Actions

Dev/Virtualization Platform

From Whonix

< Dev(Redirected from Dev/Other Virtualization Platforms)


Introduction[edit]

Whonix ™ is available for:

In an ideal world, Whonix ™ would support all Virtualization Platforms. Theoretically it could be done using libvirt. Practically libvirt is out of question. libvirt-users Does libvirt abstract each and any vm specific command? Libvirt does not (yet) abstract some commands Whonix ™ depends on.

Other Virtualization Platforms[edit]

Introduction[edit]

In theory, Whonix ™ could run inside any virtualizer, because its build scripts are very modular and extensible. In reality, Whonix ™ has no man power to test other virtualizers. As soon as contributors join the project and maintain support for other virtualizers, support for them can most likely be easily added.

Support Plan[edit]

Whonix ™ would need a maintainer to support the other virtualization platform.

Important:

Ideal:

  • Someone who creates, signs, uploads .ova images for the other virtualization platform (such as VMware, KVM, etc.).

Partially Finished Attempts[edit]

  • QEMU (deprecated)
  • VMware (proof of concept, no maintainer)

VirtualBox[edit]

Is VirtualBox an Insecure Choice?[edit]

Update:

Although VirtualBox is not an ideal choice, fortunately other platforms are supported:

For greater security, users with suitable hardware and sufficient skill are recommended to prefer Qubes-Whonix ™ (a bare-metal hypervisor) over Type 2 hypervisors like VirtualBox.

The primary reason Whonix ™ supports VirtualBox is because it is a familiar, cross-platform virtualizer which can attract more users to open source (free/Libre) software, Tor and Linux in general. By remaining highly accessible, Whonix:

  • Increases the scope of potential growth in the user base.
  • Attracts greater attention as a suitable anonymity-focused operation system.
  • Increases the likelihood of additional human resources and monetary contributions.
  • Allows novice users to easily test Whonix ™ and learn more about security and anonymity practices.
  • Improves the relative security and anonymity of Tor / Tor Browser users by offering a virtualized solution.

Old statement:

If you would like to see the old statement, please press on expand on the right.

Whonix ™ in VirtualBox vs Tor / Tor Browser / Torified Applications on the Host[edit]

It is recognized that VirtualBox is not an ideal choice; see Dev/Virtualization Platform. However, there are different goals to bear in mind - Whonix ™ is primarily focused on protecting a user's IP address / location.

A common refrain of critics is that VirtualBox is "too weak". This is a theoretical concern and does not have any practical implications at present, since Whonix ™ in VirtualBox is actually more secure than running Tor, Tor Browser or torified applications on the host in many cases; see Whonix ™ Security in the Real World.

It must be remembered that there are no alternatives for a large segment of the population who do not have sufficiently powerful hardware to run Qubes-Whonix ™, or who are technically incapable of running KVM. In this case, it is safer for them to run Whonix ™ in VirtualBox, rather than continuing to utilize Tor on the host. For example, Whonix ™ helps to protect against future proxy bypass bugs or software which does not honor proxy settings.

The strength of Whonix ™ and virtualization in general is adherence to the security by isolation principle. VirtualBox critics need to objectively consider how many exploits currently exist for VirtualBox and the track record of exploits. Admittedly, virtual machine exploits may become far more problematic in the future, but at present Whonix ™ is considered to provide more security out of the box running in VirtualBox, than not.

Platforms with Improved Security[edit]

Anybody seriously considering Whonix ™ for improved security should refer to the Documentation, particularly the Security Guide and Advanced Security Guide entries, as well as supported platforms other than VirtualBox. Whonix ™ is a poster child for the Isolating Proxy Concept and Security by Isolation.

Many users still default to running Tor on their Windows or Linux host. Whonix ™ is immediately available to this cohort to substantially improve their real world security. Indeed, Whonix ™ is the only up-to-date OS designed to be run inside a VM and paired with Tor, which is actively maintained and developed. Other similar projects like JanusVM are seriously outdated and no longer actively maintained. [1]

Whonix ™ cannot serve all target audiences. Users seeking a higher security solution will prefer other supported platforms, like Qubes-Whonix ™. "Hardcore" users may prefer to build their own custom hardened solutions, while still profiting from Whonix ™ research and source code. Hardened solutions like the Hardened Gentoo Whonix-Gateway ™ are more difficult to use and therefore cannot be set as the default installation for Whonix ™.


