diff options
author | Gregor Kleen <gkleen@yggdrasil.li> | 2022-02-22 11:30:39 +0100 |
---|---|---|
committer | Gregor Kleen <gkleen@yggdrasil.li> | 2022-02-22 11:30:39 +0100 |
commit | c8c5313ecfe8958819509a00528b1eb27a415bbd (patch) | |
tree | b8a626ba91ea8a8b9ac083a8c63514be67a72be3 /hosts | |
parent | dfa02cb2e26afd4b51b864d8ff6ae1bac3fbd8b5 (diff) | |
download | nixos-c8c5313ecfe8958819509a00528b1eb27a415bbd.tar nixos-c8c5313ecfe8958819509a00528b1eb27a415bbd.tar.gz nixos-c8c5313ecfe8958819509a00528b1eb27a415bbd.tar.bz2 nixos-c8c5313ecfe8958819509a00528b1eb27a415bbd.tar.xz nixos-c8c5313ecfe8958819509a00528b1eb27a415bbd.zip |
...
Diffstat (limited to 'hosts')
-rw-r--r-- | hosts/surtr/dns/default.nix | 24 | ||||
-rw-r--r-- | hosts/surtr/dns/keys/knot_local_key.yaml | 26 |
2 files changed, 49 insertions, 1 deletions
diff --git a/hosts/surtr/dns/default.nix b/hosts/surtr/dns/default.nix index 5f69c350..695ac292 100644 --- a/hosts/surtr/dns/default.nix +++ b/hosts/surtr/dns/default.nix | |||
@@ -25,6 +25,7 @@ in { | |||
25 | enable = true; | 25 | enable = true; |
26 | keyFiles = [ | 26 | keyFiles = [ |
27 | config.sops.secrets."rheperire.org_acme_key.yaml".path | 27 | config.sops.secrets."rheperire.org_acme_key.yaml".path |
28 | config.sops.secrets."knot_local_key.yaml".path | ||
28 | ]; | 29 | ]; |
29 | extraConfig = '' | 30 | extraConfig = '' |
30 | server: | 31 | server: |
@@ -38,6 +39,9 @@ in { | |||
38 | address: 185.181.104.96@53 | 39 | address: 185.181.104.96@53 |
39 | - id: recursive | 40 | - id: recursive |
40 | address: ::1@5353 | 41 | address: ::1@5353 |
42 | - id: local | ||
43 | address: ::1@53 | ||
44 | key: local_key | ||
41 | 45 | ||
42 | acl: | 46 | acl: |
43 | - id: inwx_acl | 47 | - id: inwx_acl |
@@ -46,6 +50,10 @@ in { | |||
46 | - id: rheperire.org_acme_acl | 50 | - id: rheperire.org_acme_acl |
47 | key: rheperire.org_acme_key | 51 | key: rheperire.org_acme_key |
48 | action: update | 52 | action: update |
53 | - id: local_acl | ||
54 | key: local_key | ||
55 | action: update | ||
56 | update-type: DS | ||
49 | 57 | ||
50 | mod-rrl: | 58 | mod-rrl: |
51 | - id: default | 59 | - id: default |
@@ -75,6 +83,15 @@ in { | |||
75 | ksk-lifetime: 360d | 83 | ksk-lifetime: 360d |
76 | signing-threads: 2 | 84 | signing-threads: 2 |
77 | ksk-submission: validating-resolver | 85 | ksk-submission: validating-resolver |
86 | - id: ed25519_local-push | ||
87 | algorithm: ed25519 | ||
88 | nsec3: on | ||
89 | nsec3-iterations: 0 | ||
90 | ksk-lifetime: 360d | ||
91 | signing-threads: 2 | ||
92 | ksk-submission: validating-resolver | ||
93 | cds-cdnskey-publish: none | ||
94 | ds-push: [local] | ||
78 | 95 | ||
79 | template: | 96 | template: |
80 | - id: default | 97 | - id: default |
@@ -98,7 +115,7 @@ in { | |||
98 | journal-content: all | 115 | journal-content: all |
99 | semantic-checks: on | 116 | semantic-checks: on |
