Dev/VirtualBox
From Whonix
< Dev
Is VirtualBox an Insecure Choice?[edit]
Update:
Although VirtualBox is not an ideal choice, fortunately other platforms are supported:
For greater security, users with suitable hardware and sufficient skill are recommended to prefer Qubes-Whonix ™ (a bare-metal hypervisor) over Type 2 hypervisors like VirtualBox.
The primary reason Whonix ™ supports VirtualBox is because it is a familiar, cross-platform virtualizer which can attract more users to open source (free/Libre) software, Tor and Linux in general. By remaining highly accessible, Whonix:
- Increases the scope of potential growth in the user base.
- Attracts greater attention as a suitable anonymity-focused operation system.
- Increases the likelihood of additional human resources and monetary contributions.
- Allows novice users to easily test Whonix ™ and learn more about security and anonymity practices.
- Improves the relative security and anonymity of Tor / Tor Browser users by offering a virtualized solution.
- See also Arguments for keeping VirtualBox Support.
Old statement:
If you would like to see the old statement, please press on expand on the right.
Whonix ™ in VirtualBox vs Tor / Tor Browser / Torified Applications on the Host[edit]
It is recognized that VirtualBox is not an ideal choice; see Dev/Virtualization Platform. However, there are different goals to bear in mind - Whonix ™ is primarily focused on protecting a user's IP address / location.
A common refrain of critics is that VirtualBox is "too weak". This is a theoretical concern and does not have any practical implications at present, since Whonix ™ in VirtualBox is actually more secure than running Tor, Tor Browser or torified applications on the host in many cases; see Whonix ™ Security in the Real World.
It must be remembered that there are no alternatives for a large segment of the population who do not have sufficiently powerful hardware to run Qubes-Whonix ™, or who are technically incapable of running KVM. In this case, it is safer for them to run Whonix ™ in VirtualBox, rather than continuing to utilize Tor on the host. For example, Whonix ™ helps to protect against future proxy bypass bugs [archive] or software which does not honor proxy settings [archive].
The strength of Whonix ™ and virtualization in general is adherence to the security by isolation principle. VirtualBox critics need to objectively consider how many exploits currently exist for VirtualBox and the track record of exploits. Admittedly, virtual machine exploits may become far more problematic in the future, but at present Whonix ™ is considered to provide more security out of the box running in VirtualBox, than not.
Platforms with Improved Security[edit]
Anybody seriously considering Whonix ™ for improved security should refer to the Documentation, particularly the Security Guide and Advanced Security Guide entries, as well as supported platforms other than VirtualBox. Whonix ™ is a poster child for the Isolating Proxy Concept [archive] and Security by Isolation [archive].
Many users still default to running Tor on their Windows or Linux host. Whonix ™ is immediately available to this cohort to substantially improve their real world security. Indeed, Whonix ™ is the only up-to-date OS designed to be run inside a VM and paired with Tor, which is actively maintained and developed. Other similar projects like JanusVM [archive] are seriously outdated and no longer actively maintained. [1]
Whonix ™ cannot serve all target audiences. Users seeking a higher security solution will prefer other supported platforms, like Qubes-Whonix ™. "Hardcore" users may prefer to build their own custom hardened solutions, while still profiting from Whonix ™ research and source code. Hardened solutions like the Hardened Gentoo based Whonix-Gateway ™ are more difficult to use and therefore cannot be set as the default installation for Whonix ™.
VirtualBox missing features[edit]
- The following is non-ideal for verifiable builds, because we have to convert to vdi first:
- export VM using VDI instead of VMDK? [archive]: seems not possible.
- Mount VMDK on Debian buster? [archive]: seems not possible.
- VirtualBox uses VMDK version 3. This is non-ideal, because working with these images is difficult.
