Qubes Disposables
From Whonix
< Qubes
These Disposable instructions only apply to Qubes-Whonix ™ 16 in Qubes R4. [1] [2] [3]
A few usability issues in Disposables affect anonymity. If the risks are unknown to the user, then first carefully read this page.
What are Disposables?[edit]
In the Qubes Template model, [4] any changes made to a root filesystem of an App Qube [archive] are lost upon reboot. This is advantageous for several reasons: it saves time and disk space, and allows faster, centralized updates for applications that are usually found inside the root filesystem. However, certain directories are designed to persist between reboots in order to store files and settings. These directories are stored in /rw
, including /home/user
and /usr/local
as well as additional directories defined by "bind directory" settings. [5]
Qubes does not have a built-in snapshot capability like VirtualBox that can completely revert all changes back to a previous VM state. [6] [7] In other words, no method exists within App Qubes to reverse changes made to the persistent file system without implementing some type of custom solution. To ensure that all filesystem changes are discarded after a session, Qubes offers Disposables. When a Disposable is shutdown, the VM is removed from Qubes and all related VM images are deleted from the host filesystem. This method is not yet amnesic and should not be relied upon for anti-forensics!
While Disposables ensure that files do not persist without user intervention, the downside is the user can no longer decide whether or not the current VM state should be kept or destroyed; users must choose beforehand to use a standard App Qube or a Disposable.
Table: Qubes R4 Inheritance and Persistence
Inheritance [8] | Persistence [9] | |
---|---|---|
Template [archive] [10] [11] | n/a | Everything |
App Qubes [archive] [12] | /etc/skel/ to /home/
|
/rw/ (includes /home/ and bind-dirs [archive])
|
Disposable Template [archive] [13] [14] | /etc/skel/ to /home/
|
/rw/ (includes /home/ , /usr/local and bind-dirs [archive])
|
Disposable [archive] [15] [16] | /rw/ (includes /home/ , /usr/local and bind-dirs [archive])
|
Nothing |
The Layered Disposable System[edit]
Qubes uses a two-layered approach to Disposables. At the core of the system is a Template [archive] upon which a Disposable Template [archive] is based. Every time a new Disposable is launched it is based on the Disposable Template - hence, two layers. In a standard Qubes-Whonix ™ installation:
- The Whonix-Workstation ™ default Template is
whonix-ws-16
. - The Whonix-Workstation ™ default Disposable Template is called
whonix-ws-16-dvm
. - Each Whonix-Workstation ™ default Disposable (
disp1, disp2, ...
) is based onwhonix-ws-16-dvm
.
Once a Disposable Template is created, its /home/user/ directory can be customized [17] independently of the Template. In this special case, the Disposable Template will continue to inherit changes from the base Template's root filesystem (like package updates), but user files in /home/user/ will persist independently.
It is possible to have multiple Disposable Templates and Disposables at the same time. Any App Qube can be enabled for use as a template for Disposables, by setting its template_for_dispvms
[archive] property.
In Qubes R4, Qubes-Whonix ™ 16's default Disposable Template (whonix-ws-16-dvm
) can be easily created using salt and will have this property set.
Disposable Traffic Stream Isolation[edit]
Disposables work especially well with Whonix-Gateway ™. [18] All Disposable traffic is stream-isolated from the traffic of other VMs running in parallel.
Warnings[edit]
Table: Disposable Warnings
Category | Warning |
---|---|
Amnesic Capability |
|
Ephemeral Whonix-Gateway ™ ProxyVMs | Using Disposables for both the Whonix ™ Gateway and Workstation in Qubes R4 does not increase security without any corresponding privacy downside, for the following reasons: [23] [24] [25]
|
Named Disposables: Manual Shutdown | Unlike Disposables spawned from the Whonix ™ default Disposable Template,[30] named Disposables do not automatically shutdown when the first user process is terminated. If a fresh Named Disposable is needed, users must first shutdown the named Disposable and start a new Disposable instance. [31] Failure to do so could lead to session data from previous activities persisting until the Disposable is properly shutdown. |
Spawning Disposables |
|
Tor Browser in a Disposable Template | Do not start Tor Browser in a Disposable Template! For reasons why, see: Running Tor Browser in Qubes Template. Only start Tor Browser in App Qubes or Disposables, see: Start Tor Browser in a Disposable. |
Tor Browser Updater in a Disposable Template | Do not start Tor Browser Updater in a Disposable Template! For reasons why, see: tb-updater in Qubes Disposable Template. Instead, run Tor Browser Downloader by Whonix ™ developers in Whonix-Workstation ™ Template (whonix-ws-16 ).
|
Tor Browser Version |
|
Verify Disposable Status |
|
Whonix-Gateway ™ Linkability | The Tor Project developer Teor has stated that Tor caches DNS, HS descriptors, pre-emptive circuits, etc. [36] which may lead to linkage between App Qubes and Disposables sharing the same Whonix-Gateway ™. The extent to which this is a threat for Whonix ™ users has now been documented; see Multiple Whonix-Workstation ™. |
Setup[edit]
Note: Examples below reference GUI steps whenever possible, but Qube Manager configuration options in R4 are limited in comparison to earlier releases. [37] Where relevant, additional command line commands are listed in the footnotes.
