diff --git a/common/components/networking.nix b/common/components/networking.nix index a6a61ff..8b897b5 100644 --- a/common/components/networking.nix +++ b/common/components/networking.nix @@ -4,14 +4,14 @@ enable = true; # Randomize MAC for every ethernet connetion - ethernet.macAddress = "random"; - connectionConfig = { - # IPv6 Privacy Extensions - "ipv6.ip6-privacy" = 2; + # ethernet.macAddress = "random"; + # connectionConfig = { + # # IPv6 Privacy Extensions + # "ipv6.ip6-privacy" = 2; - # unique DUID per connection - "ipv6.dhcp-duid" = "stable-uuid"; - }; + # # unique DUID per connection + # "ipv6.dhcp-duid" = "stable-uuid"; + # }; }; firewall = { diff --git a/common/services/sshd.nix b/common/services/sshd.nix index 8628779..2081956 100644 --- a/common/services/sshd.nix +++ b/common/services/sshd.nix @@ -78,12 +78,13 @@ ]; # Check whether this is actually doing anything - services.fail2ban = { - enable = true; - ignoreIP = [ - # - ]; - }; + # It is, it even bans legit connections. + # services.fail2ban = { + # enable = true; + # ignoreIP = [ + # # + # ]; + # }; } # ssh R6: StrictHostKeyChecking ask diff --git a/hosts/vulpecula/configuration.nix b/hosts/vulpecula/configuration.nix index b4bf81c..82f03c8 100644 --- a/hosts/vulpecula/configuration.nix +++ b/hosts/vulpecula/configuration.nix @@ -42,7 +42,7 @@ in { users.users.tasia = { isNormalUser = true; description = "Tasia"; - extraGroups = ["networkmanager" "wheel" "dialout"]; + extraGroups = ["networkmanager" "wheel"]; initialPassword = "correcthorsebatterystaple"; openssh.authorizedKeys.keys = [ sshKeys.tasia.yaseen @@ -53,8 +53,8 @@ in { users.users.vulpecula = { isNormalUser = true; - description = "vulpecula"; - extraGroups = ["networkmanager" "wheel" "dialout"]; + description = "test acc"; + extraGroups = ["networkmanager" "wheel"]; initialPassword = "correcthorsebatterystaple"; openssh.authorizedKeys.keys = [ sshKeys.tasia.yubi-primary @@ -62,6 +62,15 @@ in { ]; }; + users.users.dedsec = { + isNormalUser = true; + description = "dedsec"; + extraGroups = ["networkmanager" "wheel"]; + initialPassword = "correcthorsebatterystaple"; + openssh.authorizedKeys.keys = [ + ]; + }; + services.nginx = { enable = true; recommendedProxySettings = true;