- Converting these images is difficult.
qemu-img version 1.6.1 (qemu-img convert "vmdk_file" -O RAW "vdi_file") fails with: qemu-img: 'image' uses a vmdk feature which is not supported by this qemu version: VMDK version 3, which is a known issue in qemu [archive].As per this [archive], QEMU version equal or bigger than 2.8 should be capable to work with VMDK version 3 disks. TODO: try- Therefore it is required to convert them with VBoxManage to .vdi first. (VBoxManage clonehd --format VDI "vmdk_file" "vdi_file")
Therefore the Free guestmount doesn't support mounting VMDK version 3 as well (because it internally uses qemu-img).(Still true?)It requires proprietary software to mount them, such as the proprietary nbdkit plugin vddk [archive]. We're not aware of a Free Software alternative yet.(Still true?)- When importing VMs these become VDI images nowadays with recent VirtualBox versions.
- Converting these images is difficult.
- VirtualBox Guest Additions Debian Packages unavailable from Oracle Repository [archive]
- Can a guest find out its host operating system? [archive]: seems not possible. This is is non-ideal, because we can not warn when host operating systems are being used we don't think are the right tool for hosting Whonix ™ VMs.
- Signatures (not important because we offer OpenPGP / gpg signatures):
Tickets:
- "modifyvm --resize doesn't work with snapshots" (#9103 [archive])
- "modifyhd --resize should warn users about existing snapshots" (#10818 [archive]), and
- "modifyhd --resize should not be permitted when snapshots exist" (#13046 [archive]).
- export VM disk image format: vdi instead of vmdk (ova or different VM container format) [archive]
[edit]
Quote https://people.debian.org/~lucas/virtualbox-buster/ [archive]
Virtualbox is not available in Debian 10 (nor in backports). The reasons are discussed at length in https://bugs.debian.org/794466 [archive] and various other mailing list threads, but can be summarized as:
- Virtualbox is not suitable for Debian stable releases because of the lack of cooperation of Oracle on security support (that’s the Debian security team decision).
- Since it is not suitable for stable releases, it cannot be included in the testing suite (that’s the Debian release team decision).
- It also cannot be included in official backports, as packages must be in testing before they get backported (that’s the Debian backports team’s decision).
There is hope this will improve in future: please add VirtualBox to fasttrack [archive]
[edit]
Quote Whonix KVM:
The VirtualBox developer team have recently taken the decision to switch out the BIOS in their hypervisor. However, it now comes with one that requires compilation by a toolchain that does not meet the definition of Free Software as per the guidelines of the Free Software Foundation. This move is considered problematic for free and open source software projects like Debian, on which Whonix ™ is based. The issues of the Open Watcom License are explained in this thread [archive] on the Debian Mailinglist. In summary, there are issues surrounding the contradictory language of the license, the assertion of patents against software that rely upon it, and the placing of certain restrictions on software uses. For these reasons, those who care about running FOSS and appreciate its ethical views are recommended to avoid running VirtualBox; also see avoid non-freedom software.
References:
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709899 [archive]
- http://lists.debian.org/debian-devel/2013/08/msg00057.html [archive]
- "Virtualbox ships a BIOS that requires Watcom to compile from real sources, precompiled copy they ship as well is free but is not the preferred form for modification." http://lists.debian.org/debian-devel/2013/08/msg00106.html [archive]
- https://lists.torproject.org/pipermail/tor-talk/2013-September/029978.html [archive]
- ticket asking Sybase to fix licensing issues for Watcom compiler [archive]
- ticket asking Oracle to use a compiler different than Watcom [archive]
- gcc feature request: feature request: 16-bit x86 C compiler / support compilation of (VirtualBox) BIOS [archive]
- gcc-ia16 feature request: upstream to gcc.gnu.org [archive]
VirtualBox Guest Additions
andVirtualBox Oracle VM VirtualBox Extension Pack
are different things.- This is unrelated to
VirtualBox Oracle VM VirtualBox Extension Pack
, which is proprietary, and which was never in Debian.
Does Debian build VirtualBox using Open Watcom? No. Quote debian/copyright
file [archive] from Debian VirtualBox Repository [archive]:
This package is not part of the Debian operating system. It is in the "contrib" area of the Debian archive because it requires a non-free compiler (Open Watcom) to build the BIOS. Upstream provides pre-built BIOS images which is used instead.
- https://github.com/mirror/vbox/blob/master/src/VBox/Devices/PC/BIOS/VBoxBiosAlternative.asm [archive]
- Where is the pre-built BIOS image downloaded from?