Create a Whonix ™ Default Disposable Template based on Whonix-Workstation ™[edit]
- Update Qubes-Whonix ™.
- Open a dom0 terminal:
Qubes App Launcher (blue/grey "Q")
→System Tools
→Xfce Terminal
- Create
whonix-ws-16-dvm
Disposable Template.
sudo qubesctl state.sls qvm.whonix-ws-dvm
Qubes-Whonix ™ Dispoables are now ready for use.
Create a Named Whonix ™ Disposable based on Whonix-Workstation ™[edit]
Nearly all users can skip steps 1 and 2 below. A specific use case for Disposable naming conventions has not (yet) been identified.
Do not include -dvm
when naming Disposables! Tor Browser will not be inherited from Whonix-Workstation ™ Template (whonix-ws-16
) if this advice is ignored.
Before creating named Disposables, familiarize yourself with their behavior and read all relevant warnings. Failure to do so could lead to unwanted behavior which occurs without the user's knowledge.
1. Create a Disposable called anon-whonix-disp
based on the whonix-ws-16-dvm
Template.
In dom0 run.
qvm-create -C DispVM -l red --template whonix-ws-16-dvm anon-whonix-disp
2. Launch Xfce Terminal in the Disposable.
qvm-run -a anon-whonix-disp xfce4-terminal
TODO - Investigate use cases for this procedure:
- A named Disposable might be useful for a larger root/private image.
- It might also be useful for activities such as building Templates in a Disposable.
Customization[edit]
Disposable Templates[edit]
Extra caution must be exercised when customizing a Disposable Template. [38] From a privacy perspective, it is ideal to have a Disposable Template that is indistinguishable from any other Whonix-Workstation ™. If changes are made to the Disposable Template, these may link all of the Disposables via a uniquely generated fingerprint should they be compromised independently. Risky changes include, but are not limited to:
- Installation of obscure programs;
- Uncommon configuration settings; or
- The placement of unique data files.
Always keep in mind the Disposable will likely be exposed to the greatest Internet threats.
Tor Browser is specifically designed to prevent website fingerprinting or identification based on the user's browser fingerprint. It is safest to run Tor Browser in its stock configuration so the fingerprint is less unique, due to commonality with the larger Tor Browser user pool. Each individual browser change can significantly worsen the fingerprint because of the associated entropy, [39] so only make alterations if the impacts are known. See also: tb-updater in Qubes Disposable Template.
A decision must be made in advance whether to disable JavaScript by default. There is a usability-security trade-off to consider: fingerprinting and usability is worsened by disabled JavaScript, but this provides better protection against vulnerabilities. Conversely, enabled JavaScript improves usability and increases the risk of exploitation, but the browser fingerprint is (likely) more common.
Tor Browser in Disposable Template[edit]
For most users, Tor Browser customizations in the Disposable Template or Template are discouraged. Advanced users who wish to customize the Disposable Template despite the risks should follow these steps.
Applications other than Torbrowser in Disposable Template[edit]
Customization is completely optional. Only files in /home/user (or more generally, in /rw) can be customized in a Disposable Template.
1. Launch the application in the Disposable Template.
Either open dom0 terminal and run.
qvm-run -a whonix-ws-16-dvm <app>
Or use Qube Manager:
dom0
→ Qube Manager
→ right-click 'whonix-ws-16-dvm'
→ Run command in qube
→ type name of the <app>
2. Customize application settings.
Customize the application as per normal procedures.
3. Exit the application.
If required, save application-specific settings, then exit the application so settings are stored on the disk.
4. Shutdown the Disposable Template.
Either use a dom0 terminal.
qvm-shutdown whonix-ws-16-dvm
Or use Qube Manager:
dom0
→ Qube Manager
→ right-click 'whonix-ws-16-dvm'
→ left-click 'Shutdown qube'
The changes will be available when the Disposable is restarted.
Delete a Disposable Template[edit]
If a Disposable Template has been customized and it is necessary to revert these changes, a Disposable Template can be deleted the same way as any other VM.
