Use the NixOS firewall instead to block unwanted PIA VPN traffic
This commit is contained in:
		
							parent
							
								
									478235fe32
								
							
						
					
					
						commit
						83e9280bb4
					
				@ -213,8 +213,8 @@ in {
 | 
				
			|||||||
        echo $payload >> /tmp/${cfg.interfaceName}-port-renewal
 | 
					        echo $payload >> /tmp/${cfg.interfaceName}-port-renewal
 | 
				
			||||||
 | 
					
 | 
				
			||||||
        # Block all traffic from VPN interface except for traffic that is from the forwarded port
 | 
					        # Block all traffic from VPN interface except for traffic that is from the forwarded port
 | 
				
			||||||
        iptables -I INPUT -i ${cfg.interfaceName} -j DROP
 | 
					        iptables -I nixos-fw -p tcp --dport $port -j nixos-fw-accept -i ${cfg.interfaceName}
 | 
				
			||||||
        iptables -I INPUT -i ${cfg.interfaceName} -p tcp --dport $port -j ACCEPT
 | 
					        iptables -I nixos-fw -p udp --dport $port -j nixos-fw-accept -i ${cfg.interfaceName}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
        # The first port refresh triggers the port to be actually allocated
 | 
					        # The first port refresh triggers the port to be actually allocated
 | 
				
			||||||
        ${refreshPIAPort}
 | 
					        ${refreshPIAPort}
 | 
				
			||||||
 | 
				
			|||||||
@ -75,7 +75,11 @@ in
 | 
				
			|||||||
        # speeds up evaluation
 | 
					        # speeds up evaluation
 | 
				
			||||||
        nixpkgs.pkgs = pkgs;
 | 
					        nixpkgs.pkgs = pkgs;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
        networking.firewall.enable = mkForce false;
 | 
					        # networking.firewall.enable = mkForce false;
 | 
				
			||||||
 | 
					        networking.firewall.trustedInterfaces = [
 | 
				
			||||||
 | 
					          # completely trust internal interface to host
 | 
				
			||||||
 | 
					          "eth0"
 | 
				
			||||||
 | 
					        ];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
        pia.openvpn.enable = cfg.useOpenVPN;
 | 
					        pia.openvpn.enable = cfg.useOpenVPN;
 | 
				
			||||||
        pia.openvpn.server = "swiss.privacy.network"; # swiss vpn
 | 
					        pia.openvpn.server = "swiss.privacy.network"; # swiss vpn
 | 
				
			||||||
 | 
				
			|||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user