- Where is the pre-built BIOS image in Debian Debian VirtualBox Repository?
Debian is already using VBoxBiosAlternative
:
Quote https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1605337 [archive] / https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1605337/comments/3 [archive]
<oracle> LocutusOfBorg: btw, there are no BIOS binaries in the vbox source tree. only the VBoxBiosAlternative.* files, which are used if you don't have OpenWatcom.
Frank Mehnert <frank.mehnert@oracle.com>
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691148#35 [archive]
VirtualBox Guest Additions ISO Freedom vs Non-Freedom[edit]
VirtualBox Guest Additions
andVirtualBox Oracle VM VirtualBox Extension Pack
are different things.- This is unrelated to
VirtualBox Oracle VM VirtualBox Extension Pack
, which is proprietary, and which was never in Debian. - Debian lists virtualbox-guest-additions-iso [archive] as non-free [archive] but that is a bug.
- Debian bug report: move virtualbox-guest-additions-iso from non-free to contrib [archive]
VirtualBox Guest Additions
are Freedom Software.
A part of Guest Additions source code is the part of OSE repository and licensed under GPLv2. Guest Additions build also includes big list of 3rd party files under various permissive licenses
At the same time VirtualBox binary packages which are distributed freely includes Guest Additions ISO, and Licensing FAQ (https://www.virtualbox.org/wiki/Licensing_FAQ [archive]) clearly states: Yes. The GPLv2 allows you to distribute the VirtualBox Guest Additions, in modified or unmodified form, as long as you adhere to the terms and conditions of the GPLv2.
I hope that answers your question.
VirtualBox Open Source vs Closed Source[edit]
VirtualBox
is Open Source.VirtualBox Guest Additions
are Open Source.- Installed by default in Whonix ™ VirtualBox.
- See VirtualBox Guest Additions ISO Freedom vs Non-Freedom.
VirtualBox Oracle VM VirtualBox Extension Pack
is proprietary.- Not installed by default in Whonix ™ VirtualBox.
- Neither used nor required by most users.
Open Source here means, the full corresponding source code is released under Free Software Foundation (FSF), Open Source Initiative (OSI) and The Debian Free Software Guidelines (DFSG) approved licenses.
However the is a build toolchain issue elaborated in chapter VirtualBox Unavailable in Debian main due to Licensing Issues.
VirtualBox Integration[edit]
Issue[edit]
Goal: Installation of the VirtualBox host software with functional VirtualBox guest additions.
This was previously very difficult due to many issues of which none is caused by Whonix ™. The purpose of this chapter is to document the current implementation for those wondering why it has been implemented this way and perhaps hearing if there are any better alternatives. Here is a summary of these issues:
Custom Debian backport building failing due to dependency issues [archive]. Very difficult [archive]. Even if that was solved, there would still be the broken compilation from source code issue [archive].
The Lucas Nussbaum Debian buster backport repository [archive] was not an option either at time of initial implementation. [3] In 23 July 2020 VirtualBox latest version in Lucas Nussbaum repository was
virtualbox_6.1.4-dfsg-1~~bpo10+1_amd64.deb 2020-02-22 07:52
while upstream virtualbox.org was at
virtualbox-6.1_6.1.12-139181~Debian~buster_amd64.deb
.
VirtualBox was not available from Debian fasttrack
[archive] at time of initial implementation. VirtualBox from Debian fasttrack
will be considered for Whonix ™ 16
and above.
VirtualBox Guest Additions Debian Packages are unavailable from upstream virtualbox.org Debian repository [archive].
Previous call for help:
- https://forums.whonix.org/t/missing-dependencies-on-buster-for-virtualbox-6-1-6/9634/5 [archive]
- https://twitter.com/Whonix/status/1268525273852661765 [archive]
- https://www.facebook.com/Whonix/posts/3899452270096999 [archive]
What is the importance VirtualBox in Debian buster
? It is the base distribution which Whonix ™ is based on and the distribution used to build Whonix ™ for VirtualBox for Linux, Windows and macOS from source code.