Note the Disposable Template cannot be deleted while it is the default Disposable of another VM, otherwise an error message appears. In that case, follow tips found here [archive] on how to manually change the default Disposable of VMs to another setting, then repeat the procedure.
dom0
→ Qube Manager
→ right-click 'whonix-ws-16-dvm'
→ left-click 'Delete qube'
[40]
Keep Tor Browser Up-to-date[edit]
To obtain the latest Tor Browser, the simplest method is to use Whonix ™ built-in Tor Browser downloader functionality. Simply update using Tor Browser Downloader by Whonix ™ (tb-updater) in Whonix-Workstation ™ Template (whonix-ws-16
) when performing your usual maintenance updating:
Qubes App Launcher (blue/grey "Q")
→ whonix-ws-16
→ Xfce Terminal
[41] [42]
Update the package lists.
sudo apt update
Upgrade.
sudo apt full-upgrade
If Tor Browser is not upgraded, use update-torbrowser to download a new copy.
Launch Tor Browser Downloader by Whonix ™ and follow the instructions. [43]
update-torbrowser --input gui
Shutdown the Disposable Template: [44]
dom0
→ Qube Manager
→ right-click on 'whonix-ws-16-dvm'
→ click 'Shutdown qube'
Update a Disposable Template[edit]
Changes to the underlying Template (whonix-ws-16
) are detected automatically and the Disposable Template is updated without user intervention. That means package updates that are applied to whonix-ws-16
are also applied to the whonix-ws-16-dvm
.
Usage[edit]
Disposables are well-suited for risky and largely independent activities, like web browsing or opening untrusted files. In contrast, App Qubes might be better suited for activities necessitating file persistence, like email clients with local email storage.
With either kind of VM, Qubes' VM integration tools like secure file copy [archive] and secure clipboard [archive] ensure that clean, trusted files and text can be easily and safely transferred to trusted VMs (if necessary).
User Tips[edit]
Table: Disposable User Tips
Category | Recommendation |
---|---|
Data Storage |
|
Disposable Shutdown | A Disposable automatically shuts down when the first user-launched process is terminated. For example, if a new Disposable is created by launching Tor Browser and a user simultaneously starts typing in an editor later on, all this work will be lost after Tor Browser is closed. To avoid this, first launch a terminal in the Disposable and then launch additional applications from the terminal. This way the Disposable is only destroyed after exiting the terminal. |
Offline Disposables |
|
Shortcuts |
|
Spawning Disposables from other App Qubes |
|
Add a Desktop Shortcut[edit]
- From the Qubes application menu, drag and drop a menu item onto the desktop.
- Double-click the newly created launcher to start it.
- At first start, it is safe to click "Mark Executable".
Add an XFCE4 Panel Shortcut[edit]
From the Qubes application menu, drag and drop the menu item onto the panel.
Start Tor Browser in a Disposable[edit]
Tor Browser can be started via the GUI or on the command line.
If you are using a GUI, complete the following steps.
Qubes App Launcher (blue/grey "Q")
→ Disposable: whonix-ws-16-dvm
→ Tor Browser (AnonDist)
If you are using a terminal, complete the following steps.
qvm-run --dispvm=whonix-ws-16-dvm torbrowser
After launch, always first check the Tor Browser version!
Figure: Tor Browser in Qubes-Whonix ™ Disposable
Start Terminal Emulator in a Disposable[edit]
Terminal emulator xfce4-terminal
can be started via the GUI or on the command line.
If you are using a GUI, complete the following steps.
Qubes App Launcher (blue/grey "Q")
→ Disposable: whonix-ws-16-dvm
→ Xfce Terminal
If you are using a terminal, complete the following steps.
qvm-run --dispvm=whonix-ws-16-dvm xfce4-terminal
TODO[edit]
- TODO document how to use multiple Disposable Templates - https://forums.whonix.org/t/is-anyone-interested-in-using-multiple-dvm-templates-based-on-whonix-ws-dvm/5757/5 [archive]
Footnotes[edit]
- ↑ Disposables have significant improvements; see https://github.com/QubesOS/qubes-issues/issues/866#issuecomment-220495485 [archive]
- ↑ Qubes R3.2 is unsupported by Whonix ™ developers and reached EOL [archive] on 28 March, 2019.
- ↑ A serious privacy bug [archive] is unresolved in Qubes R3.2 / R3.2.1 and below.
- ↑ App Qubes and Templates [archive].
- ↑ How to make any file persistent (bind-dirs) [archive].
- ↑ Apart from qvm-revert-template-changes [archive] which can only revert to the state existing before the last shutdown of the Template.
- ↑ Qubes VM snapshots using git / SVN [archive].
- ↑ Upon creation.
- ↑ Following shutdown.
- ↑ https://www.qubes-os.org/doc/templates/ [archive]
- ↑ The former name was TemplateVM.
