{ config, pkgs, lib, ports, name, secrets, ... }: { # ssh-keyscan eldiron | nix-shell -p ssh-to-age --run ssh-to-age secrets.ageKeys = [ "age1dxr5lhvtnjssfaqpnf6qx80h8gfwkxg3tdf35m6n9wljmk7wadfs3kmahj" ]; boot = { kernelModules = [ "kvm-intel" ]; blacklistedKernelModules = [ "nvidiafb" ]; loader.timeout = 1; loader.grub.devices = [ "/dev/sda" "/dev/sdc" ]; kernel.sysctl = { # https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md "net.ipv4.tcp_sack" = 0; }; supportedFilesystems = [ "zfs" ]; kernelParams = ["zfs.zfs_arc_max=6442450944"]; kernelPackages = config.boot.zfs.package.latestCompatibleLinuxPackages; initrd.availableKernelModules = [ "ahci" "sd_mod" ]; initrd.secrets = { "/boot/pass.key" = "/boot/pass.key"; }; }; services.udev.extraRules = '' ACTION=="add", SUBSYSTEM=="net", ATTR{address}=="c8:60:00:56:a0:88", NAME="eth0" ''; nix.settings.max-jobs = 8; nixpkgs.config.permittedInsecurePackages = [ "python-2.7.18.6" # for nagios-cli "nodejs-16.20.2" # for landing page building ]; nixpkgs.overlays = builtins.attrValues ports.overlays; powerManagement.cpuFreqGovernor = "powersave"; security.acme.certs."${name}".postRun = builtins.concatStringsSep "\n" [ (lib.optionalString config.services.websites.env.production.enable "/run/current-system/sw/bin/machinectl shell httpd-production /usr/bin/env systemctl reload httpd.service") (lib.optionalString config.services.websites.env.integration.enable "/run/current-system/sw/bin/machinectl shell httpd-integration /usr/bin/env systemctl reload httpd.service") ]; fileSystems = { # pools: # zpool: ashift=12 # zfast: ashift=12 # zfs: # zpool/: acltype=posixacl ; xattr=sa ; atime=off ; mountpoint=legacy # zpool/root: encryption=on ; keyformat=passphrase ; keylocation=file:///boot/pass.key # zpool/root/var: atime=on # zfast/: acltype=posixacl ; xattr=sa ; atime=off ; mountpoint=legacy # zfast/root: encryption=on ; keyformat=passphrase ; keylocation=file:///boot/pass.key # zfast/root/etc: ø # zfast/root/nix: ø # zfast/root/tmp: async=disabled # zfast/root/var: atime=on # zfast/root/var/lib: ø # zfast/root/var/lib/mysql: logbias=throughput ; atime=off ; primarycache=metadata # zfast/root/var/lib/postgresql: recordsize=8K ; atime=off ; logbias=throughput # zfast/root/var/lib/postgresql/11.0: ø # zfast/root/var/lib/postgresql/11.0/pg_wal: ø "/" = { fsType = "zfs"; device = "zpool/root"; }; "/boot" = { fsType = "ext4"; device = "/dev/disk/by-uuid/e6bb18fb-ff56-4b5f-ae9f-e60d40dc0622"; }; "/etc" = { fsType = "zfs"; device = "zpool/root/etc"; }; "/nix" = { fsType = "zfs"; device = "zfast/root/nix"; }; "/tmp" = { fsType = "zfs"; device = "zfast/root/tmp"; }; "/var" = { fsType = "zfs"; device = "zpool/root/var"; }; "/var/lib/mysql" = { fsType = "zfs"; device = "zfast/root/var/lib/mysql"; }; "/var/lib/postgresql" = { fsType = "zfs"; device = "zfast/root/var/lib/postgresql"; }; "/var/lib/postgresql/11.0" = { fsType = "zfs"; device = "zfast/root/var/lib/postgresql/11.0"; }; "/var/lib/postgresql/11.0/pg_wal" = { fsType = "zfs"; device = "zfast/root/var/lib/postgresql/11.0/pg_wal"; }; }; swapDevices = [ { label = "swap1"; } { label = "swap2"; } ]; hardware.enableRedistributableFirmware = true; services.zfs = { autoScrub = { enable = false; }; }; networking = { hostId = "8262ca33"; # generated with head -c4 /dev/urandom | od -A none -t x4 firewall.enable = true; firewall.allowedTCPPorts = [ config.myEnv.ports.zrepl_flony ]; # FIXME: on next reboot, remove the /27 and the localCommands interfaces."eth0".ipv4.addresses = pkgs.lib.flatten (pkgs.lib.attrsets.mapAttrsToList (n: ips: map (ip: { address = ip; prefixLength = 32; }) (ips.ip4 or [])) (pkgs.lib.attrsets.filterAttrs (n: v: n != "main") config.hostEnv.ips)) ++ [ { address = lib.head config.hostEnv.ips.main.ip4; prefixLength = 27; } ]; interfaces."eth0".ipv6.addresses = pkgs.lib.flatten (pkgs.lib.attrsets.mapAttrsToList (n: ips: map (ip: { address = ip; prefixLength = (if n == "main" && ip == pkgs.lib.head ips.ip6 then 64 else 128); }) (ips.ip6 or [])) config.hostEnv.ips); defaultGateway = "176.9.151.65"; localCommands = '' # FIXME: Those commands were added by nixops and may not be # actually needed ip -6 addr add '2a01:4f8:160:3445::/64' dev 'eth0' || true ip -4 route change '176.9.151.64/27' via '176.9.151.65' dev 'eth0' || true ip -6 route add default via 'fe80::1' dev eth0 || true ''; nameservers = [ "213.133.98.98" "213.133.99.99" "213.133.100.100" "2a01:4f8:0:a0a1::add:1010" "2a01:4f8:0:a102::add:9999" "2a01:4f8:0:a111::add:9898" ]; }; imports = [ secrets.nixosModules.users-config-eldiron ./databases ./databases/mariadb.nix ./databases/openldap ./databases/postgresql.nix ./databases/redis.nix ./monitoring.nix ./ejabberd ./buildbot ./coturn.nix ./dns.nix ./borg_backup.nix ./duply_backup.nix ./gemini ./gitolite ./mail ./websites ./webstats ./irc.nix ./pub ./tasks ./ftp.nix ./mpd.nix ./vpn ]; services.borgBackup.enable = true; services.borgBackup.profiles.global = { bucket = "global"; hash = false; remotes = [ "attilax" ]; ignoredPaths = [ "udev" "portables" "machines" "nixos" "nixos-containers" ]; }; myServices.buildbot.enable = true; myServices.databases.enable = true; myServices.gitolite.enable = true; myServices.monitoring.enable = true; myServices.irc.enable = true; myServices.pub.enable = true; myServices.tasks.enable = true; myServices.mpd.enable = true; myServices.dns.enable = true; myServices.websites.enable = true; myServices.gemini.enable = true; myServices.mail.enable = true; myServices.ejabberd.enable = true; myServices.vpn.enable = true; myServices.ftp.enable = true; myServices.chatonsProperties.hostings.infogerance = { file.datetime = "2022-08-27T18:50:00"; hosting = { name = "Infogérance"; description = "Administration de serveurs"; website = "https://www.immae.eu/"; logo = "https://assets.immae.eu/logo.jpg"; type = "HOSTEDSERVER"; status.level = "OK"; status.description = "OK"; registration.load = "OPEN"; install.type = "PACKAGE"; }; }; secrets.keys = { "ldap/pam_pgsql" = { user = "root"; group = "root"; permissions = "0400"; text = '' database = immae user = immae_auth_read password = {{ .postgresql.immae_auth_read }} table = ldap_users user_column = login pw_type = function auth_query = SELECT ((mechanism = 'SSHA' AND password = encode(digest( %p || salt, 'sha1'), 'hex')) OR (mechanism = 'PLAIN' AND password = %p)) FROM ldap_users WHERE login = %u OR login || '@' || realm = %u #pwd_query = WITH newsalt as (select gen_random_bytes(4)) UPDATE ldap_users SET password = encode(digest( %p || (SELECT * FROM newsalt), 'sha1'), 'hex'), salt = (SELECT * FROM newsalt), mechanism = 'SSHA' WHERE login = %u OR login || '@' || realm = %u ''; }; "zrepl_backup/identity" = { user = "root"; group = "root"; permissions = "0400"; text = config.myEnv.zrepl_backup.ssh_key.private; }; "zrepl/${name}.key" = { permissions = "0400"; text = config.myEnv.zrepl_backup.certs."${name}".key; user = "root"; group = "root"; }; } // builtins.listToAttrs (map (x: lib.attrsets.nameValuePair "zrepl/certificates/${x}.crt" { permissions = "0400"; text = config.myEnv.zrepl_backup.certs."${x}".certificate; user = "root"; group = "root"; }) (builtins.attrNames config.myEnv.zrepl_backup.certs)); programs.ssh.knownHosts.dilion = { extraHostNames = ["dilion.immae.eu"]; publicKey = config.myEnv.servers.dilion.hostKey; }; services.cron = { enable = true; mailto = "cron@immae.eu"; systemCronJobs = [ '' 0 0 * * * root journalctl -q --since="25 hours ago" -u postfix -t postfix/smtpd -g "immae.eu.