Related:
- VirtualBox feature request: add Debian 11 / bullseye to Linux Downloads / APT repository [archive]
Implementation[edit]
To be able to continue providing Whonix ™ for VirtualBox, from Whonix ™ 15.0.1.4.8
and above the following implementation is in use:
- VirtualBox Host Software
- Whonix ™ build script will download VirtualBox host software package
virtualbox-6.1
from upstream virtualbox.org Debian repository [archive]. [4] That repository contains recent, functional backports for Debianbuster
.- repository: https://download.virtualbox.org/virtualbox/debian [archive]
Packages
file: https://download.virtualbox.org/virtualbox/debian/dists/bullseye/contrib/binary-amd64/Packages [archive]- At time of initial implementation contained
virtualbox-6.1_6.1.12-139181~Debian~buster_amd64.deb
(Scroll down. IgnorePackage: virtualbox-5.2
.). I.e. VirtualBox version6.1.12
.
- At time of initial implementation contained
- Users of Debian
buster
will be advised to install the VirtualBox from the Whonix ™ APT repository on the Whonix for VirtualBox download page. - Whonix ™ for VirtualBox download page will recommend a specific version of VirtualBox with a detailed explanation on a separate page Recommended VirtualBox Version for use with Whonix ™.
- Whonix ™ build script will download VirtualBox host software package
- VirtualBox Guest Additions
- Whonix ™ build script will download package virtualbox-guest-additions-iso [archive] from Debian
sid
(unstable
) and upload to Whonix ™ APT repository. That package provides file/usr/share/virtualbox/VBoxGuestAdditions.iso
. - At time of initial implementation contained VirtualBox guest additions ISO version
6.1.12-1
. In short,6.1.12
. Ignore the-1
which is a Debian package revision number and not the upstream (virtualbox.org) version number. - virtualbox.org homepage also advertised version
6.1.12
. - Package
virtualbox-guest-additions-iso
will be installed by default in new Whonix ™ VirtualBox builds. - Related: VirtualBox Guest Additions ISO Freedom vs Non-Freedom
- Documented here: VirtualBox/Guest_Additions#VirtualBox_Guest_Additions
- Whonix ™ build script will download package virtualbox-guest-additions-iso [archive] from Debian
- This is
- to allow Whonix ™ developers test newer versions of VirtualBox host software before these are installed on user's computer and,
- to allow updating VirtualBox host software and VirtualBox guest additions at the same time, using compatible versions.
- Package vm-config-dist [archive] will run vbox-guest-installer [archive] (by Whonix ™ developers) during upgrade (vm-config-dist.postinst [archive]) and therefore also during the Whonix ™ VirtualBox
ova
build process. - Package vm-config-dist [archive] has a dpkg trigger since Whonix ™
15.0.1.5.1
vm-config-dist.triggers [archive] which results in runningvbox-guest-installer
when packagevirtualbox-guest-additions-iso
is upgraded.
vbox-guest-installer
(by Whonix ™ developers) will check if any of the packagesvirtualbox-guest-x11
,virtualbox-guest-utils
orvirtualbox-guest-dkms
are still installed and recommend to uninstall those if still installed.- And also check if package
virtualbox-guest-additions-iso
is installed and recommend to install it if not yet installed. - If these two conditions are met it will continue.
- Next is deletion of folder
/var/cache/vm-config-dist/vbox-guest-additions-extracted-iso
and/var/cache/vm-config-dist/vbox-guest-additions-extracted-makeself
if these are already existing from a previous run. - It then follows extraction of
/usr/share/virtualbox/VBoxGuestAdditions.iso
to folder/var/cache/vm-config-dist/vbox-guest-additions-extracted-iso
. - Making
/var/cache/vm-config-dist/vbox-guest-additions-extracted-iso/VBoxLinuxAdditions.run
executable. - Change directory into
/var/cache/vm-config-dist/vbox-guest-additions-extracted-iso
. - Executing
./VBoxLinuxAdditions.run --check
. - Extracting
./VBoxLinuxAdditions.run
to folder/var/cache/vm-config-dist/vbox-guest-additions-extracted-makeself
. - Change directory into folder
/var/cache/vm-config-dist/vbox-guest-additions-extracted-makeself
. - Executing
./install.sh force force
. - Installation of VirtualBox guest additions from package
virtualbox-guest-additions-iso
should now be completed. - Installation using this method also ships required hooks in folder
/etc/kernel
to rebuild VirtualBox guest additions during kernel upgrade thanks toVBoxGuestAdditions.iso
.
