Release Notes
From Whonix
Whonix ™ 13 Changelog[edit]
Whonix ™ 13 was released on May 31, 2016. [1] Whonix ™ 13 contains many small security and usability improvements, features and bug fixes. [2] [3] [4]
All Platforms[edit]
AppArmor[edit]
- Fixed the Tor Browser AppArmor profile to allow correct functionality. [5]
- Resolved AppArmor conflicts affecting Pidgin, Chromium and Evince. [6]
- Merged AppArmor profiles for sdwdate, timesync and whonix-check into their corresponding packages and now install them by default. [7]
Bug Fixes[edit]
- Fixed broken whonix-setup-wizard functionality. [8]
Code[edit]
- Updated Whonix ™ code for Tor Browser tb-updater. [9]
- Refactored the Whonix ™ socks redirection firewall rules to reduce their size and use less script code. [10] [11]
- Refactored Whonix ™ code so that scripts only use configuration files that end with the .conf extension. [12]
Improved Functionality and Usability[edit]
- Modified whonixcheck to test for slow or fast system clocks which prevent Tor from properly connecting. [13]
- Implemented an explicit check for timekeeping watchdog kernel messages in whonixcheck, so users are warned about clock jumps which prevent / time-out Tor connections. [14]
- Enforced maximized terminal windows for xdg desktop users. [15] [16]
- Enabled Transparent Proxy Ports for Whonix-Gateway ™ by default (except for Whonix ™-Firewall). [17] [18]
- Configured Whonix ™ to use /etc/skel instead of writing to the home folder directly to maintain forward compatibility with Qubes. Further, this allows for proper error-handling where "user" is hardcoded in Whonix ™, and a newly created account with a different name has been used. [19]
- Deprecated the timesync progress bar and replaced it with a tray icon using sdwdate-gui to improve usability and reduce confusion. [20]
- Created a stable-proposed-updates repository for users who want to help in testing Whonix ™ fixes, without resorting to the testers repository which comes with many more changes. [21]
- Moved the WhonixBackupScript to the usability-misc package to make it more accessible. [22]
- Replaced XChat with HexChat, since the former is no longer actively maintained, and created a new AppArmor profile to contain it. [23]
- Implemented a VPN_FIREWALL feature as part of whonix-ws-firewall. [24]
Security Enhancements[edit]
- Created a security-misc package that turns off Nautilus and Dolphin file previews by default, since this poses security risks. [25]
- A known, good version of Tor is now maintained and uploaded to the Whonix ™ repository from deb.torproject.org [26]
- Uploaded the Tor 0.3.2.9 major (stable) release to the Whonix ™ repository to enable full v3 onion functionality for both hosting of onion services and access to v3 onion addresses in Tor Browser. [27]
- Extended the lifetime of the Whonix ™ signing key. [28]
- Sourced new onion services webservers for the sdwdate feature, which ensures the system's clock is correctly set for security, privacy and anonymity purposes. [29]
Qubes-Whonix ™[edit]
Bug Fixes[edit]
- Fixed qubes-whonix-firewall systemd service start. [30] [31]
- Resolved whonixcheck fixes for Qubes R4. [32]
- Corrected false positive failure messages for the updates proxy test in Qubes R4. [33] [34]
- Disabled qubes-SetDateTime / qubes.SyncNtpClock in Qubes-Whonix ™ VMs since it interfered with timesync. [35]
- Resolved accumulation of old Tor Browser instances in /var/cache/tb-binary/.tb/ which caused users to run into full disk error messages. [36]
- Resolved an occasional error message whereby Whonix ™ templates incorrectly reported they were not connected to the Whonix-Gateway ™ ProxyVM. [37]
- Resolved the broken anon-ws-disable-stackedtor function in Qubes-Whonix ™. [38]
- Enforced the opening of all links from
sys-whonix
,whonix-gw
andwhonix-ws
in theanon-whonix
AppVM to prevent error messages. [39]
Builds[edit]
- Corrected the build failure of Whonix-Workstation ™ template in Qubes-Whonix ™ R3.2 and added the qubes-template-whonix to continuous integration service TravisCI. [40]
- Resolved Whonix ™ template build failures in Qubes R4 related to Tor Browser downloads. [41]
- Changed the Qubes-Whonix ™ build process to install Whonix ™ from the Whonix ™ binary APT repository. This simplifies code, results in faster builds, removes build dependencies inside the template, and reduces the overall template size. [42]
- Allowed the Whonix ™ build script to run as root and reworked user_name. [43]
Code[edit]
- Removed fetching of Whonix ™ source code in qubes-template-whonix. [44]
- Removed the qubes-update-check system service from Qubes-Whonix ™ TemplateVMs, since it was unnecessary. [45] [46]
- Reworked / removed a number of installed packages in Qubes-Whonix ™ which are only required for the Non-Qubes-Whonix ™ desktop. [47] [48]
- Removed the default username and password in the Qubes-Whonix ™ terminal, because it is not required. [49]
Improved Functionality and Usability[edit]
- Ported whonixcheck and tb-updater to Qubes' qrexec-based updates proxy, since TemplateVMs are non-networked by default in Qubes R4. [50]
- Changed the tb-updater configuration to use Qubes updates proxy, since Qubes R4 sets the NetVM of TemplateVMs to none by default. [51]
- Implemented the ability to install Whonix-Workstation ™ and Whonix-Gateway ™ from dom0 with a
sudo apt install whonix-(workstation|gateway)
feature. [52] - Ported the bind-directories functionality upstream to Qubes. [53]
- Implemented the new bind-directories functionality in Qubes-Whonix ™. [54]
- Implemented a check for whether the
whonix-gw
ProxyVM (sys-whonix
) has a NetVM which is set to "none", with a warning shown if this is the case. [55] - Implemented a new feature so that following an update of the Whonix-Workstation ™ TemplateVM, newly created AppVMs based on the updated TemplateVM come with an up-to-date version of Tor Browser. [56]
- Modified whonixcheck to check if: Whonix-Gateway ™ is running in a NetVM or ProxyVM; Whonix-Workstation ™ is running in an AppVM; and to skip the test if a TemplateVM is detected. [57]
Security Enhancements[edit]
- Prevented /usr/lib/qubes/qubes-setup-dnat-to-ns from running in Qubes-Whonix ™ to stop it from modifying firewall rules. [58]
Whonix ™ 14 Changelog[edit]
Whonix ™ 14 was released on August 6, 2018. Significantly, Whonix ™ 14 is based on the Debian stretch (Debian 9) distribution which was released in mid-2017, instead of Debian jessie (Debian 8). [59] Users now have access to numerous updated and new software packages, a more modern branch of GnuPG, and more. [60] [61] [62]
