dotfiles/nixos/server-security.nix

30 lines
978 B
Nix
Raw Normal View History

2021-05-31 09:15:44 +01:00
{ config, pkgs, ... }:
2021-06-27 08:38:54 +01:00
let
authorizedKeys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIE5Ejx5CAPUfHVXi4GL4WmnZaG8eiiOmsW/a0o1bs1GF cyryl@foureighty"
2021-05-31 09:15:44 +01:00
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDN/2C59i+ucvSa9FLCHlVPJp0zebLOcw0+hnBYwy0cY cyryl@skinnyv"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJwZ4M6lT2yzg8iarCzsLADAuXS4BUkLTt1+mKCECczk nix-builder@brix"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIALNEUIxbENTdhSWzYupGFn/q+AGe0diBOTMyiZAmv7F nix-builder@vultr1"
];
2022-03-10 12:25:23 +00:00
in {
imports = [ ./security.nix ];
2021-11-22 19:32:26 +00:00
security.acme.email = "admin@cyplo.dev";
security.acme.acceptTerms = true;
2021-06-27 08:38:54 +01:00
2021-11-22 19:32:26 +00:00
services.fail2ban.enable = true;
2021-06-27 08:38:54 +01:00
2021-11-22 19:32:26 +00:00
services.openssh = {
enable = true;
permitRootLogin = "prohibit-password";
passwordAuthentication = false;
};
2021-06-27 08:38:54 +01:00
2021-11-22 19:32:26 +00:00
users.extraUsers.root.openssh.authorizedKeys.keys = authorizedKeys;
users.users.nix-builder = {
isNormalUser = true;
openssh.authorizedKeys.keys = authorizedKeys;
};
2021-05-31 09:15:44 +01:00
2021-11-22 19:32:26 +00:00
nix.trustedUsers = [ "root" "nix-builder" ];
}