Credits: Gratitude is expressed to VirtualBox developers for providing VBoxGuestAdditions.iso
and to Debian Developers for providing package virtualbox-guest-additions-iso
. The script to improve usability of this named vbox-guest-installer
was created by the Whonix ™ project.
Forum discussion: https://forums.whonix.org/t/challenges-upgrading-virtualbox-to-6-1-12-on-debian-buster-installation-from-upstream-virtualbox-org-apt-repository/9984 [archive]
Related: VirtualBox Generic Bug Reproduction
Fasttrack[edit]
- https://fasttrack.debian.net/debian/pool/contrib/v/virtualbox/ [archive]
- https://fasttrack.debian.net/debian/pool/non-free/v/virtualbox-guest-additions-iso/ [archive]
- https://fasttrack.debian.net/debian/pool/contrib/v/virtualbox-ext-pack/ [archive]
Arguments for keeping VirtualBox Support[edit]
- KVM is not available to Windows users.
- Simplicity, as in: VirtualBox has a VM import GUI feature.
- Available to users not owning computer providing hardware virtualization. (KVM requires that. QEMU may or may not but is unsupported.)
- Due to Windows users and simplicity it leads to greater popularity, which in theory attracts more users, developers, auditors, payments, etc and is therefore good for the overall health of the project.
- Some Windows/VirtualBox users experimenting with their first Linux (Whonix ™) will one day become users who mainly use Linux as their host operating system.
- We have a Whonix ™ Windows Installer which installs VirtualBox Whonix ™ VirtualBox VMs because of these reasons.
VirtualBox Oracle VM VirtualBox Extension Pack[edit]
VirtualBox Guest Additions
andVirtualBox Oracle VM VirtualBox Extension Pack
are different things.VirtualBox Oracle VM VirtualBox Extension Pack
:- Is proprietary, nonfreedom software.
- Was never in
packages.debian.org
.
Quote https://www.oracle.com/uk/virtualization/technologies/vm/downloads/virtualbox-downloads.html [archive]
Free for personal, educational or evaluation use under the terms of the VirtualBox Personal Use and Evaluation License [archive] on Windows, Mac OS X, Linux and Solaris x-86 platforms:
Quote https://www.virtualbox.org/wiki/Downloads [archive]
Support for USB 2.0 and USB 3.0 devices, VirtualBox RDP, disk encryption, NVMe and PXE boot for Intel cards. See this chapter from the User Manual [archive] for an introduction to this Extension Pack. The Extension Pack binaries are released under the VirtualBox Personal Use and Evaluation License (PUEL) [archive].
Quote https://www.virtualbox.org/manual/ch01.html#intro-installing [archive]
The extension pack provides the following added functionality:
- The virtual USB 2.0 (EHCI) device. See Section 3.11.1, “USB Settings” [archive].
- The virtual USB 3.0 (xHCI) device. See Section 3.11.1, “USB Settings” [archive].
- VirtualBox Remote Desktop Protocol (VRDP) support. See Section 7.1, “Remote Display (VRDP Support)” [archive].
- Host webcam passthrough. See Section 9.5, “Webcam Passthrough” [archive].
- Intel PXE boot ROM.
- Disk image encryption with AES algorithm. See Section 9.28, “Encryption of Disk Images” [archive].
Storage Controller Setting[edit]
Since Whonix ™ version 15.0.1.7.3
: AHCI
Reasons:
- SATA AHCI is the default setting as defined by VirtualBox for new VirtualBox VMs using Debian 64-bit.
- This setting is better tested by upstream, VirtualBox developers than other settings.
- In past, a regression introduced in the LsiLogic SAS controller code had been introduced by VirtualBox developer which has not been found in testing VirtualBox before the release.
