Jump to: navigation, search

Next

Warning[edit]

Documentation for the NEXT Whonix version! ONLY for developers! No guarantee it really makes into the next Whonix version.

I2P[edit]

4. Adjust I2P Settings:

  • I2P Tunnels Settings

Set the Inbound and Outbound Tunnel Length to 0:

sudo sed -i "s/\(.*outbound.length=\).*/\10/g;s/\(.*inbound.length=\).*/\10/g" "/var/lib/i2p/i2p-config/i2ptunnel.config"
[1]

  • I2P Router Configuration

(Explanation in order) [2] more Options [3]


sudo su -c "cat > "/var/lib/i2p/i2p-config/router.config" << EOF
i2np.laptopMode=true
i2np.ntcp.enable=true
i2np.ntcp.autoip=false
i2np.ntcp.ipv6=false
i2np.ntcp.maxConnections=20
i2np.udp.enable=false
i2np.udp.addressSources=hidden
i2np.udp.ipv6=false
i2np.upnp.enable=false
router.isHidden=true
router.sharePercentage=0
router.updateDisabled=true
time.disabled=true
time.sntpServerList=127.0.0.1
EOF"
[4][5]

onionshare[edit]

You need newer control port filter / upgrade to Whonix 14 developers-only. You get it by upgrading to Whonix 14 developers-only.

Upgrade both Whonix-Gateway and Whonix-Workstation to Whonix 14 developers-only. For instructions see: Upgrading_Whonix_13_to_Whonix_14

Or use Whonix 13.0.0.1.4 developers-only from https://forums.whonix.org/t/whonix-13-0-0-1-4-developers-only/3486/3 or newer (if existing).

Extend Control Port Filter Python whitelist.

On Whonix-Gateway.

mkdir -p /usr/lib/etc/tor-controlport-filter-merger.d

sudo cp /usr/share/tor-controlport-filter-merger/examples/40_onionshare.yml /etc/tor-controlport-filter-merger.d/

Restart Control Port Filter Proxy.

sudo service tor-controlport-filter restart

Modify Whonix-Workstation User Firewall Settings

Note: Initially, if you have not made any changes to Whonix Firewall Settings, then the Whonix User Firewall Settings File /etc/whonix_firewall.d/50_user.conf appears empty, because it does not exist. This is expected.

If you are using Qubes-Whonix, complete the following steps:
In Whonix-Workstation AppVM.

Make sure folder /rw/config/whonix_firewall.d exists.

sudo mkdir -p /rw/config/whonix_firewall.d

Open /rw/config/whonix_firewall.d/50_user.conf with root rights.

kdesudo kwrite /rw/config/whonix_firewall.d/50_user.conf

If you are using a graphical Whonix-Workstation, complete the following steps:

Start Menu -> Applications -> Settings -> User Firewall Settings

If you are using a terminal-only Whonix-Workstation, complete the following steps:

sudo nano /etc/whonix_firewall.d/50_user.conf

For more help, press on expand on the right.

Note: The Whonix Global Firewall Settings File /etc/whonix_firewall.d/30_default.conf contains default settings and explanatory comments about the purpose of these settings. By default, it is opened read-only and you are not supposed to directly edit the file. Below, we recommend to open the file without root rights. The file contains an explanatory comment on how to change firewall settings.

## Please use "/etc/whonix_firewall.d/50_user.conf" for your custom configuration,
## which will override the defaults found here. When Whonix is updated, this
## file may be overwritten.

See also Whonix modular flexible .d style configuration folders.

To view the file, complete the following steps.

If you are using Qubes-Whonix, complete the following steps:

Qubes App Launcher (blue/grey "Q") -> Template: whonix-gw -> Whonix Global Firewall Settings

If you are using a graphical Whonix-Gateway, complete the following steps:

Start Menu -> Applications -> Settings -> Global Firewall Settings

If you are using a terminal-only Whonix-Gateway, complete the following steps:

nano /etc/whonix_firewall.d/30_default.conf

Add. [6]

EXTERNAL_OPEN_PORTS+=" $(seq 17600 17659) "

Save.

Reload Whonix-Workstation Firewall.

If you are using Qubes-Whonix, complete the following steps:

Qubes App Launcher (blue/grey "Q") -> Whonix-Workstation AppVM (commonly named anon-whonix) -> Reload Whonix Firewall

If you are using a graphical Whonix-Workstation, complete the following steps:

Start Menu -> Applications -> System -> Reload Whonix Firewall

If you are using a terminal-only Whonix-Workstation, run:

sudo whonix_firewall

Start onionshare.

Using the gui.

TODO document

Or alternatively from terminal.

onionshare /path/to/file

Current Status: Ready in Whonix 14.

Forum discussion:
https://forums.whonix.org/t/feature-request-onionshare-support

ricochet[edit]

On Whonix-Gateway, Control Port Filter Proxy needs some adjustments.

Extend Control Port Filter Python whitelist.

On Whonix-Gateway.

mkdir -p /usr/lib/etc/tor-controlport-filter-merger.d

sudo cp /usr/share/tor-controlport-filter-merger/examples/40_ricochet.yml /etc/tor-controlport-filter-merger.d/

Restart Control Port Filter Proxy.

sudo service tor-controlport-filter restart

Modify Whonix-Workstation User Firewall Settings

Note: Initially, if you have not made any changes to Whonix Firewall Settings, then the Whonix User Firewall Settings File /etc/whonix_firewall.d/50_user.conf appears empty, because it does not exist. This is expected.

