Zuckerberg 869b6af7f7 Block sandbox access to local network
Add nftables forward rules to prevent sandboxed workspaces from
reaching RFC1918 private addresses while allowing public internet
and the host gateway (for DNS/NAT).
2026-02-09 20:16:02 -08:00
2024-06-02 21:12:07 -06:00
2026-02-07 22:37:35 -08:00
2026-01-11 14:25:03 -08:00
2026-01-14 19:32:21 -08:00
2022-05-20 16:37:33 -04:00
2026-02-09 18:04:09 -08:00
2026-02-09 18:04:09 -08:00
2021-05-21 13:01:02 +00:00
2026-01-24 14:58:40 -08:00
2023-04-19 21:17:45 -06:00
2023-04-23 10:16:54 -06:00

My NixOS configurations

Source Layout

  • /common - common configuration imported into all /machines
    • /boot - config related to bootloaders, cpu microcode, and unlocking LUKS root disks over tor
    • /network - config for tailscale, and NixOS container with automatic vpn tunneling via PIA
    • /pc - config that a graphical PC should have. Have the personal role set in the machine's properties.nix to enable everthing.
    • /server - config that creates new nixos services or extends existing ones to meet my needs
  • /machines - all my NixOS machines along with their machine unique configuration for hardware and services
    • /kexec - a special machine for generating minimal kexec images. Does not import /common
  • /secrets - encrypted shared secrets unlocked through /machines ssh host keys
Description
My NixOS configurations
Readme MIT 46 MiB
Languages
Nix 92.5%
Shell 6.9%
Makefile 0.6%