Whonix ™ Tuning
From Whonix
Introduction[edit]
Applying steps in this chapter can improve Whonix ™ performance, but often at the cost of reduced security or an increased fingerprinting risk. Earlier entries in this chapter are easier to apply, while later tuning entries require a greater skill level.
At present the tuning steps are primarily focused on the VirtualBox virtualizer. However, contributions for other virtualizers will be happily considered.
Tested Tuning Steps[edit]
Hardware-accelerated Graphics[edit]
To enable hardware-accelerated graphics for Whonix-Workstation ™, perform these steps on the host:
- Power off the VM.
VirtualBox
→click a VM
→Settings
→Display
→Graphics Controller
→Acceleration:
checkEnable 3D Acceleration
→OK
- Restart the VM.
Also refer to the VirtualBox manual: Hardware-Accelerated Graphics [archive].
Forum discussion: VirtualBox 3D Acceleration [archive]
Increase Virtual Machine RAM[edit]
If minor identifiers are not of any concern, [1] then the RAM available to Virtual Machines can be increased via VirtualBox settings. This is most useful for Whonix-Workstation ™ if it runs into low RAM. Whonix-Gateway ™ can also profit if a large number of circuits are created and Tor is kept busy. To check how much RAM is free, use free -m
in a Terminal. Consider the example below:
- Shutdown the VM.
- Assign more RAM:
Virtual machine
→Menu
→Settings
→Adjust
Memory slider to 4096
→Hit: OK
- Restart the VM.
See also: Advice for Systems with Low RAM.
Additional CPU Cores[edit]
On systems with multi-core processors, if minor identifiers are not of any concern [2] then the number of cores available to the Virtual Machine(s) can be increased in VirtualBox settings.
Do not use the maximum since that could lead to system instability! Always leave at least one CPU unassigned; for example, if you have four CPUs then assign a maximum of three CPUs to the VM. [3]
- Power off the VM.
VirtualBox
→click a VM
→Settings
→System
→Processor
→Reduce to 3
→OK
- Restart the VM.
Untested Tuning Steps[edit]
Disable CPU Mitigations[edit]
Consider disabling the Spectre Meltdown mitigations. (Related forum discussion [archive].)
This step should be performed in the VM intended for disabled CPU mitigations and on the host operating system if either Kicksecure or security-misc are in use.
1. Remove the relevant CPU mitigations file.
sudo rm /etc/default/grub.d/40_cpu_mitigations.cfg
2. Update grub.
sudo update-grub
3. Reboot.
4. Done.
Nested Paging and VPIDs[edit]
It is possible to increase performance by using largepages and/or Virtual Processor Identifiers (VPIDs). It is unknown if this decreases security or stability. For further information refer to the VirtualBox manual: Nested Paging and VPIDs [archive].
vboxmanage modifyvm Whonix-Workstation-XFCE --largepages on
vboxmanage modifyvm Whonix-Gateway-XFCE --largepages on
vboxmanage modifyvm Whonix-Workstation-XFCE --vtxvpid on
vboxmanage modifyvm Whonix-Gateway-XFCE --vtxvpid on
Memory Ballooning, Page Fusion and Memory Overcommitment[edit]
Memory ballooning worsens security because it is a vector for side channel attacks on memory; see here for further information. [4]
For other security considerations, refer to the VirtualBox manual: Memory Overcommitment [archive].
Undocumented Tuning Settings[edit]
There are probably more tuning-related settings, but these are currently undocumented at Whonix ™. Interested readers can review the VirtualBox manual for relevant settings, which are unlikely to be bundled under a "tuning" chapter.
To view all settings, run.
vboxmanage showvminfo Whonix-Workstation-XFCE
Next, learn about all of these settings by reviewing the VirtualBox manual [archive].
Optimized Builds[edit]
Since the Whonix ™ concept is flexible and distribution-agnostic, it is possible to create your own implementation. For example, Gentoo could be used with optimized build flags for a personal system. See:
- Whonix ™ Framework; and
- UniStation.
PCI Passthrough[edit]
This setting can improve graphics performance dramatically, but it worsens security because VMs should not have direct access to physical hardware.
In simple terms, this feature allows the direct use of physical PCI devices on the host by the guest even if the host does not have drivers for the particular device. For further information, refer to VirtualBox Manual: PCI Passthrough [archive].
See Also[edit]
Footnotes[edit]
- ↑ The amount of detectable VM RAM is considered a minor risk.
- ↑ Adding CPU cores is considered a minor risk.
- ↑ VirtualBox ticket: VirtualBox should now prohibit assigning all physical CPUs to a VM and/or fix VirtualBox CPU assignment manual [archive].
- ↑ This entry relates to KVM but the research similarly applies to other virtualizers unless they have implemented and documented specific protections.
Whonix ™ is Supported by Evolution Host DDoS Protected VPS. Stay private and get your VPS with Bitcoin or Monero.
100px | |
Fosshost | About Advertisements |
Search engines: YaCy | Qwant | ecosia | MetaGer | peekier | Whonix ™ Wiki
Priority Support | Investors | Professional Support
Whonix ™ | © ENCRYPTED SUPPORT LP | Freedom Software / Open Source (Why?)
The personal opinions of moderators or contributors to the Whonix ™ project do not represent the project as a whole.