YYVLXCNN7ESY2CV5WBOSBXANJDXZW45YUL5DG5RLJQOUHPQRZULAC firewall = {enable = true;extraCommands = "iptables -A INPUT -p tcp --dport 9040 -j ACCEPTiptables -t nat -A PREROUTING -p tcp -d 127.192.0.0/10 -j REDIRECT --to-port 9040iptables -t nat -A OUTPUT -p tcp -d 127.192.0.0/10 -j REDIRECT --to-port 9040";allowedTCPPorts = [ 30000 22 80 8080 ];allowedUDPPorts = [ 30000 22 80 8080 ];};
};services.privoxy = {enable = true;extraConfig = "accept-intercepted-requests 1forward .i2p 127.0.0.1:4444";};networking.firewall = {enable = true;extraCommands = "iptables -t nat -A OUTPUT -o lo -d 127.192.0.0/10 -p tcp -j REDIRECT --to-ports 9040ip6tables -t nat -A OUTPUT -o lo -d FE80::/10 -p tcp -j REDIRECT --to-ports 9040";allowedTCPPorts = [ 30000 22 80 8080 ];allowedUDPPorts = [ 30000 22 80 8080 ];
services.unbound = {enable = true;extraConfig = "server:interface: 0.0.0.0interface: ::0Access-control: 127.0.0.0/8 allowaccess-control: 192.168.0.0/24 allowaccess-control: 192.168.1.0/24 allowdomain-insecure: \"onion\"private-domain: \"onion\"do-not-query-localhost: nolocal-zone: \"onion.\" nodefaultforward-zone:name: \".\"forward-addr: 208.67.222.222forward-addr: 208.67.220.220forward-zone:name: \"onion\"forward-addr: 127.0.0.1@5300";};
# Some programs need SUID wrappers, can be configured further or are# started in user sessions.# programs.mtr.enable = true;# programs.gnupg.agent = {# enable = true;# enableSSHSupport = true;# };# This value determines the NixOS release from which the default# settings for stateful data, like file locations and database versions# on your system were taken. It‘s perfectly fine and recommended to leave# this value at the release version of the first install of this system.