Page MenuHomePhabricator
Feed Advanced Search

May 16 2023

Patrick added a comment to T509: Consider nftables / Berkeley Packet Filter (BPF) as a replacement for iptables.

https://wiki.nftables.org/wiki-nftables/index.php/Atomic_rule_replacement

May 16 2023, 10:32 AM · iptables, vpn-firewall, whonix-ws-firewall, whonix-gw-firewall, Whonix, refactoring, research

May 15 2023

Patrick added a comment to T509: Consider nftables / Berkeley Packet Filter (BPF) as a replacement for iptables.

https://wiki.nftables.org/wiki-nftables/index.php/Scripting

May 15 2023, 6:21 PM · iptables, vpn-firewall, whonix-ws-firewall, whonix-gw-firewall, Whonix, refactoring, research
Patrick added a comment to T509: Consider nftables / Berkeley Packet Filter (BPF) as a replacement for iptables.

Some progress.

May 15 2023, 5:23 PM · iptables, vpn-firewall, whonix-ws-firewall, whonix-gw-firewall, Whonix, refactoring, research

May 9 2023

Patrick added a comment to T509: Consider nftables / Berkeley Packet Filter (BPF) as a replacement for iptables.

In other words, iptabels is already symlinked to iptabels-nft anyhow. Therefore Whonix is already using iptabels-nft.

May 9 2023, 10:34 AM · iptables, vpn-firewall, whonix-ws-firewall, whonix-gw-firewall, Whonix, refactoring, research
Patrick added a comment to T509: Consider nftables / Berkeley Packet Filter (BPF) as a replacement for iptables.
May 9 2023, 10:23 AM · iptables, vpn-firewall, whonix-ws-firewall, whonix-gw-firewall, Whonix, refactoring, research

Feb 17 2023

Patrick added a comment to T673: document https downgrade sslstrip defenses - wget vs curl vs scurl.

https://forums.whonix.org/t/whonix-linux-installer-development-discussion/15917/20

Feb 17 2023, 10:52 AM · Whonix, user documentation, research, Whonix 14, scurl

Jan 19 2023

Patrick updated the task description for T526: systemd introduces memory protection.
Jan 19 2023, 11:12 AM · sdwdate, Whonix, research
Patrick updated the task description for T526: systemd introduces memory protection.
Jan 19 2023, 11:10 AM · sdwdate, Whonix, research
Patrick updated the task description for T526: systemd introduces memory protection.
Jan 19 2023, 11:02 AM · sdwdate, Whonix, research
Patrick updated the task description for T135: find packages without security support / consider installation of debian-security-support by default.
Jan 19 2023, 10:58 AM · bash, Whonix, research, user documentation, security, usability
Patrick removed a project from T135: find packages without security support / consider installation of debian-security-support by default: Debian version 8 codename Jessie.
Jan 19 2023, 10:57 AM · bash, Whonix, research, user documentation, security, usability

Sep 8 2021

Patrick closed T961: fix USB auto mounting bug / document as Resolved.

https://forums.whonix.org/t/disk-usb-automount-in-kicksecure/8728/31

Sep 8 2021, 3:08 PM · research, bug, Whonix 15, Whonix

Aug 9 2021

Patrick added a comment to T509: Consider nftables / Berkeley Packet Filter (BPF) as a replacement for iptables.
In T509#20232, @ak88 wrote:

Any updates on this?

Aug 9 2021, 7:13 PM · iptables, vpn-firewall, whonix-ws-firewall, whonix-gw-firewall, Whonix, refactoring, research
ak88 added a comment to T509: Consider nftables / Berkeley Packet Filter (BPF) as a replacement for iptables.

Any updates on this?

Aug 9 2021, 5:22 PM · iptables, vpn-firewall, whonix-ws-firewall, whonix-gw-firewall, Whonix, refactoring, research

Aug 13 2020

Patrick updated the task description for T540: Advanced Attacks Meta Ticket.
Aug 13 2020, 8:33 AM · VirtualBox, KVM, Qubes, security, research, Whonix
Patrick closed T542: Keyboard/Mouse Fingerprinting Defense, a subtask of T540: Advanced Attacks Meta Ticket, as Resolved.
Aug 13 2020, 8:32 AM · VirtualBox, KVM, Qubes, security, research, Whonix

Aug 12 2020

HulaHoop closed T530: CPU-induced latency Covert Channel Countermeasures as Invalid.

