about summary refs log tree commit diff
path: root/nixos
diff options
context:
space:
mode:
authorPeter Simons <simons@cryp.to>2017-04-07 12:35:05 +0200
committerGitHub <noreply@github.com>2017-04-07 12:35:05 +0200
commit67d735e8dfeeecc3b4b42ea703c94e8012e0af68 (patch)
tree2e52225acf76942589396309ed52445f81579eb9 /nixos
parenta0d59165b9151e8e0b14e4e8b2c2cbc1be744a40 (diff)
parent518e5c09a85345512d712ee964f367adb6401803 (diff)
downloadnixlib-67d735e8dfeeecc3b4b42ea703c94e8012e0af68.tar
nixlib-67d735e8dfeeecc3b4b42ea703c94e8012e0af68.tar.gz
nixlib-67d735e8dfeeecc3b4b42ea703c94e8012e0af68.tar.bz2
nixlib-67d735e8dfeeecc3b4b42ea703c94e8012e0af68.tar.lz
nixlib-67d735e8dfeeecc3b4b42ea703c94e8012e0af68.tar.xz
nixlib-67d735e8dfeeecc3b4b42ea703c94e8012e0af68.tar.zst
nixlib-67d735e8dfeeecc3b4b42ea703c94e8012e0af68.zip
Merge pull request #23409 from florianjacob/avahi-point-to-point-interfaces
avahi-daemon service: Add option to enable point-to-point interfaces.
Diffstat (limited to 'nixos')
-rw-r--r--nixos/modules/services/networking/avahi-daemon.nix10
1 files changed, 10 insertions, 0 deletions
diff --git a/nixos/modules/services/networking/avahi-daemon.nix b/nixos/modules/services/networking/avahi-daemon.nix
index 6a786e75bbc8..e7ef68c90b2a 100644
--- a/nixos/modules/services/networking/avahi-daemon.nix
+++ b/nixos/modules/services/networking/avahi-daemon.nix
@@ -21,6 +21,7 @@ let
     use-ipv6=${if ipv6 then "yes" else "no"}
     ${optionalString (interfaces!=null) "allow-interfaces=${concatStringsSep "," interfaces}"}
     ${optionalString (domainName!=null) "domain-name=${domainName}"}
+    allow-point-to-point=${if allowPointToPoint then "yes" else "no"}
 
     [wide-area]
     enable-wide-area=${if wideArea then "yes" else "no"}
@@ -98,6 +99,15 @@ in
         '';
       };
 
+      allowPointToPoint = mkOption {
+        default = false;
+        description= ''
+          Whether to use POINTTOPOINT interfaces. Might make mDNS unreliable due to usually large
+          latencies with such links and opens a potential security hole by allowing mDNS access from Internet
+          connections. Use with care and YMMV!
+        '';
+      };
+
       wideArea = mkOption {
         default = true;
         description = ''Whether to enable wide-area service discovery.'';