All Platforms[edit]
AppArmor[edit]
- Fixed the whonixcheck AppArmor profile to remove continuous denied messages relating to signal. [63]
- Fixed the AppArmor profile for obfs4proxy to enable correct functioning of Tor Bridges in Whonix-Gateway ™. [64]
- Fixed the Tor Browser AppArmor profile to allow correct functionality. [65]
- Corrected the tor-controlport-filter AppArmor profile to ensure correct functioning. [66]
- Removed the Pidgin AppArmor profile, since Pidgin is recommended against for security reasons. [67]
- Hardened the Control Port Filter AppArmor profile. [68]
- Disabled installation of apparmor-notify (AppArmor notifications) by default, thereby removing the reporting of mostly harmless denied messages. [69] [70]
Bug Fixes[edit]
- Corrected the broken whonix-setup-wizard autostart on Whonix-Gateway ™. [71]
- Fixed sdwdate-gui freezing when using right-click in the menu. [72]
- Fixed dependency issues which prevented the whonix-setup-wizard gui from starting. [73]
- Implemented the correct
Tor --verify
command for Whonix-Gateway ™ torrc configuration checks to prevent the reporting of false positives. [74] - Modified the uwt wrapper script to correctly handle symbolic links. [75]
- Changed the Whonix-Gateway ™ firewall prerouting rules for socks ports so they do not interfere with trans port traffic. [76]
- Modified whonixcheck to first test if network interfaces are up to prevent the test from failing unnecessarily. [77]
- Fixed a whonixcheck whonix-firewall check race condition. [78]
Builds[edit]
- Resolved genmkfile build dependencies for building Whonix-Workstation ™ and Whonix-Gateway ™. [79]
- Confirmed the new and upgraded Whonix ™ 14 builds are identical. [80] [81]
- Fixed debian/control parsing with respect to make_deb_build_dependencies / make_deb_runtime_dependencies. [82]
Code[edit]
- Updated Whonix ™ code for Tor Browser tb-updater. [83]
- Changed the bindp compile to postinstall to make it cross-platform (Qubes, 64-bit, 32-bit). [84]
- Rewrote sclockadj in C and updated the sdwdate package to compile sclockadj. [85] [86]
- Implemented symlinks for onion-grater profiles to maintain functionality following profile upgrades. [87]
- Enhanced onion checking in sdwdate to improve the unit test. [88]
- Ported msgcollector to python3 and python3-pyqt5. [89]
- Ported whonix-setup-wizard to python3. [90]
- Ported python-guimessages to python3. [91]
- Rewrote sdwdate to ensure python exceptions are written to the journal. [92]
- Rewrote control-port-filter-python to ensure exceptions are written to the journal. [93]
- Re-added some non-essential packages to Whonix ™ that were removed from Debian stretch. [94] [95]
- Ported anon-shared-helper-scripts so they instead use Tor authentication cookies. [96]
- Ported whonixcheck check_tor_socks_port_reachability.bsh to use the Tor unix domain socket socks file. [97]
- Ported anon-ws-disable-stacked-tor to systemd socket activation to remove unnecessary, idle socat listeners. [98] [99]
- Removed auditd configuration folder parsing /etc/audit/rules.d/ by default, since the feature has been implemented upstream.
- Implemented anonymous counting of Whonix ™ users via the whonixcheck Whonix ™ News function. [100] [101]
- Implemented, but did not activate changes to the Whonix ™ firewall so: sdwdate is stopped before suspend; timesync-fail-closed mode is set before suspend; sdwdate is restarted after resume; and Whonix ™ firewall enters full mode after resume following successful sdwdate activation. [102]
- Configured auditd to process the configuration folder /etc/audit/rules.d/ by default to aid debugging. [103] [104]
- Implemented monitoring of changes to /var/lib/tor/lock access rights via auditd to aid debugging. [105]
- Modified anon-ws-disable-stacked-tor to maintain Tor Browser functionality with Unix domain socket files redirection and prevent Tor over Tor scenarios. [106]
- Configured whonixcheck to test for failed daemons. [107]
- Implemented a sdwdate sd_notify systemd watchdog. [108]
- Disabled systemd-resolved and instead implemented a /lib/systemd/system/systemd-resolved.service.d/ drop-in. [109]
- Ported /usr/sbin/service to systemctl as the latter runs non-interactively. [110]
- Disabled timedatectl network time synchronization in Debian stretch to prevent conflicts with sdwdate. [111]
- Removed brltty, brltty-speechd and brltty-x11 since they create a local listener port which may conflict with onion-grater. [112]
- Modified anon-ws-disable-stacked-tor systemd-unit-files-generator so it is configurable. [113]
- Rewrote slockadj3 in C and determined how to prevent spamming of sclockadj3 time changes to logs. [114] [115] [116] [117]
Improved Functionality and Usability[edit]
- Implemented the major new Anon Connection Wizard feature to simplify connections to the Tor network via a Tor bridge and/or a proxy. [118]
- Integrated the Tor Pluggable Transport
meek_lite
. [119] - Integrated anon-connection-wizard into whonix-setup-wizard, so that the latter can now start the former. [120]
- Removed the Control Port Filter Proxy script from anon-ws-disable-stacked-tor since it is no longer required for proper Tor connections or Tor Browser functions (its functionality is now replaced by onion-grater [archive]). This means Ricochet, Zeronet and OnionShare are now compatible with Whonix ™. [121] [122] [123]
- Installed necessary dependencies for proper ZeroNet functionality. [124]
- Installed onioncircuits by default in Whonix-Gateway ™. [125]
- Added
--list-interface
to tor-controlport-filter, as it works better with dynamic IP addresses. [126] - Added a /etc/tor-controlport-filter.d configuration extension feature. [127]
- Fixed the control-port-filer-python configuration to rewrite HS_DESC replies by Tor, so OnionShare is supported. [128]
- Merged the tor-controlport-filter by Tails for various enhancements. [129]
- Implemented more user-friendly error messages (instead of tb-starter error handlers) when non-Whonix ™ related Tor Browser issues cause start-tor-browser to fail and exit zero. [130]
- Implemented sane built-in defaults for whonix-gw-firewall, whonix-ws-firewall, whonixcheck, sdwdate, uwt, onion-grater, rads, open-link-confirmation, tb-starter and tb-updater, even if configuration files do not exist. [131]
- Changed uwt to set AllowOutboundLocalhost / AllowInbound which can help make servers utilizing Tor onion services work. [132]
- Implemented a sd_notify watchdog feature for onion-grater so the service is restarted if it appears to be running, but has became unresponsive. [133]