After running a bunch of tcp ping tests, the conclusion is this attack
is not really effective against TCP like ICMP. The latency is much lower
for TCP pings and though it slightly decreases with cpu stress it is not
consistent. Reloading pages in TBB with cpu stress
on/off does not impact latency readings while doing so with tc
attached has massive latency foot prints - implying it will ironically make such attacks much easier in addition to degrading performance.

Aug 12 2020, 4:30 PM · virtualizer, VMware, VirtualBox, KVM, Qubes, security, Whonix, research
HulaHoop closed T530: CPU-induced latency Covert Channel Countermeasures, a subtask of T540: Advanced Attacks Meta Ticket, as Invalid.
Aug 12 2020, 4:30 PM · VirtualBox, KVM, Qubes, security, research, Whonix

Aug 7 2020

HulaHoop added a comment to T530: CPU-induced latency Covert Channel Countermeasures.

Cyrus recommends adding delays per packet to disrupt inter-packet patterns that remain. The command can be fine tuned as such:

Aug 7 2020, 4:54 PM · virtualizer, VMware, VirtualBox, KVM, Qubes, security, Whonix, research

Aug 1 2020

HulaHoop added a comment to T530: CPU-induced latency Covert Channel Countermeasures.

The good news is I think I've figured out the equivalent tc-netem command looking the slot parameter in the manual:

Aug 1 2020, 3:42 PM · virtualizer, VMware, VirtualBox, KVM, Qubes, security, Whonix, research

May 30 2020

HulaHoop added a comment to T530: CPU-induced latency Covert Channel Countermeasures.

Ticket above closed and convo moved to tails-dev.

May 30 2020, 2:33 PM · virtualizer, VMware, VirtualBox, KVM, Qubes, security, Whonix, research

Apr 23 2020

Patrick updated subscribers of T961: fix USB auto mounting bug / document.
Apr 23 2020, 2:59 PM · research, bug, Whonix 15, Whonix

Feb 14 2020

Patrick updated the task description for T547: add user documentation for Remote Administration, Keystroke Fingerprinting, Stylometry.
Feb 14 2020, 11:49 AM · research, user documentation, Whonix
Patrick added a project to T547: add user documentation for Remote Administration, Keystroke Fingerprinting, Stylometry: research.
Feb 14 2020, 11:49 AM · research, user documentation, Whonix
Patrick triaged T961: fix USB auto mounting bug / document as Normal priority.
Feb 14 2020, 6:12 AM · research, bug, Whonix 15, Whonix

Dec 23 2019

Patrick triaged T948: /tmp etc. separation through polyinstantiation by using namespaces.conf as Normal priority.
Dec 23 2019, 1:09 PM · research, security-misc, Whonix

Dec 11 2019

marmarek added a comment to T509: Consider nftables / Berkeley Packet Filter (BPF) as a replacement for iptables.

It looks like bpfilter is in rather early stages, and it's few years until we'll see it in Debian.

Dec 11 2019, 2:35 AM · iptables, vpn-firewall, whonix-ws-firewall, whonix-gw-firewall, Whonix, refactoring, research
Patrick renamed T509: Consider nftables / Berkeley Packet Filter (BPF) as a replacement for iptables from Consider nftables as a replacement for iptables to Consider nftables / Berkeley Packet Filter (BPF) as a replacement for iptables.
Dec 11 2019, 1:11 AM · iptables, vpn-firewall, whonix-ws-firewall, whonix-gw-firewall, Whonix, refactoring, research
Patrick added a comment to T509: Consider nftables / Berkeley Packet Filter (BPF) as a replacement for iptables.

Or skip nftables and use Berkeley Packet Filter (BPF)?

Dec 11 2019, 1:10 AM · iptables, vpn-firewall, whonix-ws-firewall, whonix-gw-firewall, Whonix, refactoring, research
Patrick updated the task description for T509: Consider nftables / Berkeley Packet Filter (BPF) as a replacement for iptables.
Dec 11 2019, 1:09 AM · iptables, vpn-firewall, whonix-ws-firewall, whonix-gw-firewall, Whonix, refactoring, research

Nov 21 2019

Patrick closed T621: Combatting sclockadj's log spam as Resolved.