*Recipient address rejected" # Need a way to blacklist properly # 0 0 * * * root journalctl -q --since="25 hours ago" -u postfix -t postfix/smtpd -g "NOQUEUE:" 0 0 * * * root journalctl -q --since="25 hours ago" -u postfix -t postfix/smtp -g "status=bounced" '' ]; }; environment.systemPackages = [ pkgs.bindfs ]; environment.etc."mdadm.conf" = { enable = true; mode = "0644"; user = "root"; text = "MAILADDR ${config.myEnv.monitoring.email}"; }; systemd.services.zrepl.path = [ pkgs.openssh ]; services.zrepl = { enable = true; settings = { jobs = [ { type = "push"; # must not change name = "backup-to-dilion"; filesystems."zpool/root" = true; filesystems."zpool/root/etc" = true; filesystems."zpool/root/var<" = true; connect = { address = "dilion.immae.eu:19000"; type = "tls"; server_cn = "dilion"; ca = config.secrets.fullPaths."zrepl/certificates/dilion.crt"; cert = config.secrets.fullPaths."zrepl/certificates/eldiron.crt"; key = config.secrets.fullPaths."zrepl/eldiron.key"; }; snapshotting = { type = "periodic"; prefix = "zrepl_"; interval = "1h"; # hooks = [ # { # type = "mysql-lock-tables"; # dsn = "${config.myEnv.zrepl_backup.mysql.user}:${config.myEnv.zrepl_backup.mysql.password}@tcp(localhost)/"; # filesystems."zpool/root/var" = true; # } # { # type = "command"; # path = pkgs.writeScript "redis-dump" '' # #!${pkgs.stdenv.shell} # ${pkgs.redis}/bin/redis-cli bgsave # ''; # err_is_fatal = false; # filesystems."zpool/root/var" = true; # } # ]; }; send.encrypted = true; pruning.keep_sender = [ { type = "regex"; regex = "^manual_.*"; } { type = "grid"; grid = "24x1h | 7x1d | 4x7d | 6x30d"; regex = "^zrepl_.*"; } ]; pruning.keep_receiver = [ { type = "regex"; regex = "^manual_.*"; } { type = "grid"; grid = "6x4h | 7x1d | 4x7d | 6x30d"; regex = "^zrepl_.*"; } ]; } { type = "source"; # must not change name = "backup-to-wd-zpool"; serve.type = "tls"; serve.listen = ":${builtins.toString config.myEnv.ports.zrepl_flony}"; serve.ca = config.secrets.fullPaths."zrepl/certificates/flony.crt"; serve.cert = config.secrets.fullPaths."zrepl/certificates/eldiron.crt"; serve.key = config.secrets.fullPaths."zrepl/eldiron.key"; serve.client_cns = [ "flony" ]; filesystems."zpool/root" = true; filesystems."zpool/root/etc" = true; filesystems."zpool/root/var<" = true; filesystems."zfast/root/var<" = true; send.encrypted = true; snapshotting.type = "manual"; } ]; }; }; environment.etc."fail2ban/filter.d/postgresql.conf".text = '' [Definition] failregex = \S+ FATAL: password authentication failed for user .+$ \S+ FATAL: PAM authentication failed for user.+$ \S+ FATAL: no pg_hba.conf entry for host.+$ ''; environment.etc."fail2ban/filter.d/mysqld-auth.local".text = '' [Definition] _daemon = mysql[-\w]* ''; services.fail2ban.jails.dovecot = '' enabled = true ''; services.fail2ban.jails.postfix-sasl = '' enabled = true ''; services.fail2ban.jails.proftpd = '' enabled = true ''; services.fail2ban.jails.postgresql = '' enabled = true port = 5432 logpath = %(syslog_daemon)s backend = %(default_backend)s journalmatch = _SYSTEMD_UNIT=postgresql.service + _COMM=postgres ''; services.fail2ban.jails.mysqld-auth = '' enabled = true journalmatch = _SYSTEMD_UNIT=mysql.service + _COMM=mysqld ''; # This value determines the NixOS release with which your system is # to be compatible, in order to avoid breaking some software such as # database servers. You should change this only after NixOS release # notes say you should. # https://nixos.org/nixos/manual/release-notes.html system.stateVersion = "23.05"; # Did you read the comment? security.pam.services.ldap.text = '' # Authentication from ldap for pgsql auth required ${pkgs.pam_pgsql}/lib/security/pam_pgsql.so config_file=/var/secrets/ldap/pam_pgsql account required ${pkgs.pam_pgsql}/lib/security/pam_pgsql.so config_file=/var/secrets/ldap/pam_pgsql ''; services.saslauthd = { enable = true; mechanism = "pam"; }; environment.etc."sasl2/slapd.conf".text = '' mech_list: plain pwcheck_method: saslauthd saslauthd_path: /run/saslauthd/mux ''; }