- Created a bindp Whonix ™ package to enable Whonix-Workstation ™ applications that use Tor ephemeral onion services to bind on all interfaces as necessary. [134]
- Modified sdwdate to check if the clock is changed "behind the back" of the program and suggest a manual user fix. [135]
- Improved default torsocks information / warning messages when wrapped commands are invoked to reduce user confusion. [136]
- Both Non-Qubes-Whonix ™ and Qubes-Whonix ™ are now compatible with the Tor Project's sandboxed Tor Browser. [137]
Security Enhancements[edit]
- Confirmed functionality of the kloak anti-keystroke deanonymization tool in Whonix ™. [138] [139]
- Identified more reliable onion servers as appropriate time sources for sdwdate, which enables correct network time synchronization for anonymity-focused distributions. [140]
- Implemented Tails' Control Port Filter Proxy in Whonix ™ and merged recent changes since it was forked. [141] [142]
- Fixed security and hardening (stack canary) issues with the bindp libindp.so package (which were merged upstream). [143]
- Uploaded Tor version 0.3.3.9 (stable) release to the Whonix ™ repository to enable full v3 onion functionality for both hosting of onion services and access to v3 onion addresses in Tor Browser. [144]
- Onion sources are now preferred for Whonix ™ updates/upgrades for greater security. Note: this change has been reverted due to the unreliable nature of onion connections at present - see footnote. [145]
- Disabled the apt-timer in Debian stretch to prevent auto updates, thereby preventing the attendant security risks associated with background updates without user input. [146]
- Disabled nautilus previews by default due to the security risks. [147]
- Implemented uwt to set TORSOCKS_ISOLATE_PID in Debian Stretch so all uwt wrapped applications are stream isolated. [148]
- Implemented tor+http / apt-transport-tor rather than Acquire::BlockDotOnion "false" for better security and stream isolation. [149]
- Disabled the systemd DNS resolver feature in order to reduce the attack surface and to remove the potential for adverse anonymity impacts. [150]
- Established a dedicated Whonix ™.org repository, with appropriate redirects from Whonix ™ mirrors. [151]
- Removed the DHCP client from Whonix-Gateway ™ and switched to a static network configuration so the dhclient is no longer present on all interfaces, including the internal network. [152]
- Disabled VLC metadata collection by default. [153]
- Disabled "Obey DRM limitations" in Okular, [154] since Digital Rights Management (DRM) can be used as a tracking vector. [155] [156]
Non-Qubes-Whonix[edit]
Desktop shortcuts are no longer available in Non-Qubes-Whonix ™. [157]
Bug Fixes[edit]
- Increased the Whonix-Gateway ™ VRAM in VirtualBox from 8 to 16 MB to avoid error messages and possible video problems when using full screen mode. [158]
- Corrected sdwdate-gui systray so it properly registers in kde systray and does not appear as a gap in the Entry column. [159]
- Corrected the sdwdate-gui tray icon so it is visible in Debian stretch. [160]
- Corrected the virtualization detection method to properly recognize KVM. [161]
Builds[edit]
- Reduced the size of the default, binary Whonix ™ images by approximately 50 per cent using zerofree. [162] [163] [164] [165]
Code[edit]
- Removed kmix-disable-autostart since it is no longer required to make sure the clipboard history icon is loaded into the system tray. [166]
Improved Functionality and Usability[edit]
- Created the
grub-live
package which can run Whonix ™ as a live system. [167] [168] - Added Kscreen to Whonix ™ by default in order to allow DPI scaling and other basic desktop features of Plasma 5. [169]
- Removed the VirtualBox shared folder and confirmed automounting of shares is enabled in Debian stretch. [170]
Security Enhancements[edit]
- Removed okular from anon-shared-applications-kde to anon-workstation-default-applications so it is not installed on Whonix-Gateway ™. [171]
- Hide the CPUID in VirtualBox 5 by setting generic values via
HostCPUID
. [172]
Qubes-Whonix ™[edit]
Bug Fixes[edit]
- Implemented whonixcheck fixes for Qubes R4. [173]
- Corrected false positive failure messages for the updates proxy test in Qubes R4. [174] [175]
- Resolved non-functionality of Tor Browser due to jemalloc corruption. [176]
- Resolved segfaults in Tor Browser caused by excessive string length in the XDG_CONFIG_DIRS environment variable. [177]
- Resolved accumulation of old Tor Browser instances in /var/cache/tb-binary/.tb/ which caused users to run into full disk error messages. [178]
- Corrected dependencies in the qubes-whonix package to resolve issues when upgrading to Debian stretch. [179]
- Fixed a corridor lintian warning on Debian related to systemd documentation. [180]
- Resolved error messages associated with tput using an empty TERM environment variable. [181]
- Resolved the failure of tb-updater to copy Tor Browser into the user's home directory on first VM startup in Qubes R4. [182] [183] [184]
- Implemented the correct appmenus for Qubes-Whonix ™ 14 TemplateVMs and fixed missing appmenu entries. [185] [186]
- Resolved the false positive timedatectl error message when using whonixcheck. [187]
- Corrected the absent 'Connected to Tor.' message, which arose due to a missing notification daemon. [188]
- Resolved non-persistence of files in /usr/local, such as the Tor configuration file. [189] [190]
- Implemented a qvm-features-request
whonix-ws=1
, so that newly created Whonix-Workstation ™ AppVMs inherit the anon-vm tag. [191] [192] [193] - Created qubes-core-admin-addon-whonix to enforce the anon-vm tag for newly created Whonix-Workstation ™ AppVMs. [194]
- Removed redundant warning messages affecting Whonix-Workstation ™ DisposableVMs that related to the first invocation of an open-link-confirmation. [195]
- Fixed an APT package issue whereby some users were downgraded to a known vulnerable version. [196] [197]
- Corrected an aptitude update failure which affected all Qubes-Whonix ™ VMs. [198]
- Installed Tor Browser by default in Whonix-Workstation ™-DisposableVMs, as it was previously missing upon VM launch. [199]
- Fixed the periodic failure of Whonix-Workstation ™ AppVMs to start correctly, which prevented the launch of any user applications. [200]
- Fixed an error which caused /etc in Qubes-Whonix ™ templates to be owned by user:user [201]
Builds[edit]