Not a problem anymore.

Nov 21 2019, 7:54 PM · Debian version 10 codename Buster, research, Whonix

Nov 6 2019

Patrick closed T444: test if Ricochet IM instructions are functional as Invalid.

https://www.whonix.org/wiki/Chat#Ricochet_IM

Nov 6 2019, 2:33 AM · onion-grater (Control Port Filter Proxy), research, Whonix

Oct 21 2019

Patrick added a comment to T509: Consider nftables / Berkeley Packet Filter (BPF) as a replacement for iptables.

NonaSuomy:

Added requested NFTables example from duclicsic #netfilter freenode.

Oct 21 2019, 5:33 AM · iptables, vpn-firewall, whonix-ws-firewall, whonix-gw-firewall, Whonix, refactoring, research

Oct 17 2019

HulaHoop added a comment to T509: Consider nftables / Berkeley Packet Filter (BPF) as a replacement for iptables.

Starting with Bullseye nftables will be the default:

Oct 17 2019, 5:29 PM · iptables, vpn-firewall, whonix-ws-firewall, whonix-gw-firewall, Whonix, refactoring, research

Oct 15 2019

HulaHoop added a comment to T530: CPU-induced latency Covert Channel Countermeasures.

https://redmine.tails.boum.org/code/issues/17156

Oct 15 2019, 7:26 PM · virtualizer, VMware, VirtualBox, KVM, Qubes, security, Whonix, research

Oct 13 2019

HulaHoop added a comment to T530: CPU-induced latency Covert Channel Countermeasures.

Analysis by Cyrus cited here for completion:

Oct 13 2019, 2:18 PM · virtualizer, VMware, VirtualBox, KVM, Qubes, security, Whonix, research

Oct 6 2019

HulaHoop added a comment to T530: CPU-induced latency Covert Channel Countermeasures.
Oct 6 2019, 8:53 PM · virtualizer, VMware, VirtualBox, KVM, Qubes, security, Whonix, research
Patrick updated subscribers of T530: CPU-induced latency Covert Channel Countermeasures.
Oct 6 2019, 7:50 PM · virtualizer, VMware, VirtualBox, KVM, Qubes, security, Whonix, research
Patrick added a comment to T530: CPU-induced latency Covert Channel Countermeasures.

Reported build failures:

Oct 6 2019, 7:47 PM · virtualizer, VMware, VirtualBox, KVM, Qubes, security, Whonix, research
HulaHoop added a comment to T530: CPU-induced latency Covert Channel Countermeasures.

When an implementation is decided, let's decide if we can include this in security-misc for use on Linux hosts and Kicksecure. We would need some way in detecting the active NIC since on wireless systems wlan0 is the interface of choice and not eth0

Oct 6 2019, 7:01 PM · virtualizer, VMware, VirtualBox, KVM, Qubes, security, Whonix, research
HulaHoop added a comment to T530: CPU-induced latency Covert Channel Countermeasures.

tc-netem is a utility that is part of the iproute2 package in Debian. It leverages functionality already built into Linux and userspace utilities to simulate networks including packet delays and loss.

Oct 6 2019, 4:04 PM · virtualizer, VMware, VirtualBox, KVM, Qubes, security, Whonix, research

Aug 11 2019

Patrick updated the task description for T215: install electrum bitcoin thin client by default?.
Aug 11 2019, 12:13 PM · anon-meta-packages, research, Whonix

Aug 9 2019

Patrick added a comment to T215: install electrum bitcoin thin client by default?.

install electrum appimage by default:
https://github.com/Whonix/anon-meta-packages/commit/71d40f5316ee7eb38eb04142d80d23c56a48407b

Aug 9 2019, 9:50 AM · anon-meta-packages, research, Whonix

Jul 6 2019

Patrick added a comment to T600: Integrating Guix/Nix Package Manager.

Any update?

Jul 6 2019, 10:40 AM · Whonix, packaging, research

Jun 27 2019

Patrick updated the task description for T215: install electrum bitcoin thin client by default?.
Jun 27 2019, 10:59 AM · anon-meta-packages, research, Whonix
Patrick added a comment to T582: revisit handling of /var/lib/dbus/machine-id.

