This was done. If not, please create specific tickets where it isn't done.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Nov 6 2019
Jul 8 2019
Removed a few. Would not start without openat, so kept.
Yay, we have ProtectSystem=strict now.
Jul 7 2019
Yay, we have ProtectSystem=strict now.
Can we exclude ExecStartPre=/usr/lib/onion-grater-merger from systemd hardening?
Error back after reboot.
Jul 6 2019
https://github.com/Whonix/onion-grater/blob/master/lib/systemd/system/onion-grater.service currently works without ReadWritePaths. So let's not add?
https://github.com/Whonix/onion-grater/blob/master/lib/systemd/system/onion-grater.service currently works without ReadWritePaths. So let's not add?
Jul 4 2019
It's a file, not a folder.
It's a file, not a folder. Nothing in the code of
/usr/lib/onion-grater-merger writes to /usr/lib/onion-grater-merger.
Jul 3 2019
I just re-read the error message. Try adding
That's weird. Onion-grater is trying to write to somewhere that's being mounted read-only by systemd.
Jul 1 2019
Merged your changes.
Jun 24 2019
Jun 23 2019
Does it work after you comment ProtectSystem=strict and ReadWriteDirectories=? I think on Qubes-Whonix it is trying to write to a directory in /var/run (probably /var/run/qubes-service). I can't test as I don't use Qubes.
Unfortunately not. On Qubes-Whonix. Could be Non-Qubes-Whonix vs
Qubes-Whonix?
Does it work using this? It looks like it needs the openat syscall which it now allows.
Does not work yet. @madaidan
Dec 9 2018
Dec 7 2018
Sep 18 2018
Actually, the "apt-daily.timer: Adding 1h 17min 24.927437s random time" message have real impact, not only noise. Each time sdwdate change time, systemd adds a random delay to those timers. which means the timer will never expire (unless that random delay will happen to be very close to 0 - i.e. below the time until sdwdate change the time, which looks to be 1s).
Aug 15 2018
Jul 25 2018
This is sorted in a later version of systemd.
Mar 7 2018
Feb 6 2018
Jul 23 2017
Jul 11 2017
All yes.
sudo netstal -tulpen
JasonJAyalaP (Jason J. Ayala P.):
JasonJAyalaP added a comment.
sudo apt-get remove control-port-filter-python It wants to remove everything. I don't think 'Replaces' worked.
sudo service tor-controlport-filter stop
sudo service onion-grater start
same failure
if i try
sudo apt-get remove control-port-filter-python
It wants to remove everything. I don't think 'Replaces' worked.
Jul 9 2017
Probably tor-controlport-filter systemd unit file (the old one) still
running and blocking the onion-grater systemd unit file.
Jul 7 2017
Python is choking on the line:
server = FilteredControlPortProxy(address, FilteredControlPortProxyHandler)
Jul 6 2017
sudo journalctl -u onion-grater
Jul 5 2017
sudo service onion-grater status just tells me that it failed to load. Any clues about how to debug this?
Jul 1 2017
Should be even easier since onion-grater debian/control contains
Replaces: control-port-filter-python. So just installing onion-grater
should do.
Question: To install OG in whonix 14 dev, so I simply pull the repo, make deb-icup, stop the old tor control port filter proxy, and start onion grater?
Jun 27 2017
They happily take it if we contribute it.
Tails didn't feel the need to use system call filtering?
Jun 26 2017
In T631#13827, @JasonJAyalaP wrote:Do you mean we ported it from Tails to Whonix?
Using the hardening broke Tails? What do you mean?
Jun 25 2017
I haven't tested it yet and unfortunately I'm very busy these days, so cpfp apparmor work is up for grabs.
Jun 22 2017
In T631#13769, @JasonJAyalaP wrote:@Patrick
What do we need for the next dev release for hula?
Jun 20 2017
@Patrick
What do we need for the next dev release for hula?
Mar 1 2017
In T424#12530, @Patrick wrote:A systemd --user instance knows nothing about the systemd --system instance. I.e. a systemd --user instance cannot reference After=some-system.service. Source:
https://lists.freedesktop.org/archives/systemd-devel/2017-February/038361.html
So we cannot use qubes-whonixsetup.service After=qubes-gui-agent.service.
systemd feature request - systemd --user instance ability to reference systemd --system services with After= etc.:
https://github.com/systemd/systemd/issues/5462
Feb 28 2017
Asked about how to set the environment variables and got some answers:
https://lists.freedesktop.org/archives/systemd-devel/2017-February/038365.html
Feb 26 2017
A systemd --user instance knows nothing about the systemd --system instance. I.e. a systemd --user instance cannot reference After=some-system.service. Source:
Feb 21 2017
One mistake fixed.
This unfortunately has quite a chance to have messed up an argument an introduce a regression.
That worked. Somewhat. Now I need to figure out if there is a sane way to sort out the environment variables.
As per
In T424#12408, @Patrick wrote:I haven't figured out yet how to cleanly (or uncleanly) enable systemd user services using Debian packaging. sudo -u user systemctl --user enable mytest will probably not work (apt-get somehow does not like sudo -u user anymore since Debian stretch), and that would not be a clean solution either.
Feb 20 2017
One step closer.
Feb 14 2017
Yes, that would be great and there is still time until the final release.
As soon as the next dev release (with the working KDE menus) is out I'll build it and start working.
Feb 13 2017
In T631#12242, @HulaHoop wrote:As in the seccomp stuff?
As in the seccomp stuff? I think I can but can you help me find the original topic so I can re-create the testing environment I used back then?
Since you originally added this, do you think you could re-invent it? @HulaHoop
Feb 11 2017
Not easy. Need to wait for reply from TPO.
Jan 18 2017
Jun 16 2016
Since rinetd has been replaced with socat in T464, this code can be removed.
Jun 5 2016
May 14 2016
Mar 16 2016
@HulaHoop reported it works in KVM.
Feb 10 2016
T355#5608 should be a good enough summary. And done. Nothing left to do here.
A related issue....
systemd AppArmorProfile= directive unavailable leads to not loading AppArmor profile on Debian jessie:
Nov 29 2015
do not let systemd service enter failed state of host config has not been applied:
https://github.com/Whonix/shared-folder-help/commit/24143991888ab900effe4b11f7eb55172af6793d
Nov 20 2015
Nov 12 2015
I think the current solution (overriding 'ExecStartPre' and 'ExecStopPost') is ok. Do you include those firewall rules in Whonix firewall? Without such redirection, VMs will not be able to connect to the updates proxy.
Implemented the above /lib/systemd/system/qubes-updates-proxy.service.d/40_qubes-whonix.conf solution for now...