- Corrected the build failure of the Whonix-Workstation ™ template in Qubes-Whonix ™ R3.2 and added qubes-template-whonix to the continuous integration service TravisCI. [202]
- Removed older unstable Whonix ™ 14 builds from Qubes' unstable repository. [203]
- Resolved unexpected build failures. [204]
- Removed Whonix ™ 14 templates from Qubes' unstable repository, since testing versions now reside in qubes-templates-community-testing. [205]
- Backported versioning of Whonix ™ template names from Qubes R4 to Qubes R3.2 to simplify the installation procedure for users on the earlier platform. [206]
Code[edit]
- Removed cups and system-config-printer from Whonix-Workstation ™, since printing capabilities are better suited to alternate VMs and this also removes a local TCP listener that is otherwise created. [207]
- Corrected anon-meta-packages compatibility for Qubes R3.2 and R4. [208]
- Installed pulseaudio-qubes for audio support and removed pulseaudio and VLC from
sys-whonix
. [209] - Created a qvm-features-request
whonix-gw=1
as a prerequisite for sdwdate-gui-qubes. [210]
Improved Functionality and Usability[edit]
- Confirmed full Qubes-Whonix ™ compatibility with Qubes R4. [211]
- Created a tb-updater storage path for Qubes R4 so new AppVMs and DisposableVMs have a copy of the latest Tor Browser version. [212] [213]
- Created Qubes-Whonix ™ 14 SaltStack state files with flexible versioning for future releases. [214] [215]
- Modified Qubes-Whonix ™ Salt code so the repository is not hard-coded, allowing users to choose either the qubes-templates-community or qubes-templates-community-testing repository. [216]
Licensing[edit]
- Added a COPYING file to the Qubes-Whonix ™ template repository to assure users they are covered by a free software license. [217] [218]
Security Enhancements[edit]
- Added Qubes-Whonix ™ tags on domain-load rather than upon VM creation to avoid missing tags for users that upgrade. [219]
Whonix ™ 14 Updates[edit]
As Whonix ™ is now a rolling distribution, users will benefit from regular small security and usability improvements, features and bug fixes as they enter the Whonix ™ stable repository.
Due to the lengthy list of updates released in Whonix ™ 14 to address outstanding issues, please refer to this entry.
Whonix ™ 15 Changelog[edit]
Whonix ™ 15 was released on July 1, 2019. Significantly, Whonix ™ 15 is based on the Debian buster (Debian 10) distribution which is due for release on July 7, instead of Debian stretch (Debian 9). Users now have access to numerous updated and new software packages, and more. Some fixes/changes were implemented in both Whonix ™ 14 and 15.
All Platforms[edit]
Bug Fixes[edit]
- Fixed file saving issues in scurl wrappers. [220] [221] [222]
- Fixed the partial truncation of text in Whonix ™ Connection Wizard. [223]
- Installed cryptsetup by default so errors do not appear when using a GUI and interacting with encrypted containers. [224] [225] [226]
Builds[edit]
- Ported the build script to cowbuilder; build packages in chroot and use mmdebstrap for better security. [227]
Code[edit]
- Modified whonixcheck so it suggests to start networking / onion-grater if it is not running. [228]
- Improved the /usr/share/sdwdate/unit_test [229] [230]
- Improved the sdwdate message Tor consensus message. [231]
- Confirmed the sanity of systemd DNS after porting to Debian Buster. [232]
- Established sane built-in defaults even if configuration files are non-existing. [233] [234]
- Updated the onion list time sources for sdwdate so that offline and unwanted onions were removed. [235]
Improved Functionality and Usability[edit]
- Ported Whonix ™ from Debian stretch to Debian buster. [236]
- Added the qTox instant messaging application [archive] by default. [237]
- Install Firejail [archive] and Firetools [archive] by default inside Whonix ™. [238] [239]
- Added the Metadata anonymisation toolkit v2 (MAT2) [archive] by default. [240] [241] [242]
- Added a LUKS container GUI (zulucrypt-gui [archive]) [243] by default to make management and creation of containers easy. [244] [245]
- OnionShare is now installed by default for easier, anonymous sharing of files. [246] [247]
- Added KeePassXC [archive] as the default Password Manager in Whonix-Workstation. [248]
- Removed the Richochet instant messaging application [archive] since it is no longer working in Whonix ™ 15. [249] [250]
- Nyx [archive] has replaced tor-arm as the Tor controller, providing (slightly) better functionality and usability. [251] [252]
- Set VLC X11 video decoding by default so it works more reliably and avoids known problems. [253]
Security Enhancements[edit]
- The Jitter RNG Daemon (jitterentropy) [archive] is now installed by default to improve randomness if entropy on the system runs low. [254] [255]
Non-Qubes-Whonix[edit]
Bug Fixes[edit]
Builds[edit]
- Significantly reduced the size of Non-Qubes-Whonix images using zerofree. [258]
Improved Functionality and Usability[edit]
- Added grub-live VM Live Mode-mode as a default package. [259] [260] [261] [262] [263]
- Added a description to whonix-vbox images. [264] [265] [266]
- Implemented Whonix ™ KVM serial console support. [267]
Security Enhancements[edit]
- Disabled boot devices and modified audio settings in VirtualBox Workstation and Gateway to improve security. [268] [269]
- Forked [archive] the kloak - Keystroke Anonymization Tool [archive] and installed it by default in Non-Qubes-Whonix. [270] [271]
- Improved the default kernel hardening options for better security. [272] [273] [274]
Qubes-Whonix ™[edit]
Bug Fixes[edit]
- Correctly configured Qubes-Whonix ™ XFCE default start menu entries (whitelisted appmenus). [275]
Builds[edit]
- Created Qubes-Whonix 15 template configuration files. [276] [277]
- Confirmed the Whonix-15-gateway template builds. [278]
Improved Functionality and Usability[edit]
- Simplified instructions for VM kernel [archive] in Qubes-Whonix ™ by installing the same recommended Qubes packages as Qubes Debian packages. [279] [280]
- In DisposableVMs, tb-updater / tb-starter was modified to no longer copy Tor Browser to the user home directory at first boot -- /var/cache/tb-binary is now directly used to improve startup performance. [281] [282]
Security Enhancements[edit]
Footnotes[edit]
- ↑ https://www.whonix.org/blog/whonix-13-released [archive]
- ↑ https://phabricator.whonix.org/maniphest/query/TfpGK0Sq8w1j/#R [archive]
- ↑ Descriptions of changes in Whonix ™ 12 [archive] and earlier versions [archive] can be found on sourceforge.net
- ↑ A handful of issues have been fixed in both Whonix ™ 13 and Whonix ™ 14 and backported to both versions.
