
||||
garp = mk "pbsds.net" "x86_64-linux" input-views.inputs-2505 "24.11" [ ts2 au ];
|
||||
# hasselknippe= mk "pbsds.net" "aarch64-linux" input-views.inputs-2405 "24.05" [ ts1 hw.pine64-pinebook-pro ];
|
||||
|
||||
@@ -12,4 +12,8 @@
|
||||
services.tailscale.useRoutingFeatures = "both";
|
||||
services.tailscale.extraSetFlags = [ "--advertise-exit-node" ];
|
||||
services.tailscale.extraUpFlags = [ "--advertise-exit-node" ];
|
||||
|
||||
# # Strict reverse path filtering breaks Tailscale exit node use and some subnet routing setups
|
||||
# # https://github.com/tailscale/tailscale/issues/4432#issuecomment-1112819111
|
||||
# networking.firewall.checkReversePath = "loose";
|
||||
}
|
||||
|
||||
@@ -17,9 +17,12 @@ lib.mkIf (!config.virtualisation.isVmVariant)
|
||||
services.tailscale.authKeyFile = config.sops.secrets.tailscale-authkey-inner.path; # also enables autoconnect
|
||||
sops.secrets.tailscale-authkey-inner.sopsFile = ../secrets/tailscale-inner.yaml;
|
||||
|
||||
# Strict reverse path filtering breaks Tailscale exit node use and some subnet routing setups
|
||||
# https://github.com/tailscale/tailscale/issues/4432#issuecomment-1112819111
|
||||
networking.firewall.checkReversePath = "loose";
|
||||
# # Strict reverse path filtering breaks Tailscale exit node use and some subnet routing setups
|
||||
# # https://github.com/tailscale/tailscale/issues/4432#issuecomment-1112819111
|
||||
# networking.firewall.checkReversePath = "loose";
|
||||
|
||||
# TODO: why do people do this?
|
||||
# networking.firewall.trustedInterfaces = [ interfaceName ];
|
||||
|
||||
# done in profiles/sshd/ts-only.nix:
|
||||
# networking.firewall.interfaces.${interfaceName} = {
|
||||
|
||||
@@ -17,9 +17,12 @@ lib.mkIf (!config.virtualisation.isVmVariant)
|
||||
services.tailscale.authKeyFile = config.sops.secrets.tailscale-authkey-outer.path; # also enables autoconnect
|
||||
sops.secrets.tailscale-authkey-outer.sopsFile = ../secrets/tailscale-outer.yaml;
|
||||
|
||||
# Strict reverse path filtering breaks Tailscale exit node use and some subnet routing setups
|
||||
# https://github.com/tailscale/tailscale/issues/4432#issuecomment-1112819111
|
||||
networking.firewall.checkReversePath = "loose";
|
||||
# # Strict reverse path filtering breaks Tailscale exit node use and some subnet routing setups
|
||||
# # https://github.com/tailscale/tailscale/issues/4432#issuecomment-1112819111
|
||||
# networking.firewall.checkReversePath = "loose";
|
||||
|
||||
# TODO: why do people do this?
|
||||
# networking.firewall.trustedInterfaces = [ interfaceName ];
|
||||
|
||||
# done in profiles/sshd/ts-only.nix:
|
||||
# networking.firewall.interfaces.${interfaceName} = {
|
||||
|
||||
Reference in New Issue
Block a user