- ↑ The former name was AppVM or TemplateBasedVM.
- ↑ https://github.com/QubesOS/qubes-issues/issues/4175 [archive]
- ↑ Former names included DisposableVM Template, DVM Template, and DVM.
- ↑ https://www.qubes-os.org/doc/glossary/#disposable [archive]
- ↑ Former names included DisposableVM and DispVM.
- ↑ https://www.qubes-os.org/doc/disposable-customization/ [archive]
- ↑ Because each VM is assigned a unique, internal IP address.
- ↑ Is there a substitute for Whonix ™ lack of an Amnesic feature?
- ↑ Disposables do not run entirely in RAM [archive].
- ↑ Disposables: support for in-RAM execution only (for anti-forensics) #904 [archive]
- ↑ 4.0rc1 dirty shutdown causes disposables to remain persistent #3037 [archive]
- ↑ Disposables are not Amnesic.
- ↑ https://github.com/QubesOS/qubes-issues/issues/904 [archive]
- ↑ Tor Entry Guards.
- ↑ This is another reminder of why full disk encryption should always be used on the host.
- ↑ https://gitlab.torproject.org/legacy/trac/-/issues/8240 [archive]
- ↑ The reason is there are both malicious and benign guards in the Tor network. The more often the user "rolls the dice" (changes guards), the greater the chance of striking out.
- ↑ The solution to the first problem is only allowing in-RAM execution of Disposables [archive], but this is not planned for implementation in the short-term. There is no perfect solution to the second problem. That said, there is an actual unstated security-privacy trade-off by running this configuration. Theoretically, an ephemeral Whonix-Gateway ™ ProxyVM is only able to be infected for a single session (via the /home, /usr/local and /rw directories), since it is discarded upon shutdown. This provides a counterbalance to the increased threat of malicious guards, as Whonix ™ becomes more "Tails-like" [archive].
- ↑ See Disposable Shutdown for more on this.
- ↑ This is because named Disposables are created using a similar method to that which is used to create App Qubes. This means that named Disposables -- in some respects -- exhibit behavior similar to that of an App Qube. For example, behavior such as persistent VM settings across restarts; this includes, but is not limited to settings like --netvm, --autostart and --label to name a few. Before starting a new named Disposable instance, first verify in Qube Manager that the VM is fully shutdown.
- ↑ Disposables are created in one of two ways:
Open in Disposable
. On the command line (domU), run.qvm-open-in-dvm
Edit/View in Disposable
. From the GUI context-menu (domU).File
→Actions
→Edit/View in Disposable
- ↑ On the command line (dom0), run.
qvm-prefs -s vmname dispvm_netvm sys-whonix
- ↑ https://forums.whonix.org/t/whonix-14-starting-a-whonix-14-dispvm-actually-starts-the-templatebasedvm-instead/5579 [archive]
- ↑ After creation of a new Disposable Template, all VMs spawned from the Disposable Template should be Disposables by design. This includes the first start and all subsequent starts thereafter. While this is expected behavior, it is safest to confirm the Disposable was correctly spawned on each occasion it is used.
- ↑ https://lists.torproject.org/pipermail/tor-dev/2016-October/011591.html [archive]
- ↑ For instance, Dispoable networking can no longer be set from Qube Manager.
- ↑ Qubes documentation: Disposable Customization [archive].
- ↑ 33 bits of entropy will identify one individual out of several billion.
- ↑ Or on the command line (dom0), run.
qvm-remove <vmname>
- ↑
dom0
→Qube Manager
→right-click on 'whonix-ws-16'
→click 'Run command in qube'
→type 'xfce4-terminal'
- ↑
On the command line (dom0), run.
qvm-run -a whonix-ws-16 xfce4-terminal
- ↑
update-torbrowser
- ↑
On the command line (dom0), run.
qvm-shutdown whonix-ws-16-dvm
or
Disposable Template command line (domU), run.sudo poweroff
- ↑ Github: Split Browser [archive]
- ↑ On the command line (dom0), run.
qvm-prefs disp<1 | 2 | ...> netvm none
- ↑ See: Qubes Disposables [archive].
- ↑ See Micahflee's blog on How Qubes makes handling pdfs way safer [archive].
Whonix ™ is Supported by Evolution Host DDoS Protected VPS. Stay private and get your VPS with Bitcoin or Monero.
100px | |
Fosshost | About Advertisements |
Search engines: YaCy | Qwant | ecosia | MetaGer | peekier | Whonix ™ Wiki
We are looking for contributors and developers.
Priority Support | Investors | Professional Support
Whonix ™ | © ENCRYPTED SUPPORT LP | Freedom Software / Open Source (Why?)
The personal opinions of moderators or contributors to the Whonix ™ project do not represent the project as a whole.