If you are using Qubes-Whonix, complete the following steps:
In Whonix-Workstation AppVM.

Make sure folder /rw/config/whonix_firewall.d exists.

sudo mkdir -p /rw/config/whonix_firewall.d

Open /rw/config/whonix_firewall.d/50_user.conf with root rights.

kdesudo kwrite /rw/config/whonix_firewall.d/50_user.conf

If you are using a graphical Whonix-Workstation, complete the following steps:

Start Menu -> Applications -> Settings -> User Firewall Settings

If you are using a terminal-only Whonix-Workstation, complete the following steps:

sudo nano /etc/whonix_firewall.d/50_user.conf

For more help, press on expand on the right.

Note: The Whonix Global Firewall Settings File /etc/whonix_firewall.d/30_default.conf contains default settings and explanatory comments about the purpose of these settings. By default, it is opened read-only and you are not supposed to directly edit the file. Below, we recommend to open the file without root rights. The file contains an explanatory comment on how to change firewall settings.

## Please use "/etc/whonix_firewall.d/50_user.conf" for your custom configuration,
## which will override the defaults found here. When Whonix is updated, this
## file may be overwritten.

See also Whonix modular flexible .d style configuration folders.

To view the file, complete the following steps.

If you are using Qubes-Whonix, complete the following steps:

Qubes App Launcher (blue/grey "Q") -> Template: whonix-gw -> Whonix Global Firewall Settings

If you are using a graphical Whonix-Gateway, complete the following steps:

Start Menu -> Applications -> Settings -> Global Firewall Settings

If you are using a terminal-only Whonix-Gateway, complete the following steps:

nano /etc/whonix_firewall.d/30_default.conf

Add.

EXTERNAL_OPEN_ALL=true

Save.

Reload Whonix-Workstation Firewall.

If you are using Qubes-Whonix, complete the following steps:

Qubes App Launcher (blue/grey "Q") -> Whonix-Workstation AppVM (commonly named anon-whonix) -> Reload Whonix Firewall

If you are using a graphical Whonix-Workstation, complete the following steps:

Start Menu -> Applications -> System -> Reload Whonix Firewall

If you are using a terminal-only Whonix-Workstation, run:

sudo whonix_firewall

ZeroNet[edit]

whonixcheck SSL Certificate Pinning[edit]

UNFINISHED! See: https://github.com/Whonix/Whonix/issues/24

Advanced users only!

In Whonix-Gateway and Whonix-Workstation.

You need torbrowser-launcher installed. [7] Currently only available from wheezy-backports.

To enable this on a by case base, use the --pin-tpo-cert command line option. Example.

whonixcheck --pin-tpo-cert

Or to permanently enable this.

Create a file /etc/whonix.d/50_user.conf.

sudo nano /etc/whonix.d/50_user.conf

Add.

PIN_TPO_CERT="true"

Footnotes[edit]

  1. It's faster and less connection interrupts. Anonymity is already provided by Tor. No need to leech from Tor/I2P.
    • change router identity and UDP port when IP changes \n
    • Enable NTCP https://geti2p.net/en/docs/transport/ntcp
    • Disable automatic IP fetching # We dont want/need to publish the Exit-Node IP
    • Disable Ipv6 for the NTCP #Unsupported by Tor so we dont need it
    • Number of concurrent NTCP connections # Reduced Connections so we dont overload the Tor node with connection attempts
    • Disable Udp #Unsupported by Tor
    • Sets the source of IP detection
    • We dont want/need to publish the Exit-Node IP
    • Disable Ipv6 for Udp
    • toggles UPNP off # No need for Upnp
    • Don't save your IP in the netDB and publish to other I2P routers( https://trac.i2p2.de/ticket/1314#comment:3)
    • Sets the bandwidth that is max used by particiapting tunnels # We dont participate in Traffic so no need to share
    • Disable In-network Updates # We use apt for that
    • Disable time comparisation in I2P router
    • Set ntp timesource to localhost
  2. http://www.ugha.i2p.xyz/AdvancedConfigurationOptions , http://echelon.i2p.re/docs/advanced.options.txt and https://trac.i2p2.de/ticket/1677
  3. UDP is unsupported by Tor. Only outgoing TCP supported by Tor. If you know to use a hidden service, please add this information. Incoming connections are not possible, because Whonix-Workstation is firewalled.
  4. Clock Skew Issues: There should be none anymore since Whonix 9 so configuring time.sntpServerList=localhost is no longer necessary. Please report if they occur. (Old clock skew documentation moved to Deprecated#I2P.)
  5. As per https://labs.riseup.net/code/issues/7870#note-15 onionshare uses ports 17600 to 17659.
  6. Because torbrowser-launcher ships The Tor Projects SSL certificate

Random News:

We are looking for maintainers and developers.


Impressum | Datenschutz | Haftungsausschluss

https | (forcing) onion
Share: Twitter | Facebook | Google+
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! See Conditions for Contributions to Whonix, then Edit! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation. Whonix (g+) is a licensee of the Open Invention Network. Unless otherwise noted above, the content of this page is copyrighted and licensed under the same Free (as in speech) license as Whonix itself.