- ↑ https://phabricator.whonix.org/T672 [archive]
- ↑ https://phabricator.whonix.org/T314 [archive]
- ↑ https://phabricator.whonix.org/T201 [archive]
- ↑ https://phabricator.whonix.org/T499 [archive]
- ↑ https://phabricator.whonix.org/T666 [archive]
- ↑ https://phabricator.whonix.org/T465 [archive]
- ↑ The same firewall rules are still applied.
- ↑ https://phabricator.whonix.org/T286 [archive]
- ↑ https://phabricator.whonix.org/T482 [archive]
- ↑ https://phabricator.whonix.org/T480 [archive]
- ↑ https://phabricator.whonix.org/T451 [archive]
- ↑ For instance, tor-arm, restart Tor and other terminal programs.
- ↑ https://phabricator.whonix.org/T435 [archive]
- ↑ This does not enable transparent proxying by default, but is required in Qubes so tinyproxy traffic can be redirected [archive] to 127.0.01 instead of to qubes-netvm-gateway.
- ↑ https://phabricator.whonix.org/T419 [archive]
- ↑ https://phabricator.whonix.org/T300 [archive]
- ↑ https://phabricator.whonix.org/T200 [archive]
- ↑ https://phabricator.whonix.org/T159 [archive]
- ↑ https://phabricator.whonix.org/T40 [archive]
- ↑ https://phabricator.whonix.org/T158 [archive]
- ↑ https://phabricator.whonix.org/T418 [archive]
- ↑ https://phabricator.whonix.org/T472 [archive]
- ↑ https://phabricator.whonix.org/T764 [archive]
- ↑ https://phabricator.whonix.org/T497 [archive]
- ↑ https://phabricator.whonix.org/T266 [archive]
- ↑ https://phabricator.whonix.org/T528 [archive]
- ↑ This fixes various bugs relating to Tor starting / failing multiple times and qubes-whonix-torified-updates-proxy sometimes failing.
- ↑ https://phabricator.whonix.org/T724 [archive]
- ↑ https://phabricator.whonix.org/T723 [archive]
- ↑ Qubes R4 RC1.
- ↑ https://phabricator.whonix.org/T384 [archive]
- ↑ https://phabricator.whonix.org/T671 [archive]
- ↑ https://phabricator.whonix.org/T496 [archive]
- ↑ https://phabricator.whonix.org/T454 [archive]
- ↑ https://phabricator.whonix.org/T452 [archive]
- ↑ https://phabricator.whonix.org/T527 [archive]
- ↑ https://phabricator.whonix.org/T710 [archive]
- ↑ https://phabricator.whonix.org/T498 [archive]
- ↑ https://phabricator.whonix.org/T416 [archive]
- ↑ https://phabricator.whonix.org/T507 [archive]
- ↑ https://phabricator.whonix.org/T433 [archive]
- ↑ The qubes-update-check.service already has improved upgrade notifications.
- ↑ https://phabricator.whonix.org/T429 [archive]
- ↑ For instance, plasma-widget-folderview, kde-kdm-autologin, split the anon-shared-desktop-kde package and so on.
- ↑ https://phabricator.whonix.org/T428 [archive]
- ↑ https://phabricator.whonix.org/T491 [archive]
- ↑ https://phabricator.whonix.org/T477 [archive]
- ↑ https://phabricator.whonix.org/T461 [archive]
- ↑ https://phabricator.whonix.org/T414 [archive]
- ↑ https://phabricator.whonix.org/T501 [archive]
- ↑ https://phabricator.whonix.org/T421 [archive]
- ↑ https://phabricator.whonix.org/T417 [archive]
- ↑ https://phabricator.whonix.org/T406 [archive]
- ↑ https://phabricator.whonix.org/T502 [archive]
- ↑ https://www.debian.org/releases/stretch/ [archive]
- ↑ https://www.debian.org/News/2017/20170617 [archive]
- ↑ https://www.debian.org/releases/stable/amd64/release-notes/ [archive]
- ↑ https://www.debian.org/releases/stable/i386/release-notes/ [archive]
- ↑ https://forums.whonix.org/t/apparmor-and-kernel-4-14-18-1-creates-tons-of-kern-log-pop-ups/4811 [archive]?
- ↑ https://phabricator.whonix.org/T676 [archive]
- ↑ https://phabricator.whonix.org/T672 [archive]
- ↑ https://phabricator.whonix.org/T587 [archive]
- ↑ https://phabricator.whonix.org/T568 [archive]
- ↑ https://phabricator.whonix.org/T532 [archive]
- ↑ https://phabricator.whonix.org/T557 [archive]
- ↑ The Whonix ™ documentation recommends that advanced users install apparmor-notify to investigate relevant warnings.