Will keep watching what Tails is doing.

Jun 27 2019, 8:33 AM · Whonix 16, research, Whonix
Patrick edited projects for T582: revisit handling of /var/lib/dbus/machine-id, added: Whonix 16; removed Whonix 15.
Jun 27 2019, 8:33 AM · Whonix 16, research, Whonix

May 12 2019

Patrick added a comment to T582: revisit handling of /var/lib/dbus/machine-id.

Maybe there is no need. It's just when Tails has a ticket, we should
check it at Whonix too. Thank you for looking into this, too!

May 12 2019, 3:36 PM · Whonix 16, research, Whonix
madaidan added a comment to T582: revisit handling of /var/lib/dbus/machine-id.

The way it is now looks fine. Why would it need to be changed?

May 12 2019, 12:36 PM · Whonix 16, research, Whonix
Patrick added a comment to T582: revisit handling of /var/lib/dbus/machine-id.

madaidan (madaidan):

madaidan added a comment.

> https://lists.ubuntu.com/archives/apparmor/2016-February/009371.html says it is used for various things so it might break some things.

Wouldn't using a fake machine-id e.g. a bunch of zeroes fix this?
May 12 2019, 1:21 AM · Whonix 16, research, Whonix

May 11 2019

madaidan added a comment to T582: revisit handling of /var/lib/dbus/machine-id.

https://lists.ubuntu.com/archives/apparmor/2016-February/009371.html says it is used for various things so it might break some things.

May 11 2019, 5:27 PM · Whonix 16, research, Whonix
Patrick added a comment to T582: revisit handling of /var/lib/dbus/machine-id.

Would it cause any issues if the machine-id was just deleted or replaced with a bunch of 0s?

May 11 2019, 7:57 AM · Whonix 16, research, Whonix

May 10 2019

madaidan added a comment to T582: revisit handling of /var/lib/dbus/machine-id.

Would it cause any issues if the machine-id was just deleted or replaced with a bunch of 0s?

May 10 2019, 5:27 PM · Whonix 16, research, Whonix

Apr 6 2019

Patrick closed T801: use libresolv-wrapper rather than functional Whonix-Gateway system DNS resolver? as Invalid.

Unfortunately, not possible.

Apr 6 2019, 6:32 PM · Whonix, Whonix 16, research, anon-gw-dns-conf

Feb 2 2019

HulaHoop closed T567: research: Single Tor-Gateway with Multiple Workstations vs Multiple Tor-Gateways mapped 1:1 to Workstation VMs as Resolved.

The concept was documented for operational use. Auto Guard de-duplication considered too complex to deploy and manual checking is enough.

Feb 2 2019, 2:47 AM · research, Whonix, user documentation

Jan 16 2019

Patrick closed T523: document identity correlation attacks and defenses / Removing Apache Recommendation as Resolved.
Jan 16 2019, 12:20 PM · Whonix 14, Whonix, user documentation, research

Jan 13 2019

HulaHoop added a comment to T523: document identity correlation attacks and defenses / Removing Apache Recommendation.

Done

Jan 13 2019, 12:56 AM · Whonix 14, Whonix, user documentation, research

Jan 6 2019

Patrick added a comment to T523: document identity correlation attacks and defenses / Removing Apache Recommendation.

https://www.whonix.org/wiki/Onion_Services#Step_1:_Install_Server_Software needs update.

Jan 6 2019, 7:24 AM · Whonix 14, Whonix, user documentation, research

Jan 4 2019

HulaHoop added a comment to T523: document identity correlation attacks and defenses / Removing Apache Recommendation.

Done. You can close this ticket once you agree with edits.

Jan 4 2019, 4:58 PM · Whonix 14, Whonix, user documentation, research

Jan 2 2019

Patrick added a comment to T523: document identity correlation attacks and defenses / Removing Apache Recommendation.

Sounds good!

Jan 2 2019, 12:54 PM · Whonix 14, Whonix, user documentation, research

Dec 28 2018

HulaHoop added a comment to T523: document identity correlation attacks and defenses / Removing Apache Recommendation.

