In T947#19761, @Patrick wrote:But we couldn't just set that IP inside sys-whonix without touching dom0?
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed Advanced Search
Advanced Search
Advanced Search
Apr 3 2020
Apr 3 2020
qvm-prefs sys-whonix ip 10.152.152.10 works great so far. Will test more. And call for testers.
qvm-prefs -D sys-whonix ip
How can I undo qvm-prefs sys-whonix ip 10.152.152.10 back to default?
Mar 30 2020
Mar 30 2020
Patrick added a comment to T914: Whonix Host Live - enable KVM readonly mode - virt-xml vm-name --edit --disk readonly=on.
[1] There is currently no trigger (systemd unit file) to execute /usr/lib/whonix-libvirt/persistent-mode-to-read-write.
Patrick triaged T979: co-install grub-efi-amd64 and grub-pc by default on Whonix-Host ISO as Normal priority.
Mar 29 2020
Mar 29 2020
Mar 28 2020
Mar 28 2020
Patrick changed the status of T975: Replace Debian mentions in /etc/motd and /etc/issue from testing-in-next-build-required to Open.
Mar 27 2020
Mar 27 2020
Included since Whonix 15.0.1.0.8-developers-only.
Mar 26 2020
Mar 26 2020
onion_knight2 added a comment to T914: Whonix Host Live - enable KVM readonly mode - virt-xml vm-name --edit --disk readonly=on.
As of 15.0.1.0.7, the following behavior is observed:
Mar 22 2020
Mar 22 2020
These tests are fully independent.
onion_knight2 added a comment to T910: anti-forensics / amnesia testing of Whonix-Host in Live mode.
Ok, so you want me to:
- boot a Whonix-Host ISO
- Install on HDD
- Reboot on Whonix-Host ISO, do some stuff, shutdown
- See if HDD has been modified (why would it be?)
Correct?
Patrick changed the status of T958: Write VirtualBox Screen Resolution Bug Report from Open to testing-in-next-build-required.
In T910#19667, @onion_knight2 wrote:Whonix Live ISO runs without an HDD.
onion_knight2 added a comment to T910: anti-forensics / amnesia testing of Whonix-Host in Live mode.
Whonix Live ISO runs without an HDD.
I am not sure what you want to test here? Please precise.
Not fully fixed.
This ticket was written at a time when there was only grub-live. I.e. install Whonix on hardware (or Debian + grub live). Boot in live mode. Test if that works. If yes, take an hdd image. Boot again into live mode. Then take another hdd image. Compare these hdd images. Do they 100% match or are there differences? Differences: something wrong. No differences: that would be nice.
onion_knight2 added a comment to T910: anti-forensics / amnesia testing of Whonix-Host in Live mode.
Do you mean: starting an installed version in live-mode (not tested, not supported yes) or starting a Whonix-Host iso file?
onion_knight2 added a comment to T969: instructions how to burn Whonix-Host ISO image to DVD or USB.
Sub pages or sub chapters of 1 wiki page?
Patrick changed the status of T929: Whonix XFCE Wallpaper / Background Image from Open to testing-in-next-build-required.
Thanks!
Mar 21 2020
Mar 21 2020
This issue is fixed now due to the quiet boot parameter. kernel.printk=3 3 3 3 isn't needed anymore.
Patrick renamed T942: Whonix Host Firewall for Whonix Host from polish Whonix Host Firewall for Whonix Host to Whonix Host Firewall for Whonix Host.
We actually ended up using Whonix KVM and placing images to:
Patrick updated the task description for T908: copy Whonix VM images to Whonix-Host and set up during build.
Patrick added a project to T908: copy Whonix VM images to Whonix-Host and set up during build: Whonix 15.
Patrick added a project to T910: anti-forensics / amnesia testing of Whonix-Host in Live mode: Whonix 15.
Patrick added a project to T928: install xfce4-power-manager on Whonix Host and Kicksecure Host: Whonix 15.
Patrick edited projects for T929: Whonix XFCE Wallpaper / Background Image, added: Whonix 15; removed Whonix 16.
Patrick added a project to T969: instructions how to burn Whonix-Host ISO image to DVD or USB: Whonix 15.
Patrick changed the status of T970: Whonix-Host hash, gpg, signify, torrent, signature creation script from Open to testing-in-next-build-required.
Mar 17 2020
Mar 17 2020
onion_knight2 added a comment to T914: Whonix Host Live - enable KVM readonly mode - virt-xml vm-name --edit --disk readonly=on.
Do you know how to run calamares hook scripts? I think I saw this before but I can't find it anymore. Or we have to invent our own mini calamares module similar to how package calamares-settings-debian invented new calamares modules?
Patrick added a comment to T914: Whonix Host Live - enable KVM readonly mode - virt-xml vm-name --edit --disk readonly=on.
In T914#19541, @onion_knight2 wrote:I don't know. Not implemented yet. Currently installed (persistent) Whonix-Host does not have live-boot option.
Patrick triaged T970: Whonix-Host hash, gpg, signify, torrent, signature creation script as Normal priority.
Mar 7 2020
Mar 7 2020
Patrick changed the status of T965: install gvfs by default / fix access LUKS encrypted USB drive with Thunar from Open to Review.
Will come in Whonix 15.0.0.9.4 and above.
Mar 6 2020
Mar 6 2020
Patrick updated subscribers of T965: install gvfs by default / fix access LUKS encrypted USB drive with Thunar.