- ↑ https://phabricator.whonix.org/T640 [archive]
- ↑ https://phabricator.whonix.org/T626 [archive]
- ↑ https://phabricator.whonix.org/T592 [archive]
- ↑ https://phabricator.whonix.org/T787 [archive]
- ↑ https://phabricator.whonix.org/T797 [archive]
- ↑ https://phabricator.whonix.org/T462 [archive]
- ↑ https://phabricator.whonix.org/T490 [archive]
- ↑ https://phabricator.whonix.org/T675 [archive]
- ↑ https://phabricator.whonix.org/T700 [archive]
- ↑ https://phabricator.whonix.org/T760 [archive]
- ↑ https://phabricator.whonix.org/T761 [archive]
- ↑ https://phabricator.whonix.org/T643 [archive]
- ↑ https://phabricator.whonix.org/T666 [archive]
- ↑ https://phabricator.whonix.org/T688 [archive]
- ↑ https://phabricator.whonix.org/T686 [archive]
- ↑ https://phabricator.whonix.org/T650 [archive]
- ↑ https://phabricator.whonix.org/T768 [archive]
- ↑ https://phabricator.whonix.org/T648 [archive]
- ↑ https://phabricator.whonix.org/T632 [archive]
- ↑ https://phabricator.whonix.org/T628 [archive]
- ↑ https://phabricator.whonix.org/T627 [archive]
- ↑ https://phabricator.whonix.org/T608 [archive]
- ↑ https://phabricator.whonix.org/T603 [archive]
- ↑ https://phabricator.whonix.org/T601 [archive]
- ↑ gtk3-engines-oxygen.
- ↑ https://phabricator.whonix.org/T578 [archive]
- ↑ https://phabricator.whonix.org/T548 [archive]
- ↑ https://phabricator.whonix.org/T623 [archive]
- ↑ This also reduces the RAM load caused by too many socat instances.
- ↑ https://phabricator.whonix.org/T689 [archive]
- ↑ This measure takes place over Tor using a v3 onion. It does not include collection of IP addresses or unique identifiers of any kind, and can be easily disabled.
- ↑ https://phabricator.whonix.org/T551 [archive]
- ↑ https://phabricator.whonix.org/T535 [archive]
- ↑ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=833474 [archive]
- ↑ https://phabricator.whonix.org/T537 [archive]
- ↑ https://phabricator.whonix.org/T192 [archive]
- ↑ https://phabricator.whonix.org/T488 [archive]
- ↑ https://phabricator.whonix.org/T639 [archive]
- ↑ https://phabricator.whonix.org/T762 [archive]
- ↑ https://phabricator.whonix.org/T637 [archive]
- ↑ https://phabricator.whonix.org/T589 [archive]
- ↑ https://phabricator.whonix.org/T563 [archive]
- ↑ https://phabricator.whonix.org/T796 [archive]
- ↑ https://phabricator.whonix.org/T691 [archive]
- ↑ https://github.com/systemd/systemd/issues/5207 [archive]
- ↑ https://phabricator.whonix.org/T686 [archive]
- ↑ https://phabricator.whonix.org/T50 [archive]
- ↑ https://phabricator.whonix.org/T699 [archive]
- ↑ https://forums.whonix.org/t/censorship-circumvention-tor-pluggable-transports/2601 [archive]
- ↑ https://phabricator.whonix.org/T716 [archive]
- ↑ OnionShare is not installed by default in Whonix ™ 14 because it is not in the stretch repository, however it may be manually installed using the available wiki instructions.
- ↑ https://phabricator.whonix.org/T657 [archive]
- ↑ onion-grater [archive]:
Filters out Tor control protocol commands that are dangerous for anonymity such as GETINFO ADDRESS using a whitelist. Acts as a proxy between the client application and Tor.
For example it allows using Tor Browser's New Identity feature on Anonymity Distribution Workstations, fixes Tor Browser's about:tor default homepage and Tor Button status indicator without exposing commands that are dangerous for anonymity. - ↑ https://phabricator.whonix.org/T701 [archive]
- ↑ https://forums.whonix.org/t/onioncircuits-viewing-the-status-and-circuits-of-tor/2539 [archive]
- ↑ https://phabricator.whonix.org/T579 [archive]
- ↑ https://phabricator.whonix.org/T576 [archive]
- ↑ https://phabricator.whonix.org/T574 [archive]
- ↑ https://phabricator.whonix.org/T573 [archive]
- ↑ https://phabricator.whonix.org/T510 [archive]
- ↑ https://phabricator.whonix.org/T503 [archive]
- ↑ https://phabricator.whonix.org/T357 [archive]
- ↑ https://phabricator.whonix.org/T274 [archive]
- ↑ https://phabricator.whonix.org/T561 [archive]
- ↑ https://phabricator.whonix.org/T481 [archive]
- ↑ https://phabricator.whonix.org/T73 [archive]
- ↑ This is no longer recommended, since the The Tor Project has ceased development and stopped building and distributing sandboxed-tor-browser binaries [archive].
- ↑ https://phabricator.whonix.org/T583 [archive]
- ↑ By default, kloak is packaged in Whonix ™ 15 for the Non-Qubes-Whonix platform. Unfortunately Qubes-Whonix is unsupported (dysfunctional) due to the following Qubes issues:
- ↑ https://phabricator.whonix.org/T647 [archive]
- ↑ https://phabricator.whonix.org/T617 [archive]
- ↑ https://phabricator.whonix.org/T612 [archive]
- ↑ https://phabricator.whonix.org/T599 [archive]
- ↑ https://phabricator.whonix.org/T764 [archive]
- ↑ Previously both clearnet and onion sources were in use and priority was given to the latter, with v3 onion connections being preferred (clearnet provided a fallback). Onions will not be set by default until OnionBalance [archive] is available for v3 onions, and the repositories can be reached reliably.
- ↑ https://phabricator.whonix.org/T590 [archive]
- ↑ https://phabricator.whonix.org/T500 [archive]
- ↑ https://phabricator.whonix.org/T356 [archive]
- ↑ https://phabricator.whonix.org/T610 [archive]
- ↑ https://phabricator.whonix.org/T471 [archive]
- ↑ https://phabricator.whonix.org/T475 [archive]
- ↑ https://phabricator.whonix.org/T559 [archive]
- ↑ https://phabricator.whonix.org/T736 [archive]
- ↑ The default Whonix ™ PDF reader.
- ↑ https://www.locklizard.com/track-pdf-monitoring/ [archive]
- ↑ https://phabricator.whonix.org/T776 [archive]
- ↑ Until it is determined how to enable kde-folderview in Debian stretch.
- ↑ https://phabricator.whonix.org/T680 [archive]
- ↑ https://phabricator.whonix.org/T638 [archive]
- ↑ https://phabricator.whonix.org/T598 [archive]
- ↑ https://github.com/Whonix/shared-folder-help/commit/2130d872d4e346bc490e70fca79e572d1d1f86df [archive]
- ↑ https://phabricator.whonix.org/T790 [archive]
- ↑ http://forums.whonix.org/t/reducing-size-of-ova-images [archive]
- ↑ VirtualBox .ova and libvirt qcow2 raw images.
