As of 15.0.1.0.7, the following behavior is observed:
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Mar 27 2020
Mar 26 2020
Mar 22 2020
These tests are fully independent.
Ok, so you want me to:
- boot a Whonix-Host ISO
- Install on HDD
- Reboot on Whonix-Host ISO, do some stuff, shutdown
- See if HDD has been modified (why would it be?)
Correct?
In T910#19667, @onion_knight2 wrote:Whonix Live ISO runs without an HDD.
Whonix Live ISO runs without an HDD.
I am not sure what you want to test here? Please precise.
Not fully fixed.
This ticket was written at a time when there was only grub-live. I.e. install Whonix on hardware (or Debian + grub live). Boot in live mode. Test if that works. If yes, take an hdd image. Boot again into live mode. Then take another hdd image. Compare these hdd images. Do they 100% match or are there differences? Differences: something wrong. No differences: that would be nice.
Do you mean: starting an installed version in live-mode (not tested, not supported yes) or starting a Whonix-Host iso file?
Sub pages or sub chapters of 1 wiki page?
Thanks!
Mar 21 2020
This issue is fixed now due to the quiet boot parameter. kernel.printk=3 3 3 3 isn't needed anymore.
We actually ended up using Whonix KVM and placing images to:
Mar 17 2020
Do you know how to run calamares hook scripts? I think I saw this before but I can't find it anymore. Or we have to invent our own mini calamares module similar to how package calamares-settings-debian invented new calamares modules?
In T914#19541, @onion_knight2 wrote:I don't know. Not implemented yet. Currently installed (persistent) Whonix-Host does not have live-boot option.
Mar 7 2020
Will come in Whonix 15.0.0.9.4 and above.
Mar 6 2020
Mar 4 2020
Feb 29 2020
Works well in Non-Qubes-Whonix. Solution was this one:
Feb 24 2020
Feb 16 2020
Feb 14 2020
Feb 13 2020
Feb 12 2020
Jan 15 2020
In T950#19249, @Patrick wrote:
Jan 1 2020
In T950#19231, @madaidan wrote:quiet
Dec 26 2019
Dec 25 2019
Dec 24 2019
This just prevents writing to /dev/kmsg. It doesn't stop kernel logs being displayed during boot.
Still wondering if initramfs modification this can be avoided... Still wondering if kernel.printk can be set through a kernel parameter. Looking again at https://github.com/torvalds/linux/blob/master/Documentation/admin-guide/kernel-parameters.txt...
Sounds good.
We can use a sysctl.d drop-in and an initramfs hook in security-misc so non-initramfs users will still be mostly protected.
I guess because a sysctl.d drop-in config file is easy and catches most.
initramfs hook covers only initramfs users. Not dracut. But
security-misc initramfs hook sounds good enough. dracut support can
come later, if ever. Please implement.
Why not use an initramfs hook in security-misc? Not everyone will have security-misc and apparmor-profile-everything installed. Users with just security-misc installed will still have some kernel logs shown during early boot.
Yes. Probably both. initramfs for apparmor-profile-everything users and
/etc/sysctl.d/ security-misc.
Dec 23 2019
Should this be set in the initramfs?
Dec 5 2019
Aug 16 2019
Jul 22 2019
Yes Zulucrypt included and functional on KVM 15. However fixes for both zulucrypt and tomb haven't made it into Buster from what I've tested. Zulucrypt has a tomb plugin to open Tomb files too.
Jul 16 2019
In T913#18744, @Patrick wrote:Do you see any issues with "create home directory on first login" in Qubes?
In T913#18743, @marmarek wrote:Can you give some more context here?
Jul 15 2019
Can you give some more context here? Is it the problem that user is created too early (before /etc/skel is fully populated)? Or is it a problem that it's created at all? Should there be a difference between Qubes and non-Qubes case?
Jul 14 2019
Jul 8 2019
Removed a few. Would not start without openat, so kept.
Yay, we have ProtectSystem=strict now.
Yay, we have ProtectSystem=strict now.
Can we exclude ExecStartPre=/usr/lib/onion-grater-merger from systemd hardening?
Jul 7 2019
Error back after reboot.
Jul 6 2019
https://github.com/Whonix/onion-grater/blob/master/lib/systemd/system/onion-grater.service currently works without ReadWritePaths. So let's not add?
https://github.com/Whonix/onion-grater/blob/master/lib/systemd/system/onion-grater.service currently works without ReadWritePaths. So let's not add?
Jul 4 2019
It's a file, not a folder.
It's a file, not a folder. Nothing in the code of
/usr/lib/onion-grater-merger writes to /usr/lib/onion-grater-merger.
Jul 3 2019
I just re-read the error message. Try adding
That's weird. Onion-grater is trying to write to somewhere that's being mounted read-only by systemd.
Jul 1 2019
Merged your changes.
Jun 27 2019
I see.
BTW it's certainly about fonts. here you can select whonix_firstrun-whonix-14-firstrun-20180915 from the dropdown above the screenshot (click eye icon at the right) and slide vertical bar to see old and new version.
marmarek (Marek Marczykowski-Górecki):
Is there a reason for fixed geometry of those widgets, instead of letting Qt figure it out based on the content?
Maybe different fonts installed? Is there a reason for fixed geometry of those widgets, instead of letting Qt figure it out based on the content? I suppose there may be more problems like this in the future. Especially if proper HiDPI support will come into play...
I have no idea why this started happening without changes. Perhaps due to underlying libraries changes. Anyhow, fixed in git master.
Work for me too in new build https://forums.whonix.org/t/qubes-whonix-15-templatevms-debian-buster-based-4-0-1-201906232114-testers-wanted/7601