- This resulted in this usability issue for Whonix ™ users, Failed to open a session for the virtual machine /
NS_ERROR_FAILURE (0x80004005)
(Whonix VirtualBox - failed to start - NS_ERROR_FAILURE (0x80004005) - The VM session was aborted. [archive])
- This resulted in this usability issue for Whonix ™ users, Failed to open a session for the virtual machine /
Reason why Whonix ™ previously used a different setting LsiLogic SAS was avoidance of VirtualBox host software bug, High I/O causing filesystem corruption [archive]. See also old Whonix ™ issue tracker discussion, VirtualBox AHCI [archive].
The current default setting AHCI might lead the to issue High Disk Usage Causing Filesystem Corruption on some (slower) hardware configurations due to VirtualBox host software bug, High I/O causing filesystem corruption [archive]. It's speculation and unavoidable. There is no other solution at the moment. Wiki chapter High Disk Usage Causing Filesystem Corruption already contains approaches which might fix this issue in case it manifests.)
Bugs[edit]
[drm:vmw_host_log [vmwgfx]] ERROR Failed to send log[edit]
Confusing message but no bad effects.
https://www.virtualbox.org/ticket/19168 [archive]
[sda] Incomplete mode parameter data / Assuming drive cache: write through[edit]
Confusing error message due to our use of a SAS virtual hard drive controller no bad effects. Error message doesn't happen with SATA controller but we can't use that one
- https://github.com/Whonix/Whonix/issues/274 [archive]
- https://www.virtualbox.org/ticket/10031 [archive]
Core Dump[edit]
Quote https://www.virtualbox.org/wiki/Core_dump [archive]
VirtualBox core dump:
Note that this core dump can contain a memory dump of your guest which can include sensitive information.
Kernel core dump:
Privacy information: Also be aware that the above kernel dumps could contain unrelated sensitive and private information about you and your system, e.g. stored passwords in memory. Unfortunately this is unavoidable in those situations, as a kernel dump essentially is an unmodified and unfiltered part of your computer's RAM (main memory).
VirtualBox Bug Reports[edit]
VirtualBox (Guest Additions) have various issues. Often copy/paste from host to VM does not work or VMs are not automatically reized to optional size.
The internet is full of discussions that lead to no solution. Hard to find good information. It is unhelpful to ask in arbitrary places about it as this only leads to more discussions which go nowhere. The only option is to find out what information VirtualBox developers are asking for, to write a good bug report and to report to virtualbox.org developers.
- Step 1) Research what information VirtualBox developers would be asking for.
- Step 2) Write a good bug report.
What Should Be Included In Bug Report[edit]
Include as many information as possible.
- bug reporting instructions
- VirtualBox VM log
~/"VirtualBox VMs"/Whonix-Gateway-XFCE/Logs/VBox.log
- VirtualBox host log
~/.config/VirtualBox/VBoxSVC.log
- read these posts
- VRAM (video RAM) to 128 MB
- VirtualBox host version
- VirtualBox guest additions version
- host operating system
- guest operating system
- guest:
/var/log/Xorg.0.log
- guest:
sudo lsmod | grep vbox
- guest:
sudo apt update && sudo apt install mesa-utils
glxinfo | grep OpenGL
glxinfo
- 3D acceleration on/off
- VMSVGA
- VBoxVGA
- VBoxSVGA
dpkg -l | grep xorg
dpkg -l | grep x11
- VirtualBox VM log
Resize Issues[edit]
Notes[edit]
- https://www.virtualbox.org/wiki/Guest_resizing [archive]
Deleting the file
~/config/Monitors.xml
in the guest helps.- Try without snapshots.
- Use a real screen not over VNC.
Non-Issues[edit]
- https://www.virtualbox.org/ticket/17777 [archive]
(EE) Failed to load module "vboxvideo" (module does not exist, 0)
As of X.Org server 1.19 we use a kernel driver and the X.Org modesetting driver. See the log section you attached.