- ↑ The Whonix-Gateway ™ is reduced from 1.7 GB to 850 MB, while the Whonix-Workstation ™ is reduced from 2 GB to 1.1 GB.
- ↑ https://phabricator.whonix.org/T722 [archive]
- ↑ https://phabricator.whonix.org/T714 [archive]
- ↑
grub-live
is not installed by default in Whonix ™ 14 and is an optional package only. - ↑ https://phabricator.whonix.org/T703 [archive]
- ↑ https://phabricator.whonix.org/T702 [archive]
- ↑ https://github.com/Whonix/anon-meta-packages/commit/a22b1807c79cb1d21447c83ed251c331cf6222f1 [archive]
- ↑ https://phabricator.whonix.org/T408 [archive]
- ↑ https://phabricator.whonix.org/T724 [archive]
- ↑ https://phabricator.whonix.org/T723 [archive]
- ↑ Qubes R4 RC1.
- ↑ https://phabricator.whonix.org/T651 [archive]
- ↑ https://phabricator.whonix.org/T767 [archive]
- ↑ https://phabricator.whonix.org/T671 [archive]
- ↑ https://phabricator.whonix.org/T620 [archive]
- ↑ https://phabricator.whonix.org/T607 [archive]
- ↑ https://phabricator.whonix.org/T505 [archive]
- ↑ https://phabricator.whonix.org/T781 [archive]
- ↑ https://github.com/Whonix/tb-updater/issues/2 [archive]
- ↑ https://phabricator.whonix.org/T789 [archive]
- ↑ https://github.com/QubesOS/qubes-issues/issues/4033 [archive]
- ↑ https://github.com/QubesOS/qubes-issues/issues/4093 [archive]
- ↑ https://github.com/QubesOS/qubes-issues/issues/3469 [archive]
- ↑ https://github.com/QubesOS/qubes-issues/issues/4098 [archive]
- ↑ A persistent configuration now applies upon reboot.
- ↑ https://github.com/QubesOS/qubes-issues/issues/4095 [archive]
- ↑ https://github.com/QubesOS/qubes-issues/issues/3595 [archive]
- ↑ https://phabricator.whonix.org/T791 [archive]
- ↑ The anon-vm tag [archive] enforces selected settings from TemplateVMs to TemplateBasedVMs which are necessary for anonymity.
- ↑ https://phabricator.whonix.org/T792 [archive]
- ↑ https://github.com/QubesOS/qubes-issues/issues/4113 [archive]
- ↑ https://github.com/QubesOS/qubes-issues/issues/4055 [archive]
- ↑ The bug caused a version downgrade to APT 1.0.9.8.4
- ↑ https://github.com/QubesOS/qubes-issues/issues/3882 [archive]
- ↑ https://github.com/QubesOS/qubes-issues/issues/3740 [archive]
- ↑ https://github.com/QubesOS/qubes-issues/issues/2334 [archive]
- ↑ https://github.com/QubesOS/qubes-issues/issues/1156 [archive]
- ↑ https://phabricator.whonix.org/T527 [archive]
- ↑ https://github.com/QubesOS/qubes-issues/issues/3766 [archive]
- ↑ https://github.com/QubesOS/qubes-issues/issues/4063 [archive]
- ↑ https://github.com/QubesOS/qubes-issues/issues/4086 [archive]
- ↑ https://github.com/QubesOS/qubes-issues/issues/4130 [archive]
- ↑ https://phabricator.whonix.org/T619 [archive]
- ↑ https://phabricator.whonix.org/T697 [archive]
- ↑ https://phabricator.whonix.org/T641 [archive]
- ↑ https://github.com/QubesOS/qubes-issues/issues/4080 [archive]
- ↑ https://phabricator.whonix.org/T698 [archive]
- ↑ https://phabricator.whonix.org/T726 [archive]
- ↑ https://forums.whonix.org/t/qubes-dispvm-technical-discussion/3232/58 [archive]
- ↑ https://github.com/QubesOS/qubes-issues/issues/3765 [archive]
- ↑ https://phabricator.whonix.org/T788 [archive]
- ↑ https://github.com/QubesOS/qubes-issues/issues/4087 [archive]
- ↑ https://phabricator.whonix.org/T810 [archive]
- ↑ Whonix ™ is licensed under GPLv3. The repository in question can be found here [archive].
- ↑ https://github.com/QubesOS/qubes-issues/issues/4094 [archive]
- ↑ https://phabricator.whonix.org/T899 [archive]
- ↑ https://github.com/Whonix/scurl/pull/1 [archive]
- ↑ A few fixes were needed, such as:
- Remove
--remote-name
and replace it with--remote-name-all
. - Improve download wrappers and add
--remote-header-name
.
- Remove
- ↑ https://phabricator.whonix.org/T923 [archive]
- ↑ https://phabricator.whonix.org/T890 [archive]
- ↑ For instance, an error would otherwise appear when using XFCE file manager with encrypted USBs.
- ↑ https://forums.whonix.org/t/have-cryptsetup-installed-by-default-in-whonix/6684/5 [archive]
- ↑ https://forums.whonix.org/t/fixed-apt-rce-announced-new-whonix-images-needed-whonix-build-not-safe-at-the-moment/6715 [archive]
- ↑ https://phabricator.whonix.org/T853 [archive]
- ↑ https://phabricator.whonix.org/T712 [archive]
- ↑ Specifically:
- Make it simpler (to split urls into chunks of 3).
- Generate average, total etc. for each pool.
- Add curl command for the failures (timeouts).
- ↑ https://phabricator.whonix.org/T850 [archive]
- ↑ https://phabricator.whonix.org/T866 [archive]
- ↑ https://phabricator.whonix.org/T503 [archive]
- ↑ This was completed for whonix-gw-firewall, whonix-ws-firewall, whonixcheck, sdwdate, uwt, onion-grater (Control Port Filter Proxy), rads, open-link-confirmation, tb-starter, tb-updater and anon-ws-disable-stacked-tor.
