How-to: Fix dom0 Qubes-Whonix ™ UpdatesProxy Settings
From Whonix
< Qubes
Introduction[edit]
If the following warning appears.
WARNING: Execution of /usr/bin/apt-get prevented by /etc/uwt.d/40_qubes.conf because no torified Qubes updates proxy found.
If the warning message is transient, it can be safely ignored. Otherwise, try one of the fixes below.
Update dom0[edit]
Launch a dom0
terminal.
Click the Qubes App Launcher (blue/grey "Q")
→ Open the Terminal Emulator (Xfce Terminal)
Upgrade Qubes dom0
. This step is mandatory. [1]
sudo qubes-dom0-update
Templates[edit]
Error Resolution Methods[edit]
The following fixes are listed in order of preference.
Salt Fix[edit]
In dom0
.
Use qubesctl
to setup dom0
settings. [2]
sudo qubesctl state.sls qvm.anon-whonix
Next, check if the problem has been corrected. Run the following command in Whonix ™ Template.
sudo systemctl restart qubes-whonix-torified-updates-proxy-check
Then try to update / use apt
again.
If there are still problems, try the manual fix below.
Manual Fix[edit]
1. Make sure Whonix-Gateway ™ (sys-whonix
) is running.
Check the dom0
/etc/qubes-rpc/policy/qubes.UpdatesProxy
settings.
2. At the very top of that file, the following text should appear.
$tag:whonix-updatevm $default allow,target=sys-whonix
If it is not there, add it.
To view a complete example of the /etc/qubes-rpc/policy/qubes.UpdatesProxy
file, please press on expand on the right.
/etc/qubes-rpc/policy/qubes.UpdatesProxy
[archive] (raw [archive]):
## Note that policy parsing stops at the first match, ## so adding anything below "$anyvm $anyvm action" line will have no effect ## Please use a single # to start your custom comments # Upgrade all TemplateVMs through {{gateway_product_name_vm}}. #$type:TemplateVM $default allow,target={{gateway_product_name_vm}} # Upgrade {{project_name}} templateVMs through {{gateway_product_name_vm}}. $tag:whonix-updatevm $default allow,target={{gateway_product_name_vm}} # Deny {{project_name}} templateVMs using UpdatesProxy of any other VM. $tag:whonix-updatevm $anyvm deny # Default rule for all TemplateVMs - direct the connection to sys-net $type:TemplateVM $default allow,target=sys-net $anyvm $anyvm deny
3. If Multiple Qubes-Whonix ™ Templates are configured -- like when the Whonix ™ Template is cloned -- please press on expand on the right.
The following syntax should apply.
Name-Of-Whonix-TemplateVM $default allow,target=Whonix-Gateway-TemplateBased-ProxyVM
Example entry for Whonix-Gateway ™ Template.
whonix-gw-16 $default allow,target=sys-whonix
Example entry for Whonix-Workstation ™ Template.
whonix-ws-16 $default allow,target=sys-whonix
4. To test if it is fixed, run the following command in Whonix ™ Template.
sudo systemctl restart qubes-whonix-torified-updates-proxy-check
5. Then try to update / use apt
again.
Reinstallation Fix[edit]
If the salt and manual fix attempts both fail, then follow the steps to Reinstall Qubes-Whonix ™ Templates. If reinstallation also fails, then ask for support in the Whonix ™ forums [archive].
dom0[edit]
Qubes dom0
does not use Qubes UpdatesProxy. [3] Therefore file /etc/qubes-rpc/policy/qubes.UpdatesProxy
does not influence which VM will be used by dom0
for fetching updates.
For completeness sake, see below on how to configure the Qubes dom0
UpdateVM setting.
To force dom0
updates over Tor, set Qubes' dom0
UpdateVM to sys-whonix
. [4]
Qube Manager
→System
→Global Settings
→Dom0 UpdateVM:
sys-whonix
→OK
To revert this change, set Qubes' dom0
UpdateVM to sys-firewall
or another preferred VM. [5]
Qubes Manager
→System
→Global Settings
→Dom0 UpdateVM:
sys-firewall
→OK
Development[edit]
The following Qubes-Whonix ™ and Whonix ™ GitHub development resources are recommended for interested readers:
- 40_qubes.conf [archive]
- qubes-whonix-torified-updates-proxy-check.service [archive]
- torified-updates-proxy-check [archive]
- qubes.UpdatesProxy.policy [archive]
- uwt [archive]
Footnotes[edit]
- ↑
This is required to make sure
- version file
/srv/formulas/base/virtual-machines-formula/qvm/whonix.jinja
contains the current version number of Whonix ™ is up to date, - a recent version of Qubes repository definition files,
- Qubes salt,
- qubes-core-admin-addon-whonix [archive],
- as well as qubes-mgmt-salt-dom0-virtual-machines [archive] are installed and up to date.
- version file
- ↑ Dev/Qubes#salt
- ↑ Qubes generally, not Whonix ™ specific implementation.
- ↑
Or manually set the torified UpdateVM in
dom0
terminal.qubes-prefs updatevm sys-whonix
- ↑
To revert this change in
dom0
terminal, run.qubes-prefs updatevm sys-firewall
Whonix ™ is Supported by Evolution Host DDoS Protected VPS. Stay private and get your VPS with Bitcoin or Monero.
100px | |
Fosshost | About Advertisements |
Search engines: YaCy | Qwant | ecosia | MetaGer | peekier | Whonix ™ Wiki
Interested in becoming an author for the Whonix ™ News Blog or writing about anonymity, privacy and security? Please get in touch!
Priority Support | Investors | Professional Support
Whonix ™ | © ENCRYPTED SUPPORT LP | Freedom Software / Open Source (Why?)
The personal opinions of moderators or contributors to the Whonix ™ project do not represent the project as a whole.