nixos/avahi: revert closing firewall port by default
This commit is contained in:
parent
23493afbe6
commit
89b5dddf99
@ -87,16 +87,6 @@
|
||||
<literal>true</literal>, or configure your firewall.
|
||||
</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>
|
||||
The
|
||||
<link linkend="opt-services.avahi.openFirewall">services.avahi.openFirewall</link>
|
||||
module option default value has been changed from
|
||||
<literal>true</literal> to <literal>false</literal>. You will
|
||||
need to explicitely set this option to
|
||||
<literal>true</literal>, or configure your firewall.
|
||||
</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>
|
||||
The
|
||||
|
@ -31,8 +31,6 @@ In addition to numerous new and upgraded packages, this release has the followin
|
||||
|
||||
- The [services.snapserver.openFirewall](#opt-services.snapserver.openFirewall) module option default value has been changed from `true` to `false`. You will need to explicitely set this option to `true`, or configure your firewall.
|
||||
|
||||
- The [services.avahi.openFirewall](#opt-services.avahi.openFirewall) module option default value has been changed from `true` to `false`. You will need to explicitely set this option to `true`, or configure your firewall.
|
||||
|
||||
- The [services.tmate-ssh-server.openFirewall](#opt-services.tmate-ssh-server.openFirewall) module option default value has been changed from `true` to `false`. You will need to explicitely set this option to `true`, or configure your firewall.
|
||||
|
||||
- The [services.unifi-video.openFirewall](#opt-services.unifi-video.openFirewall) module option default value has been changed from `true` to `false`. You will need to explicitely set this option to `true`, or configure your firewall.
|
||||
|
@ -103,16 +103,17 @@ in
|
||||
|
||||
openFirewall = mkOption {
|
||||
type = types.bool;
|
||||
default = false;
|
||||
default = true;
|
||||
description = lib.mdDoc ''
|
||||
Whether to open the firewall for UDP port 5353.
|
||||
Disabling this setting also disables discovering of network devices.
|
||||
'';
|
||||
};
|
||||
|
||||
allowPointToPoint = mkOption {
|
||||
type = types.bool;
|
||||
default = false;
|
||||
description= lib.mdDoc ''
|
||||
description = lib.mdDoc ''
|
||||
Whether to use POINTTOPOINT interfaces. Might make mDNS unreliable due to usually large
|
||||
latencies with such links and opens a potential security hole by allowing mDNS access from Internet
|
||||
connections.
|
||||
|
Loading…
Reference in New Issue
Block a user