From this size comparison on Debian wiki, I think the best and most secure option is the smallest and most minimal one: micro-httpd

Dec 28 2018, 7:31 PM · Whonix 14, Whonix, user documentation, research

Dec 22 2018

Patrick reopened T523: document identity correlation attacks and defenses / Removing Apache Recommendation as "Open".

We still have the warning on https://www.whonix.org/wiki/Onion_Services.

Dec 22 2018, 11:01 AM · Whonix 14, Whonix, user documentation, research

Dec 9 2018

Patrick lowered the priority of T389: make sure Qubes-Whonix has no access to clocksource=xen from High to Normal.
Dec 9 2018, 5:53 AM · mgmt, research, security, Qubes, Whonix

Dec 7 2018

Patrick removed a project from T530: CPU-induced latency Covert Channel Countermeasures: Whonix 15.
Dec 7 2018, 11:06 AM · virtualizer, VMware, VirtualBox, KVM, Qubes, security, Whonix, research
Patrick removed a project from T444: test if Ricochet IM instructions are functional: Whonix 15.
Dec 7 2018, 11:05 AM · onion-grater (Control Port Filter Proxy), research, Whonix
Patrick removed a project from T567: research: Single Tor-Gateway with Multiple Workstations vs Multiple Tor-Gateways mapped 1:1 to Workstation VMs: Whonix 15.
Dec 7 2018, 11:04 AM · research, Whonix, user documentation
Patrick removed a project from T694: Gajim as default messenger: Whonix 15.
Dec 7 2018, 11:02 AM · Whonix, research
Patrick removed a project from T772: Managing programs without Tor Socks / DNS Support: Whonix 15.
Dec 7 2018, 11:00 AM · research

Dec 3 2018

HulaHoop added a comment to T71: Show desktop clock in local time; keep system in UTC.

I think hiding the clock is a bad idea as a user may want to manually run sdwdate to adjust it if it's out of whack before initiating internet traffic. (This is on non-Qubes versions lacking auto time adjust)

Dec 3 2018, 5:15 PM · research, whonix-setup-wizard, usability, desktop, Whonix
HulaHoop added a comment to T509: Consider nftables / Berkeley Packet Filter (BPF) as a replacement for iptables.

https://researchut.com/post/migrating-firewall-to-nftables/

Dec 3 2018, 5:02 PM · iptables, vpn-firewall, whonix-ws-firewall, whonix-gw-firewall, Whonix, refactoring, research

Nov 20 2018

Patrick removed a project from T71: Show desktop clock in local time; keep system in UTC: kde.
Nov 20 2018, 4:01 PM · research, whonix-setup-wizard, usability, desktop, Whonix
Patrick closed T630: Disabling Baloo file indexer as Wontfix.

https://forums.whonix.org/t/user-poll-xfce-vs-kde-kde-deprecation-considered/6235

Nov 20 2018, 3:59 PM · Debian version 10 codename Buster, kde, security, research

Oct 12 2018

HulaHoop added a comment to T567: research: Single Tor-Gateway with Multiple Workstations vs Multiple Tor-Gateways mapped 1:1 to Workstation VMs.

Proposed implementations for multi-Tor suggested here:

Oct 12 2018, 10:44 PM · research, Whonix, user documentation
HulaHoop added a comment to T567: research: Single Tor-Gateway with Multiple Workstations vs Multiple Tor-Gateways mapped 1:1 to Workstation VMs.

The short story is that things get worse very quickly, but there is hope.
The analysis below assumes only the adversary that runs guards and not the local adversary like the host OS or the Whonix processes themselves.
In my analysis I assume a hypothetical adversarial guard bandwidth of 10% of the entire network. This is an arbitrary number since we don't know the real number, but it serves to show the trends as we increase the guards per client and number of clients per user. I do the kind of analysis we do in the Conflux[1] paper which is very relevant here, especially Table 3 and its discussion in section 5.2. I update the numbers and extend that analysis for the scenarios you have described.

  1. 1 guard/client, 1 client/user.

The adversary (i,e, the compromised guard) will have the ability to observe 10% of the clients and hence 10% users. This is the situation today.

  1. 2 guards/client, 1 client/user.

This is worse than 1 above. There is now a 18% probability that only one of the guards is compromised per client and a 1% chance that two guards are compromised per client. The probability of at least one bad guard is hence 19%. There really is not a real distinction between one or two bad guards from the user perspective since in both situations the client will go through a malicious guard in a short period of time, since the guard is picked uniformly at random from the guard set.

