Last update: March 17, 2019. This website uses cookies. By using our website, you acknowledge that you have read, understood and agreed to our Privacy Policy, Cookie Policy, Terms of Service, and E-Sign Consent. More information

 Actions

Chaining Anonymizing Gateways

Introduction[edit]


By default, all Whonix-Workstation ™ traffic is forced through Whonix-Gateway ™. Alternatively, a chain of anonymizing gateways can be built, with sample tunnel configurations outlined below.

Before attempting complex tunnel configurations, the following basic knowledge is required:

This Inspiration resource may also be useful.

Possible Configurations[edit]

Pre-Tor-VPN[edit]

## chain:
{{workstation_product_name}} -> VPN-Gateway    -> {{gateway_product_name}} -> clearnet
## connection scheme:
user               -> VPN            -> Tor            -> Internet

For instructions, see here. To learn more details about this configuration, refer to this entry.

Post-Tor-VPN[edit]

## chain:
{{workstation_product_name}} -> {{gateway_product_name}} -> VPN-Gateway    -> clearnet
## connection scheme:
user               -> Tor            -> VPN            -> Internet

For instructions, see here. To learn more details about this configuration, refer to this entry.

Pre- and Post-Tor-VPN[edit]

## chain:
{{workstation_product_name}} -> VPN-Gateway    -> {{gateway_product_name}} -> VPN-Gateway -> Internet
## connection scheme:
user               -> VPN            -> Tor            -> VPN         -> Internet

Whonix ™ is not limited to VPN-Gateways; the VPN can be replaced with a Proxy-Gateway.

Post-Tor-Proxy[edit]

## chain:
{{workstation_product_name}} -> Proxy-Gateway  -> {{gateway_product_name}} -> clearnet
## connection scheme:
user               -> Tor            -> Proxy          -> Internet

For instructions, see here. To learn more details about this configuration, refer to this entry.

Other Connection Schemes[edit]

Virtually any combination is possible: a Post-Tor-Proxy; a Pre/Post-Tor-SSH; or the proxy being replaced with JonDo or perhaps I2P.

Always remember that the connection will be created in reverse order; see the example below. [1]

## chain:
{{workstation_product_name}} -> Proxy-Gateway  -> {{gateway_product_name}} -> VPN-Gateway -> clearnet
## connection scheme:
user               -> VPN            -> Tor            -> Proxy       -> Internet

Upon reflection, it becomes clear why the connection happens in reverse order:

  • Whonix-Workstation ™ has no option but to pass through the Proxy-Gateway.
  • The Proxy-Gateway has no option but to pass through Whonix-Gateway ™.
  • In this case, the last element in the chain is the VPN-Gateway, which must obviously connect via clearnet.

In other terms:

  • The VPN-Gateway uses clearnet.
  • Whonix-Gateway ™ uses the VPN-Gateway to connect.
  • The Proxy-Gateway uses Whonix-Gateway ™ to connect.
  • Whonix-Workstation ™ uses the Proxy-Gateway to connect.

Since the Proxy-Gateway can only pass through Whonix-Gateway ™ followed by the VPN-Gateway, it is clear why it will be the last hop in front of the destination server.

Other Considerations[edit]

Whether these combinations make sense in terms of security and anonymity is hotly debated and depends on the user's personal threat model, see Tor plus VPN or Proxy.

Users must also understand and be capable of editing /etc/network/interfaces on Whonix-Gateway ™ and/or on Whonix-Workstation ™. In the case of Non-Qubes-Whonix ™, this refers to the virtual internal network name in VirtualBox settings.

This process is generally difficult because there are no other anonymizing gateways (VPN / JonDo / I2P / Proxy / SSH / VPN) available for download in Whonix ™, just the Whonix-Gateway ™ which uses Tor to anonymize traffic. Users often have to look for instructions and/or build an anonymizing gateway themselves. [2]

For a VPN-Gateway, see also:

Footnotes[edit]

  1. "Internet" below refers to the destination server, such as a website.
  2. There are some instructions for a pfSense based VPN-Gateway which can be found with search engines, but it is untested for leaks.

No user support in comments. See Support.

Comments will be deleted after some time. Specifically after comments have been addressed in form of wiki enhancements. See Wiki Comments Policy.


Anonymous user #1

one month ago
Score 0 You
Please add some visual graphics.
Add your comment
Whonix welcomes all comments. If you do not want to be anonymous, register or log in. It is free.


Random News:

Did you know that anyone can edit the Whonix wiki to improve it?


https | (forcing) onion

Share: Twitter | Facebook

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to Conditions for Contributions to Whonix ™, then Edit! Edits are held for moderation.

Copyright (C) 2012 - 2019 ENCRYPTED SUPPORT LP. Whonix ™ is a trademark. Whonix ™ is a licensee of the Open Invention Network. Unless otherwise noted, the content of this page is copyrighted and licensed under the same Freedom Software license as Whonix ™ itself. (Why?)

Whonix ™ is a derivative of and not affiliated with Debian. Debian is a registered trademark owned by Software in the Public Interest, Inc.

Whonix ™ is produced independently from the Tor® anonymity software and carries no guarantee from The Tor Project about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our Privacy Policy, Cookie Policy, Terms of Service, and E-Sign Consent. Whonix ™ is provided by ENCRYPTED SUPPORT LP. See Imprint.