Bug Report Draft[edit]
user@host:~$ dpkg -l | grep x11 ii libqt5x11extras5:amd64 5.11.3-2 amd64 Qt 5 X11 extras ii libva-x11-2:amd64 2.4.0-1 amd64 Video Acceleration (VA) API for Linux -- X11 runtime ii libx11-6:amd64 2:1.6.7-1 amd64 X11 client-side library ii libx11-data 2:1.6.7-1 all X11 client-side library ii libx11-xcb1:amd64 2:1.6.7-1 amd64 Xlib/XCB interface library ii libxkbcommon-x11-0:amd64 0.8.2-1 amd64 library to create keymaps with the XKB X11 protocol ii virtualbox-guest-x11 6.1.4-dfsg-2 amd64 x86 virtualization solution - X11 guest utilities ii x11-common 1:7.7+19 all X Window System (X.Org) infrastructure ii x11-utils 7.7+4 amd64 X11 utilities ii x11-xkb-utils 7.7+4 amd64 X11 XKB utilities ii x11-xserver-utils 7.7+8 amd64 X server utilities
ii xserver-xorg 1:7.7+19 amd64 X.Org X server ii xserver-xorg-core 2:1.20.4-1 amd64 Xorg X server - core server ii xserver-xorg-input-all 1:7.7+19 amd64 X.Org X server -- input driver metapackage ii xserver-xorg-input-libinput 0.28.2-2 amd64 X.Org X server -- libinput input driver ii xserver-xorg-video-fbdev 1:0.5.0-1 amd64 X.Org X server -- fbdev display driver ii xserver-xorg-video-qxl 0.1.5-2+b1 amd64 X.Org X server -- QXL display driver ii xserver-xorg-video-vesa 1:2.4.0-1 amd64 X.Org X server -- VESA display driver
Bug descriptions:
Broken:
1) Power off the VM. 2) Restart the VM. 3) Maximize the VM window after start of the VM as soon as possible. 4) VirtualBox VM Window → View → Virtual Screen 1 → Choose any, resize to another resolution 5) VirtualBox VM Window → View → Auto-resize Guest Display / Adjust Window Size
Also broken:
XFCE Start Menu → Settings → Display → Resolution: → Choose a higher resolution resolution → Apply
TODO: manual resize functional using xrandr
See Also[edit]
- VirtualBox
- VirtualBox Testers Only Version
- VirtualBox/Recommended Version
- VirtualBox/Other Versions
- VirtualBox/Guest Additions
- VirtualBox/Troubleshooting
- VirtualBox Generic Bug Reproduction
- VirtualBox/Appliance is not signed
- VirtualBox/Higher Screen Resolution without installing VirtualBox Guest Additions
- Virtualization Platform Security
References[edit]
- ↑ In response to whether JanusVM was safe to use, Roger Dingledine of The Tor Project stated in 2011 [archive]: "No, not safe. Probably has been unsafe to use for years."
- ↑
VirtualBox bug report: clarify license of VBoxGuestAdditions ISO OSE or PUEL (free vs nonfree) [archive]
- See https://forums.virtualbox.org/viewforum.php?f=1 [archive] as indicated by the red color for
arudnev
. (Red indicates forum administrator privileges. Green color indicates forum moderator. arudnev
wrote a locked announcement forum thread VirtualBox 6.1.14 released [archive]. User profile saysOracle Corporation
.
- virtualbox.org forum profile of
arudnev
[archive] (login required) stating:- Username:
arudnev
- Rank:
Oracle Corporation
- Groups:
Administrators
- Username:
- See https://forums.virtualbox.org/viewforum.php?f=1 [archive] as indicated by the red color for
- ↑
- ↑ manual instructions
Whonix ™ is Supported by Evolution Host DDoS Protected VPS. Stay private and get your VPS with Bitcoin or Monero.
100px | |
Fosshost | About Advertisements |
Search engines: YaCy | Qwant | ecosia | MetaGer | peekier | Whonix ™ Wiki
Please contribute by helping to answer Whonix ™ questions.
Priority Support | Investors | Professional Support
Whonix ™ | © ENCRYPTED SUPPORT LP | Freedom Software / Open Source (Why?)
The personal opinions of moderators or contributors to the Whonix ™ project do not represent the project as a whole.