  1. 1 guard/client, 2 clients/user.

The observable clients again increase to 19% from the base 10% in 1 above. This means that if the user split her app (or group of apps) across the clients then there is a 19% chance that at least one of the app (groups) is compromised. However, for each client there is still only a 10% chance that a malicious guard is present. Is this configuration better than scenario 2 above? Perhaps, but let's look at the following scenario first.

  1. 2 guards/client, 2 clients/user.

The observable clients increases to 54%. This means that there is a 54% chance that at least one bad guard is present. This is worse than all the other scenarios above. However, if we fix apps (or groups of apps) to particular clients then we can compare to scenario 2 where the app group/client is analogous and the same analysis holds. Then, for each client there is again a 19% chance that there is a malicious guard present. If we compare to 3 above we can see that if we only use 1 guard/client then we can drop the exposure back down to 10% for that client and hence app group.

Taking the above into account we can get good results by keeping the guard set size to 1 and users spin up one client for each app. Then we can achieve at most 10% of apps compromised at *any given time* but not simultaneously. We can call this scenario (which is an extension of scenario 3) the 1 guard/app scenario (1G/A). See the appendix for more tweaks to decrease guard exposure.

If we want to consider 1G/A, then the next question for your user base is that is it better to either 1) have some portion of your apps compromised at *all* times (scenario 1G/A) or 2) have *all* your apps compromised some portion of the time (scenario 1). Tor tends to bend towards option 2, but then they have not considered the option of multi-client usage since it doesn't improve the situation in a non-compartmentalized setting, unlike the Whonix situation. I believe that option 2 is flawed because you never know if you are in fact currently compromised or not. It might be better to go ahead with assuming that you are compromised and mitigating that compromise to some portion of your network activity than all or nothing, which is what option 1 provides.

I hope that answers your questions. Please do not hesitate to get in touch again if you would like to discuss further. I think this is a very interesting problem area and would be happy to contribute to improving the situation.

Best regards,
Tariq Elahi

[1] http://cacr.uwaterloo.ca/techreports/2013/cacr2013-16.pdf

Appendix
We can do better if we allow a user's clients to look at each other's lists to exclude guards that are already picked. The benefit would be that once the bad bandwith has been assigned it can no longer affect subsequent guard selections. However, clients looking at each other's memory space will compromise your vision of process containment. A zero knowledge/oblivious method for comparing guard lists might work to avoid this problem, and indeed the adversarial response will be weak since the best they can do is spread their bad bandwidth over many relays and at best return to the original exposure rate (e.g. 10%) but now with added costs of running many more relays.

Oct 12 2018, 10:42 PM · research, Whonix, user documentation

Sep 20 2018

Patrick triaged T852: research and document how to shut down system on removal of some USB device as Normal priority.
Sep 20 2018, 9:39 AM · Whonix 16, research, Whonix

Sep 18 2018

marmarek added a comment to T691: sdwdate sclockadj change time without spamming logs.

Actually, the "apt-daily.timer: Adding 1h 17min 24.927437s random time" message have real impact, not only noise. Each time sdwdate change time, systemd adds a random delay to those timers. which means the timer will never expire (unless that random delay will happen to be very close to 0 - i.e. below the time until sdwdate change the time, which looks to be 1s).

Sep 18 2018, 1:55 AM · systemd, research, sclockadj, sdwdate, Whonix

Aug 16 2018

HulaHoop closed T367: Mixmaster GUI Options as Wontfix.

Non-Debian dependencies and non materialization of TUF PyPi makes a secure way to obtain this package impossible.