Patrick renamed T965: install gvfs by default / fix access LUKS encrypted USB drive with Thunar from fix access LUKS encrypted USB drive with Thunar to install gvfs by default / fix access LUKS encrypted USB drive with Thunar.
Mar 4 2020
Mar 4 2020
Patrick updated the task description for T960: hardened kernel Debian packaging and APT integration - hkapt.
Feb 29 2020
Feb 29 2020
Patrick closed T913: bug: not all files form /etc/skel are copied to /home/user / create user "user" at boot time as Resolved.
Works well in Non-Qubes-Whonix. Solution was this one:
Feb 24 2020
Feb 24 2020
Patrick triaged T965: install gvfs by default / fix access LUKS encrypted USB drive with Thunar as Normal priority.
Feb 16 2020
Feb 16 2020
Feb 14 2020
Feb 14 2020
Feb 13 2020
Feb 13 2020
Patrick renamed T960: hardened kernel Debian packaging and APT integration - hkapt from hardened kernel Debian packaging and APT integration to hardened kernel Debian packaging and APT integration - hkapt.
Patrick triaged T960: hardened kernel Debian packaging and APT integration - hkapt as Normal priority.
Feb 12 2020
Feb 12 2020
Jan 15 2020
Jan 15 2020
In T950#19249, @Patrick wrote:
Jan 1 2020
Jan 1 2020
In T950#19231, @madaidan wrote:quiet
Dec 26 2019
Dec 26 2019
Patrick edited projects for T953: extrepo - safely adding repos, added: Whonix 15; removed Restricted Project.
Dec 25 2019
Dec 25 2019
Patrick updated the task description for T950: set kernel.printk sysctl to prevent kernel info leaks.
Patrick updated the task description for T950: set kernel.printk sysctl to prevent kernel info leaks.
Dec 24 2019
Dec 24 2019
This just prevents writing to /dev/kmsg. It doesn't stop kernel logs being displayed during boot.
Still wondering if initramfs modification this can be avoided... Still wondering if kernel.printk can be set through a kernel parameter. Looking again at https://github.com/torvalds/linux/blob/master/Documentation/admin-guide/kernel-parameters.txt...
Sounds good.
We can use a sysctl.d drop-in and an initramfs hook in security-misc so non-initramfs users will still be mostly protected.
I guess because a sysctl.d drop-in config file is easy and catches most.
initramfs hook covers only initramfs users. Not dracut. But
security-misc initramfs hook sounds good enough. dracut support can
come later, if ever. Please implement.
Why not use an initramfs hook in security-misc? Not everyone will have security-misc and apparmor-profile-everything installed. Users with just security-misc installed will still have some kernel logs shown during early boot.
Yes. Probably both. initramfs for apparmor-profile-everything users and
/etc/sysctl.d/ security-misc.
Dec 23 2019
Dec 23 2019
Should this be set in the initramfs?
Dec 5 2019
Dec 5 2019
Patrick updated the task description for T771: install magic-wormhole by default / Implementing an Onionshare alternative.
Aug 16 2019
Aug 16 2019
Jul 22 2019
Jul 22 2019
Yes Zulucrypt included and functional on KVM 15. However fixes for both zulucrypt and tomb haven't made it into Buster from what I've tested. Zulucrypt has a tomb plugin to open Tomb files too.
Jul 15 2019
Jul 15 2019
marmarek added a comment to T913: bug: not all files form /etc/skel are copied to /home/user / create user "user" at boot time.
In T913#18744, @Patrick wrote:Do you see any issues with "create home directory on first login" in Qubes?
Patrick added a comment to T913: bug: not all files form /etc/skel are copied to /home/user / create user "user" at boot time.
In T913#18743, @marmarek wrote:Can you give some more context here?
marmarek added a comment to T913: bug: not all files form /etc/skel are copied to /home/user / create user "user" at boot time.
Can you give some more context here? Is it the problem that user is created too early (before /etc/skel is fully populated)? Or is it a problem that it's created at all? Should there be a difference between Qubes and non-Qubes case?
Patrick updated the task description for T913: bug: not all files form /etc/skel are copied to /home/user / create user "user" at boot time.
Jul 14 2019
Jul 14 2019
Patrick updated the task description for T913: bug: not all files form /etc/skel are copied to /home/user / create user "user" at boot time.
Jul 8 2019
Jul 8 2019
Removed a few. Would not start without openat, so kept.
Yay, we have ProtectSystem=strict now.
Jul 7 2019
Jul 7 2019
Yay, we have ProtectSystem=strict now.
Can we exclude ExecStartPre=/usr/lib/onion-grater-merger from systemd hardening?
Error back after reboot.
Jul 6 2019
Jul 6 2019
https://github.com/Whonix/onion-grater/blob/master/lib/systemd/system/onion-grater.service currently works without ReadWritePaths. So let's not add?
https://github.com/Whonix/onion-grater/blob/master/lib/systemd/system/onion-grater.service currently works without ReadWritePaths. So let's not add?
Jul 4 2019
Jul 4 2019
It's a file, not a folder.
Whonix OLD Issue Tracker · PLEASE DO NOT POST NEW TICKETS HERE · OLD Issue Tracker - Unread Notifications · OLD Issue Tracker - Feed · OLD Issue Tracker - Open Issues · NEW Issue Tracker · Homepage · Blog · Forum · Legal · Imprint · Privacy Policy · Terms of Use · Disclaimer