Ok, family and friends and #guix peeps, the #guixrouter initial push is up on codeberg as promised.
https://codeberg.org/dlakelan/guixrouter
There's also a semi-extensive discussion of how to use it in the README which is visible at the repo page, it probably needs a bit more discussion in the readme even, so I'll be working on that. Right now, I'd love it if people take a look and If you have questions put them here or in an issue and I'll try to write answers into the README.
So on the #guixrouter project I'm just about ready to publish. I need to remove all the specific stuff about my network in ONE more file, do a final check, and then push it to codeberg. Expect an announcement maybe tomorrow?
Does anyone want to test it out? I think the easiest way is with a Proxmox server and the qcow2 image off guix site: https://guix.gnu.org/en/download/
You make a VM, import the qcow2 disk, and follow the config instructions on the codeberg site once they're pushed out... LMK
Default services right now:
squid proxy, dnsmasq, unbound DNS over TLS, wireguard, yggdrasil, keepalived, tor, i2p, zabbix agent, prometheus exporter, ntpd client and server, dhcpd for upstream requests, nginx reverse proxy, letsencrypt, ssh, custom nftables firewall, and HFSC qdisc traffic shaper
Sounds interesting? I'm beginning to port it over to an independent repo so I can put it on codeberg
Where are my #ipv6 experts at?
My #guixrouter is having problems where when I restart its networking, it can respond to neighbor discovery, but after some time... it stops receiving neighbor discovery requests (they don't appear in tcpdumps). I think this must be either something to do with my switch or something to do with the linux bridge on the proxmox host... why would this happen? I can see the ndp snooping entry disappears on switch, but it happens even if ndp snooping is off
@doachs ?
Right now my #guixrouter uses unbound to forward upstream queries to Cloudflare DNS over TLS.
I'm thinking of moving that to DNS over Tor. How many of you do your DNS over Tor and how reliable is it? Since unbound doesn't handle this directly with socks proxy options, I'm thinking of using socat to open tls connections to like 4 DNS over TCP services through the Tor proxy (say 1.1.1.1 and 8.8.8.8 and their ipv6 versions) and then have unbound open 4 TCP streams to locally bound ports