+1
global/programs/security/default.nix
+1
global/programs/security/default.nix
+9
-4
global/programs/security/firewall.nix
+9
-4
global/programs/security/firewall.nix
···+# this was never needed because ts has been bypassing the firewall anyways. (by being higher on the list.)
+10
global/programs/security/ip-bans.nix
+10
global/programs/security/ip-bans.nix
···+networking.firewall.extraCommands = builtins.concatStringsSep "\n" (lib.flatten (lib.mapAttrsToList (family: ips: builtins.map (ip: "${family}tables -w -I INPUT -s ${ip} -j DROP") ips) banned));