100 | dnssec-signing: on | 117 | dnssec-signing: on |
101 | dnssec-policy: ed25519 | 118 | dnssec-policy: ed25519_local-push |
102 | 119 | ||
103 | zone: | 120 | zone: |
104 | - domain: yggdrasil.li | 121 | - domain: yggdrasil.li |
@@ -145,6 +162,11 @@ in { | |||
145 | owner = "knot"; | 162 | owner = "knot"; |
146 | sopsFile = ./keys/rheperire.org_acme.yaml; | 163 | sopsFile = ./keys/rheperire.org_acme.yaml; |
147 | }; | 164 | }; |
165 | "knot_local_key.yaml" = { | ||
166 | format = "binary"; | ||
167 | owner = "knot"; | ||
168 | sopsFile = ./keys/local_key.yaml; | ||
169 | }; | ||
148 | }; | 170 | }; |
149 | 171 | ||
150 | 172 | ||
diff --git a/hosts/surtr/dns/keys/knot_local_key.yaml b/hosts/surtr/dns/keys/knot_local_key.yaml new file mode 100644 index 00000000..a170ff72 --- /dev/null +++ b/hosts/surtr/dns/keys/knot_local_key.yaml | |||
@@ -0,0 +1,26 @@ | |||
1 | { | ||
2 | "data": "ENC[AES256_GCM,data:kSTzSFxJhKHPlAfdDT04v88yha8cIagAZZ3hJKqKrfB5tHi5Ek2Yzz/qndvjyBHb3B2PbbeVOUGuNXdZziJYpT0rdwK9vTGnxkaZS1cw0jKf9p/CLRAi3bDgCUti4oPjtQDh5Jj8gDokRs3u6SthaBcz2tZOqDyjKfWWzGlIMtRfSnx7KjgX2Anrhf2/B7vr2Van9XhMTTFiacLpYjZUXeo7v6ZOb49G2b+XxzxrYrY=,iv:b5DeWUu+BpvxhYrKBxpr6m+Ivz+1oLPY5sTZYq6GsJA=,tag:Tvb6w/8Qbro3I7MZ97HKlA==,type:str]", | ||
3 | "sops": { | ||
4 | "kms": null, | ||
5 | "gcp_kms": null, | ||
6 | "azure_kv": null, | ||
7 | "hc_vault": null, | ||
8 | "age": null, | ||
9 | "lastmodified": "2022-02-22T10:29:34Z", | ||
10 | "mac": "ENC[AES256_GCM,data:wBzMMSuaNfITvC42rOCWznMCATwjLrz66h+0QURoJONGw/GMVejkdQ+F9s0UFz7PyVKPAxWgSC4Km+ve9nX2c+f1lGyo4YpWDYKtVlZuUd7/Alf1ctl4epZLZihZVc0XLRNgH/Th7D4c+7WyHi8XT1l/AHmbixG4Jxwh8/b0TIY=,iv:vTs3qIMHLIt39RSze3YRkJUkuOUganvtIs90qsXekcc=,tag:EaVQq7DyPvM1CufOtrFDsw==,type:str]", | ||
11 | "pgp": [ | ||
12 | { | ||
13 | "created_at": "2022-02-22T10:29:34Z", | ||
14 | "enc": "-----BEGIN PGP MESSAGE-----\n\nhF4DyFKFNkTVG5oSAQdAqtTjcOaobAeRPtdIlgNBWcHMyJjWoeDdXI/s/Um0lX4w\nIe0pVT/t8t5vakDey0Mu6uTZOM64UKFyH2mTJCOWtbf96tI1ML+03bJGrKNTKEKU\n0l4BTRKRJwKrnjST0/NBc6YwBYfBeKoStoh60aBm072JlWS5/SprDysqMa9xpSxy\npz9HuF5g3/slPaeohUCh8457LtdQgLzZDBbpOWHwpU55Oix+518qAEZ5AspdnHHe\n=8Y8Z\n-----END PGP MESSAGE-----\n", | ||
15 | "fp": "7ED22F4AA7BB55728B643DC5471B7D88E4EF66F8" | ||
16 | }, | ||
17 | { | ||
18 | "created_at": "2022-02-22T10:29:34Z", | ||
19 | "enc": "-----BEGIN PGP MESSAGE-----\n\nhF4DXxoViZlp6dISAQdAk0ne1fjj2mV1P+4GDfDE/1SuyvWJ6sqKjkfYgdneNEIw\ns1qLAQzboXcMm073fV/XiegSP4AVL5sa6TOy+ajHGedOk2AkTBa9dYj0QJLJAxxW\n0l4BJdS01hYhj51x2CjAMan37oDZaoNr1Z9V6SPxfnLIs74kPZuAWT9U5YvoD8bj\nwEPGgvJOHPSQbmKpRXsd7MIHxRAe2PEsTGujd6CEv+ZAfjG95EpW5P6Aie73ZZE+\n=1kB3\n-----END PGP MESSAGE-----\n", | ||
20 | "fp": "30D3453B8CD02FE2A3E7C78C0FB536FB87AE8F51" | ||
21 | } | ||
22 | ], | ||
23 | "unencrypted_suffix": "_unencrypted", | ||
24 | "version": "3.7.1" | ||
25 | } | ||
26 | } \ No newline at end of file | ||