···
cfg = config.services.sslh;
configFile = pkgs.writeText "sslh.conf" ''
verbose: ${boolToString cfg.verbose};
+
transparent: ${boolToString cfg.transparent};
timeout: "${toString cfg.timeout}";
···
description = "Timeout in seconds.";
+
transparent = mkOption {
+
description = "Will the services behind sslh (Apache, sshd and so on) see the external IP and ports as if the external world connected directly to them";
listenAddress = mkOption {
+
description = "Listening address or hostname.";
···
+
users.users.${user} = {
+
description = "sslh daemon user";
+
systemd.services.sslh = {
+
description = "Applicative Protocol Multiplexer (e.g. share SSH and HTTPS on the same port)";
+
after = [ "network.target" ];
+
wantedBy = [ "multi-user.target" ];
+
PermissionsStartOnly = true;
+
ExecStart = "${pkgs.sslh}/bin/sslh -F${configFile}";
+
AmbientCapabilities = "CAP_NET_BIND_SERVICE CAP_NET_ADMIN CAP_SETGID CAP_SETUID";
+
ProtectSystem = "full";
+
# code from https://github.com/yrutschle/sslh#transparent-proxy-support
+
# the only difference is using iptables mark 0x2 instead of 0x1 to avoid conflicts with nixos/nat module
+
(mkIf (cfg.enable && cfg.transparent) {
+
# Set route_localnet = 1 on all interfaces so that ssl can use "localhost" as destination
+
boot.kernel.sysctl."net.ipv4.conf.default.route_localnet" = 1;
+
boot.kernel.sysctl."net.ipv4.conf.all.route_localnet" = 1;
+
systemd.services.sslh = let
+
# DROP martian packets as they would have been if route_localnet was zero
+
# Note: packets not leaving the server aren't affected by this, thus sslh will still work
+
{ table = "raw"; command = "PREROUTING ! -i lo -d 127.0.0.0/8 -j DROP"; }
+
{ table = "mangle"; command = "POSTROUTING ! -o lo -s 127.0.0.0/8 -j DROP"; }
+
# Mark all connections made by ssl for special treatment (here sslh is run as user ${user})
+
{ table = "nat"; command = "OUTPUT -m owner --uid-owner ${user} -p tcp --tcp-flags FIN,SYN,RST,ACK SYN -j CONNMARK --set-xmark 0x02/0x0f"; }
+
# Outgoing packets that should go to sslh instead have to be rerouted, so mark them accordingly (copying over the connection mark)
+
{ table = "mangle"; command = "OUTPUT ! -o lo -p tcp -m connmark --mark 0x02/0x0f -j CONNMARK --restore-mark --mask 0x0f"; }
+
{ table = "raw"; command = "PREROUTING ! -i lo -d ::1/128 -j DROP"; }
+
{ table = "mangle"; command = "POSTROUTING ! -o lo -s ::1/128 -j DROP"; }
+
{ table = "nat"; command = "OUTPUT -m owner --uid-owner ${user} -p tcp --tcp-flags FIN,SYN,RST,ACK SYN -j CONNMARK --set-xmark 0x02/0x0f"; }
+
{ table = "mangle"; command = "OUTPUT ! -o lo -p tcp -m connmark --mark 0x02/0x0f -j CONNMARK --restore-mark --mask 0x0f"; }
+
path = [ pkgs.iptables pkgs.iproute pkgs.procps ];
+
# Cleanup old iptables entries which might be still there
+
${concatMapStringsSep "\n" ({table, command}: "while iptables -w -t ${table} -D ${command} 2>/dev/null; do echo; done") iptablesCommands}
+
${concatMapStringsSep "\n" ({table, command}: "iptables -w -t ${table} -A ${command}" ) iptablesCommands}
+
# Configure routing for those marked packets
+
ip rule add fwmark 0x2 lookup 100
+
ip route add local 0.0.0.0/0 dev lo table 100
+
'' + optionalString config.networking.enableIPv6 ''
+
${concatMapStringsSep "\n" ({table, command}: "while ip6tables -w -t ${table} -D ${command} 2>/dev/null; do echo; done") ip6tablesCommands}
+
${concatMapStringsSep "\n" ({table, command}: "ip6tables -w -t ${table} -A ${command}" ) ip6tablesCommands}
+
ip -6 rule add fwmark 0x2 lookup 100
+
ip -6 route add local ::/0 dev lo table 100
+
${concatMapStringsSep "\n" ({table, command}: "iptables -w -t ${table} -D ${command}") iptablesCommands}
+
ip rule del fwmark 0x2 lookup 100
+
ip route del local 0.0.0.0/0 dev lo table 100
+
'' + optionalString config.networking.enableIPv6 ''
+
${concatMapStringsSep "\n" ({table, command}: "ip6tables -w -t ${table} -D ${command}") ip6tablesCommands}
+
ip -6 rule del fwmark 0x2 lookup 100
+
ip -6 route del local ::/0 dev lo table 100