Compare commits
13 Commits
2016-08-14
...
2016-08-16
| Author | SHA1 | Date | |
|---|---|---|---|
| 6c45e0bfa2 | |||
| c2d3bb8cb4 | |||
| d5c79218fa | |||
| e7ef51ecbe | |||
| 6c02c2200c | |||
| c8592c769e | |||
| 7b298ac8a3 | |||
| 9190d21a65 | |||
|
|
b4c960d3d3 | ||
| 516976ccf9 | |||
| 634af07219 | |||
| 91d414d3e1 | |||
| ca0171b70e |
@@ -13,6 +13,14 @@ in
|
||||
mkIf cfg.fail2ban {
|
||||
|
||||
# Gestion de fail2ban
|
||||
|
||||
# Paquets
|
||||
environment.systemPackages = with pkgs; [
|
||||
mailutils
|
||||
whois
|
||||
];
|
||||
|
||||
|
||||
# Services
|
||||
services = {
|
||||
fail2ban = {
|
||||
@@ -30,13 +38,27 @@ mkIf cfg.fail2ban {
|
||||
maxretry = 3
|
||||
|
||||
destemail = ${destemail}
|
||||
|
||||
# https://github.com/Baughn/nixpkgs/blob/master/nixos/modules/services/security/fail2ban.nix
|
||||
findtime = 600
|
||||
maxretry = 3
|
||||
backend = systemd
|
||||
enabled = true
|
||||
'';
|
||||
ssh-route = ''
|
||||
filter = sshd
|
||||
action = route[blocktype=blackhole]
|
||||
maxretry = 3
|
||||
'';
|
||||
# désactivation car souci de PATH avec les commandes mail ou sendmail. Nécessite un path motifiable
|
||||
# ticket à ouvrir
|
||||
#ssh-mail = ''
|
||||
# filter = sshd
|
||||
# action = sendmail[sendername=Fail2ban @${config.networking.hostName}]
|
||||
#'';
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
# https://github.com/NixOS/nixpkgs/issues/8437
|
||||
services.fail2ban.jails.ssh-iptables = "enabled = true";
|
||||
}
|
||||
|
||||
File diff suppressed because one or more lines are too long
@@ -7,7 +7,7 @@ let
|
||||
profiles = config.r6d.profiles;
|
||||
in
|
||||
|
||||
mkIf profiles.isDesktop {
|
||||
mkIf true {
|
||||
|
||||
# Paquets
|
||||
environment.systemPackages = with pkgs; [
|
||||
@@ -23,9 +23,6 @@ mkIf profiles.isDesktop {
|
||||
python27Packages.glances
|
||||
usbutils
|
||||
|
||||
# DNS
|
||||
unbound
|
||||
|
||||
# Compression
|
||||
lz4
|
||||
lzop
|
||||
@@ -37,14 +34,18 @@ mkIf profiles.isDesktop {
|
||||
sshfsFuse # ssh
|
||||
|
||||
## Gestion de FS
|
||||
gparted
|
||||
nfs-utils
|
||||
|
||||
## Exploitation FS
|
||||
inotify-tools # être notifié lorsque le contenu d'un répertoire change
|
||||
rdfind # recherche de fichiers doublons pour remplacement par hard/soft link
|
||||
|
||||
#
|
||||
unetbootin # création de clefs USB bootables
|
||||
(mkIf profiles.isDesktop
|
||||
## Gestion de FS
|
||||
gparted # Gestion graphique de partitions
|
||||
)
|
||||
(mkIf profiles.isDesktop
|
||||
unetbootin # création de clefs USB bootables
|
||||
)
|
||||
#
|
||||
];
|
||||
}
|
||||
|
||||
@@ -13,6 +13,7 @@ in
|
||||
./environment.nix
|
||||
./localisation.nix
|
||||
#./network-ipv6.nix
|
||||
./sudo.nix
|
||||
./service-haveged.nix
|
||||
./service-monitoring.nix
|
||||
./service-ssh.nix
|
||||
|
||||
@@ -9,6 +9,11 @@ in
|
||||
|
||||
mkIf true {
|
||||
|
||||
# Paquets
|
||||
environment.systemPackages = with pkgs; [
|
||||
mailutils
|
||||
];
|
||||
|
||||
# Services
|
||||
|
||||
## Noeud de supervision munin = pas de stockage des données locales
|
||||
|
||||
17
public/sudo.nix
Normal file
17
public/sudo.nix
Normal file
@@ -0,0 +1,17 @@
|
||||
{ config, lib, pkgs, ... }:
|
||||
|
||||
let
|
||||
inherit (lib) mkIf mkMerge mkThenElse;
|
||||
cfg = config.r6d.config-generator;
|
||||
computers = config.r6d.computers;
|
||||
profiles = config.r6d.profiles;
|
||||
in
|
||||
|
||||
mkIf true {
|
||||
|
||||
# Authorisation de certaines applications par sudo sans mot de passe
|
||||
|
||||
security.sudo.extraConfig = ''
|
||||
%users ALL = NOPASSWD: ${pkgs.mtr}/bin/mtr
|
||||
'';
|
||||
}
|
||||
Reference in New Issue
Block a user