Alexandria's unbound now only serves LAN clients (192.168.0.0/16) and returns LAN IPs for service domains. Created new unbound instance on trantor to serve Tailscale clients (100.64.0.0/10) and return tailscale IPs for service domains. Both configurations pull service records from shared/services.nix.
58 lines
1.3 KiB
Nix
58 lines
1.3 KiB
Nix
{ inputs, lib, ... }:
|
|
|
|
let
|
|
utils = import ../../utils.nix { inherit inputs lib; };
|
|
in
|
|
|
|
{
|
|
services.unbound = {
|
|
enable = true;
|
|
enableRootTrustAnchor = true;
|
|
settings = {
|
|
server = {
|
|
interface = [
|
|
"0.0.0.0"
|
|
"::"
|
|
];
|
|
access-control = [
|
|
"127.0.0.0/8 allow"
|
|
"100.64.0.0/10 allow" # Tailscale CGNAT range
|
|
"::1/128 allow"
|
|
"fd7a:115c:a1e0::/48 allow" # Tailscale IPv6
|
|
];
|
|
|
|
num-threads = 2;
|
|
msg-cache-size = "50m";
|
|
rrset-cache-size = "100m";
|
|
cache-min-ttl = 300;
|
|
cache-max-ttl = 86400;
|
|
prefetch = true;
|
|
prefetch-key = true;
|
|
hide-identity = true;
|
|
hide-version = true;
|
|
so-rcvbuf = "1m";
|
|
so-sndbuf = "1m";
|
|
|
|
# Tailnet DNS records from shared services
|
|
local-zone = ''"baduhai.dev." transparent'';
|
|
local-data = map (e: ''"${e.domain}. IN A ${e.tailscaleIP}"'') utils.services;
|
|
};
|
|
|
|
forward-zone = [
|
|
{
|
|
name = ".";
|
|
forward-addr = [
|
|
"1.1.1.1@853#cloudflare-dns.com"
|
|
"1.0.0.1@853#cloudflare-dns.com"
|
|
];
|
|
forward-tls-upstream = true;
|
|
}
|
|
];
|
|
};
|
|
};
|
|
|
|
networking.firewall = {
|
|
allowedTCPPorts = [ 53 ];
|
|
allowedUDPPorts = [ 53 ];
|
|
};
|
|
}
|