- ↑ https://github.com/TNTBOMBOM/sdwdate/commit/2985fc70625ae13aed45225b8c83592575c21a78 [archive]
- ↑ https://forums.whonix.org/t/port-whonix-from-debian-stretch-to-debian-buster/7101 [archive]
- ↑ https://phabricator.whonix.org/T889 [archive]
- ↑ https://phabricator.whonix.org/T869 [archive]
- ↑ https://forums.whonix.org/t/install-firejail-firetools-by-default/5363/3 [archive]
- ↑
MAT2 only removes metadata from your files, it does not anonymise their content, nor can it handle watermarking, steganography, or any too custom metadata field/system.
- ↑ https://phabricator.whonix.org/T885 [archive]
- ↑ https://forums.whonix.org/t/add-mat2-to-whonix-15/6489 [archive]
- ↑ zulumount-gui [archive] is also installed.
- ↑ https://phabricator.whonix.org/T769 [archive]
- ↑ https://forums.whonix.org/t/zulucrypt-in-whonix-14/4876 [archive]
- ↑ https://phabricator.whonix.org/T595 [archive]
- ↑ https://forums.whonix.org/t/feature-request-onionshare-support/300/7 [archive]
- ↑ https://github.com/Whonix/anon-meta-packages/commit/8d5e892d3b603bb1390d3c152f70f8b8e8bfefef [archive]
- ↑ Primarily due to incompatibility with v3 onions.
- ↑ https://forums.whonix.org/t/remove-ricochet-from-whonix/5009 [archive]
- ↑ https://forums.whonix.org/t/what-about-nyx/6380 [archive]
- ↑ nyx is actually the same project; just the name has changed and the presentation is very similar.
- ↑ http://phabricator.whonix.org/T798 [archive]
- ↑ https://phabricator.whonix.org/T817 [archive]
- ↑
Using the Jitter RNG core, the rngd provides an entropy source that feeds into the Linux /dev/random device if its entropy runs low. ... Especially during boot time, when the entropy of Linux is low, the Jitter RNGd provides a source of sufficient entropy.
- ↑ https://phabricator.whonix.org/T848 [archive]
- ↑ https://forums.whonix.org/t/failed-failed-to-start-virtualbox-guest-utils/5975/4 [archive]
- ↑ https://forums.whonix.org/t/reducing-size-of-ova-images/5095 [archive]
- ↑ https://phabricator.whonix.org/T886 [archive]
- ↑ https://github.com/Whonix/grub-default-live [archive]
- ↑ https://github.com/Whonix/anon-meta-packages/pull/18 [archive]
- ↑ https://forums.whonix.org/t/installing-whonix-live-mode-in-all-distributed-images/6467 [archive]
- ↑ This means Non-Qubes-Whonix users can boot into live-mode out of the box, without needing to install it.
- ↑ https://phabricator.whonix.org/T825 [archive]
- ↑ Such as the root password, Whonix ™ home page and so on.
- ↑ https://forums.whonix.org/t/add-description-to-whonix-vbox-images/5828/1 [archive]
- ↑ https://forums.whonix.org/t/how-do-i-enter-the-whonix-shell-from-cli/7271 [archive]
- ↑ https://phabricator.whonix.org/T782 [archive]
- ↑ The floppy and optical settings were disabled in both the Gateway and Workstation, while the Gateway audio was also disabled.
- ↑
kloak is a privacy tool that makes keystroke biometrics less effective. This is accomplished by obfuscating the time intervals between key press and release events, which are typically used for identification. This project is experimental.
- ↑ https://forums.whonix.org/t/kloak-keystroke-anonymization-tool/7089 [archive]
- ↑ See recent pull requests here [archive].
- ↑ https://forums.whonix.org/t/kernel-hardening/7296/9 [archive]
- ↑ The specific changes include:
Kernel symbols in /proc/kallsyms are hidden to prevent malware from reading them and using them to learn more about what to attack on your system.
Kexec is disabled as it can be used for live patching of the running kernel.
The BPF JIT compiler is restricted to the root user and is hardened.
ASLR effectiveness for mmap is increased.
The ptrace system call is restricted to the root user only.
The TCP/IP stack is hardened.
This package makes some data spoofing attacks harder.
SACK is disabled as it is commonly exploited and is rarely used.
This package disables the merging of slabs of similar sizes to prevent an attacker from exploiting them.
Sanity checks, redzoning, and memory poisoning are enabled.
The kernel now panics on uncorrectable errors in ECC memory which could be exploited.
Kernel Page Table Isolation is enabled to mitigate Meltdown and increase KASLR effectiveness.
SMT is disabled as it can be used to exploit the MDS vulnerability.
All mitigations for the MDS vulnerability are enabled.
DCCP, SCTP, TIPC and RDS are blacklisted as they are rarely used and may have unknown vulnerabilities.
- ↑ https://phabricator.whonix.org/T883 [archive]
- ↑ https://github.com/QubesOS/qubes-template-configs/pull/6/commits/d4f429669b849fc73973e2e557a24cceab47c45e [archive]
- ↑ https://github.com/QubesOS/qubes-builder/pull/82/commits/64a661241430c6a22ca98bb11370b2a3e3cf0e12 [archive]
- ↑ https://github.com/QubesOS/qubes-issues/issues/4957 [archive]
- ↑ https://github.com/Whonix/qubes-whonix/commit/8d8ab41bbf9c7fa63f3e79b8511d439efe33caeb [archive]
- ↑ https://github.com/Whonix/qubes-whonix/commit/c08dfed97cfba369ff753b4d96755b47240fffb2 [archive]
- ↑ https://github.com/QubesOS/qubes-issues/issues/4918 [archive]
- ↑ Neither are backups of Tor Browser maintained anymore; previously three backups were stored.
- ↑ https://phabricator.whonix.org/T858 [archive]
- ↑ timesync-fail-closed means sdwdate did not succeed yet. Networking for all but Tor and sdwdate should still be locked in this scenario.
Whonix ™ is Supported by Evolution Host DDoS Protected VPS. Stay private and get your VPS with Bitcoin or Monero.
100px | |
Fosshost | About Advertisements |
Search engines: YaCy | Qwant | ecosia | MetaGer | peekier | Whonix ™ Wiki
Have you contributed to Whonix ™? If so, feel free to add your name and highlight what you did on the Whonix ™ authorship page.
Priority Support | Investors | Professional Support
Whonix ™ | © ENCRYPTED SUPPORT LP | Freedom Software / Open Source (Why?)
The personal opinions of moderators or contributors to the Whonix ™ project do not represent the project as a whole.