Jan 19 2023
Now tracked here:
https://forums.whonix.org/t/coyim-in-whonix-development-discussion/5901
Dec 8 2022
whonixcheck was renamed to systemcheck and is now functional in Kicksecure.
Oct 15 2021
Not possible because of above issue.
Mar 21 2020
Whonix-Host considerations:
Mar 12 2020
Dec 23 2019
Oct 6 2019
Implemented for some time now.
Aug 31 2019
Jul 27 2019
Jul 25 2019
remove qubes-core-agent dependency on initscripts
https://github.com/QubesOS/qubes-issues/issues/5133
but it doesnt happen on plain debian-qubes template , any idea why?
Jul 22 2019
Problem has since been reported and fixed upstream. Let's look into re-including by Bullseye.
Jul 6 2019
It was copied from native setup_ip script, details here:
https://github.com/qubesos/qubes-core-agent-linux/commit/5cbb38a2
https://github.com/qubesos/qubes-issues/issues/700
It definitely was relevant for old stubdomain hosting qemu (which is still possible to use in R4.0). Not sure if applies to new linux-based stubdomain.
It may be not needed anymore. To verify that, try removing those lines and check networking in Windows (or other OS without Xen PV drivers).
Any idea? @marmarek
Jun 27 2019
Blocked by Qubes.
Qubes start menu incompatible with DispVMs launching GUI applications into the background
https://github.com/QubesOS/qubes-issues/issues/5129
Will keep watching what Tails is doing.
Jun 23 2019
Does it work after you comment ProtectSystem=strict and ReadWriteDirectories=? I think on Qubes-Whonix it is trying to write to a directory in /var/run (probably /var/run/qubes-service). I can't test as I don't use Qubes.
Unfortunately not. On Qubes-Whonix. Could be Non-Qubes-Whonix vs
Qubes-Whonix?
Does it work using this? It looks like it needs the openat syscall which it now allows.
Does not work yet. @madaidan
Jun 14 2019
Apr 14 2019
Apr 6 2019
Unfortunately, not possible.
To solve this:
Mar 27 2019
release kloak v0.2
Mar 1 2019
Many code enhancements were recently added by its author.
Nov 20 2018
Oct 28 2018
No problem, but needs to add the commands manually to firetools in the GW.
I disagree. Firetools makes administration easier and has a place on both VMs.
Oct 26 2018
firejail is enough for Whonix-GW
firejail + firetools for Whonix-WS
Oct 13 2018
@HulaHoop that doesnt mean we dont install firejail by default.