VirtualBox missing features[edit]

The following is non-ideal for verifiable builds, because we have to convert to vdi first:

The following is non-ideal, because we can not warn when host operating systems are being used we don't think are the right tool for hosting Whonix ™ VMs:

  • VirtualBox uses VMDK version 3. This is non-ideal, because working with these images is difficult.
    • Converting these images is difficult.
      • qemu-img version 1.6.1 (qemu-img convert "vmdk_file" -O RAW "vdi_file") fails with: qemu-img: 'image' uses a vmdk feature which is not supported by this qemu version: VMDK version 3, which is a known issue in qemu. As per this, QEMU version equal or bigger than 2.8 should be capable to work with VMDK version 3 disks. TODO: try
      • Therefore it is required to convert them with VBoxManage to .vdi first. (VBoxManage clonehd --format VDI "vmdk_file" "vdi_file")
    • Therefore the Free guestmount doesn't support mounting VMDK version 3 as well (because it internally uses qemu-img). (Still true?)
    • It requires proprietary software to mount them, such as the proprietary nbdkit plugin vddk. We're not aware of a Free Software alternative yet. (Still true?)

VirtualBox no longer in Debian main[edit]

  • This is unrelated to VirtualBox Oracle VM VirtualBox Extension Pack, which is proprietary, and which was never in Debian.

Arguments for keeping VirtualBox Support[edit]

  • KVM is not available to Windows users.
  • Simplicity, as in: VirtualBox has a VM import GUI feature.
  • We have a Whonix ™ Windows Installer. (Unmaintained.)
  • Available to users not owning computer providing hardware virtualization. (KVM requires that. QEMU may or may not but is unsupported.)
  • Due to Windows users and simplicity it leads to greater popularity, which in theory attracts more users, developers, auditors, payments, etc and is therefore good for the overall health of the project.
  • Some Windows/VirtualBox users experimenting with their first Linux (Whonix ™) will one day become users who mainly use Linux as their host operating system.

Why Use KVM Over VirtualBox?[edit]

See Why Use KVM Over VirtualBox?

See Also[edit]

Misc[edit]

firejail --x11


terminal unlimited scrollback
terminal do not scroll on output


note at terminal emulator root login disabled
note at /etc/issue root login disabled


test passwordless recovery console


TBB DENIED /dev/dri/


xfce theming
https://phabricator.whonix.org/T911
hard to see workspace switcher in arc 1 theme


add workspace switcher
https://forums.whonix.org/t/whonix-virtualbox-15-0-0-0-7-debian-buster-based-testers-wanted/7131/7


xfce4 meta package split
https://forums.whonix.org/t/whonix-xfce-development/6213/79


Powered by Discourse, best viewed with JavaScript enabled

welcome page

whonixcheck

No comments for now due to spam. Use Whonix forums instead.


Random News:

We are looking for maintainers and developers.


https | (forcing) onion

Follow: Twitter | Facebook | gab.ai | Stay Tuned | Whonix News

Share: Twitter | Facebook

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to Conditions for Contributions to Whonix ™, then Edit! Edits are held for moderation.

Copyright (C) 2012 - 2019 ENCRYPTED SUPPORT LP. Whonix ™ is a trademark. Whonix ™ is a licensee of the Open Invention Network. Unless otherwise noted, the content of this page is copyrighted and licensed under the same Freedom Software license as Whonix ™ itself. (Why?)

Whonix ™ is a derivative of and not affiliated with Debian. Debian is a registered trademark owned by Software in the Public Interest, Inc.

Whonix ™ is produced independently from the Tor® anonymity software and carries no guarantee from The Tor Project about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our Privacy Policy, Cookie Policy, Terms of Service, and E-Sign Consent. Whonix ™ is provided by ENCRYPTED SUPPORT LP. See Imprint.

  1. In response to whether JanusVM was safe to use, Roger Dingledine of The Tor Project stated in 2011: "No, not safe. Probably has been unsafe to use for years."