Aug 16 2018, 3:42 PM · user documentation, research, Whonix, usability
HulaHoop placed T600: Integrating Guix/Nix Package Manager up for grabs.
Aug 16 2018, 3:16 PM · Whonix, packaging, research
HulaHoop placed T772: Managing programs without Tor Socks / DNS Support up for grabs.
Aug 16 2018, 3:15 PM · research

Aug 9 2018

Patrick added a project to T774: [Revised] Clock Drift Correction Proposal: KVM.
Aug 9 2018, 3:19 PM · KVM, Whonix, research

Aug 8 2018

Patrick updated the task description for T215: install electrum bitcoin thin client by default?.
Aug 8 2018, 8:58 AM · anon-meta-packages, research, Whonix
Patrick updated the task description for T215: install electrum bitcoin thin client by default?.
Aug 8 2018, 8:39 AM · anon-meta-packages, research, Whonix
Patrick updated the task description for T215: install electrum bitcoin thin client by default?.
Aug 8 2018, 8:37 AM · anon-meta-packages, research, Whonix

Aug 7 2018

Patrick updated the task description for T389: make sure Qubes-Whonix has no access to clocksource=xen.
Aug 7 2018, 4:37 PM · mgmt, research, security, Qubes, Whonix

Jul 25 2018

Patrick closed T691: sdwdate sclockadj change time without spamming logs as Resolved.

This is sorted in a later version of systemd.

Jul 25 2018, 6:39 AM · systemd, research, sclockadj, sdwdate, Whonix
Patrick edited projects for T691: sdwdate sclockadj change time without spamming logs, added: systemd; removed Whonix 16.
Jul 25 2018, 6:39 AM · systemd, research, sclockadj, sdwdate, Whonix

Jul 24 2018

Patrick added a comment to T444: test if Ricochet IM instructions are functional.

There are up to date Whonix 14 testers versions available.

Jul 24 2018, 9:47 AM · onion-grater (Control Port Filter Proxy), research, Whonix
Patrick changed Impact from Whonix:triage to Whonix:normal on T444: test if Ricochet IM instructions are functional.
Jul 24 2018, 9:45 AM · onion-grater (Control Port Filter Proxy), research, Whonix
Patrick renamed T444: test if Ricochet IM instructions are functional from Ricochet IM to test if Ricochet IM instructions are functional.
Jul 24 2018, 9:45 AM · onion-grater (Control Port Filter Proxy), research, Whonix
Patrick updated the task description for T444: test if Ricochet IM instructions are functional.
Jul 24 2018, 9:43 AM · onion-grater (Control Port Filter Proxy), research, Whonix

Jul 22 2018

HulaHoop added a comment to T600: Integrating Guix/Nix Package Manager.

@ng0 I wrote a proposal draft. Feel free to improve it before I post:

Jul 22 2018, 4:23 PM · Whonix, packaging, research

Jul 19 2018

Unknown Object (User) added a comment to T600: Integrating Guix/Nix Package Manager.
Jul 19 2018, 3:19 PM · Whonix, packaging, research
Unknown Object (User) added a comment to T600: Integrating Guix/Nix Package Manager.
Jul 19 2018, 3:12 PM · Whonix, packaging, research

Jul 14 2018

Patrick changed the status of T66: Certificate Authority (CA) Pinning for whonix.org from Invalid to Resolved.

We have now a DNS Certification Authority Authorization (CAA) Policy.

Jul 14 2018, 10:02 AM · research, website, Whonix, security, infrastructure

Jul 9 2018

Patrick added a comment to T84: Should we enable HTTP Public Key Pinning (HPKP) for whonix.org?.
In T84#14765, @marmarek wrote:
Jul 9 2018, 5:21 AM · infrastructure, security, research, website, Whonix
Patrick closed T66: Certificate Authority (CA) Pinning for whonix.org as Invalid.

Same as T84#14765.

Jul 9 2018, 5:20 AM · research, website, Whonix, security, infrastructure
Patrick updated the task description for T66: Certificate Authority (CA) Pinning for whonix.org.
Jul 9 2018, 5:19 AM · research, website, Whonix, security, infrastructure
Patrick updated the task description for T84: Should we enable HTTP Public Key Pinning (HPKP) for whonix.org?.
Jul 9 2018, 5:19 AM · infrastructure, security, research, website, Whonix

Jul 7 2018

Patrick closed T84: Should we enable HTTP Public Key Pinning (HPKP) for whonix.org? as Wontfix.
Jul 7 2018, 12:36 PM · infrastructure, security, research, website, Whonix

Jun 29 2018

HulaHoop added a comment to T801: use libresolv-wrapper rather than functional Whonix-Gateway system DNS resolver?.

Check these alternatives out:

Jun 29 2018, 9:58 PM · Whonix, Whonix 16, research, anon-gw-dns-conf