reenable ipv6
This commit is contained in:
parent
a45ab655d6
commit
cc31cd69b7
4 changed files with 13 additions and 7 deletions
|
@ -91,9 +91,15 @@ in
|
||||||
};
|
};
|
||||||
|
|
||||||
SearchEngines = {
|
SearchEngines = {
|
||||||
# Default = "DuckDuckGo";
|
Default = "SearXNG";
|
||||||
Remove = ["Bing" "Amazon.ca" "eBay"];
|
Remove = ["Bing" "Amazon.ca" "eBay"];
|
||||||
Add = [
|
Add = [
|
||||||
|
{
|
||||||
|
Name = "SearXNG";
|
||||||
|
URLTemplate = "http://search.grimmauld.de/search?q={searchTerms}&safesearch=1&categories=general";
|
||||||
|
IconURL = "https://raw.githubusercontent.com/searxng/searxng/refs/heads/master/searx/static/themes/simple/img/favicon.svg";
|
||||||
|
Alias = "searx";
|
||||||
|
}
|
||||||
{
|
{
|
||||||
Name = "Nix Package Search";
|
Name = "Nix Package Search";
|
||||||
URLTemplate = "https://search.nixos.org/packages?channel=unstable&query={searchTerms}";
|
URLTemplate = "https://search.nixos.org/packages?channel=unstable&query={searchTerms}";
|
||||||
|
@ -152,7 +158,6 @@ in
|
||||||
"network.connectivity-service.DNSv6.domain" = "::1";
|
"network.connectivity-service.DNSv6.domain" = "::1";
|
||||||
"network.dns.localDomains" = "::1";
|
"network.dns.localDomains" = "::1";
|
||||||
"network.dns.forceResolve" = true;
|
"network.dns.forceResolve" = true;
|
||||||
"network.dns.disableIPv6" = true;
|
|
||||||
|
|
||||||
"extensions.formautofill.addresses.enabled" = false;
|
"extensions.formautofill.addresses.enabled" = false;
|
||||||
"extensions.formautofill.creditCards.enabled" = false;
|
"extensions.formautofill.creditCards.enabled" = false;
|
||||||
|
|
|
@ -17,6 +17,7 @@
|
||||||
nix.package = pkgs.lix;
|
nix.package = pkgs.lix;
|
||||||
nixpkgs.config.allowUnfree = true;
|
nixpkgs.config.allowUnfree = true;
|
||||||
zramSwap.enable = true;
|
zramSwap.enable = true;
|
||||||
|
networking.enableIPv6 = true;
|
||||||
# zramSwap.memoryPercent = 50;
|
# zramSwap.memoryPercent = 50;
|
||||||
|
|
||||||
grimmShared = {
|
grimmShared = {
|
||||||
|
|
|
@ -23,14 +23,14 @@
|
||||||
systemd.oomd.enable = false;
|
systemd.oomd.enable = false;
|
||||||
|
|
||||||
boot.kernel.sysctl = {
|
boot.kernel.sysctl = {
|
||||||
"net.ipv6.conf.all.accept_ra" = 0;
|
# "net.ipv6.conf.all.accept_ra" = 0;
|
||||||
"net.ipv6.conf.default.accept_ra" = 0;
|
# "net.ipv6.conf.default.accept_ra" = 0;
|
||||||
"net.ipv4.conf.all.send_redirects"=0;
|
"net.ipv4.conf.all.send_redirects"=0;
|
||||||
"net.ipv4.conf.default.accept_source_route"=0;
|
"net.ipv4.conf.default.accept_source_route"=0;
|
||||||
"net.ipv4.conf.all.accept_redirects"=0;
|
"net.ipv4.conf.all.accept_redirects"=0;
|
||||||
"net.ipv4.conf.default.accept_redirects"=0;
|
"net.ipv4.conf.default.accept_redirects"=0;
|
||||||
"net.ipv6.conf.all.accept_redirects"=0;
|
# "net.ipv6.conf.all.accept_redirects"=0;
|
||||||
"net.ipv6.conf.default.accept_redirects"=0;
|
# "net.ipv6.conf.default.accept_redirects"=0;
|
||||||
"net.ipv4.conf.all.secure_redirects"=0;
|
"net.ipv4.conf.all.secure_redirects"=0;
|
||||||
"net.ipv4.conf.default.secure_redirects"=0;
|
"net.ipv4.conf.default.secure_redirects"=0;
|
||||||
"net.ipv4.conf.all.log_martians"=1;
|
"net.ipv4.conf.all.log_martians"=1;
|
||||||
|
|
|
@ -30,7 +30,7 @@
|
||||||
odoh_servers = false;
|
odoh_servers = false;
|
||||||
require_nolog = true;
|
require_nolog = true;
|
||||||
require_nofilter = true;
|
require_nofilter = true;
|
||||||
listen_addresses = [ "127.0.0.1:53" ];
|
listen_addresses = [ "127.0.0.1:53" "[::1]:53" ];
|
||||||
proxy = "socks5://${config.services.tor.torsocks.server}";
|
proxy = "socks5://${config.services.tor.torsocks.server}";
|
||||||
force_tcp = true;
|
force_tcp = true;
|
||||||
|
|
||||||
|
|
Loading…
Add table
Reference in a new issue