Other Gateways

From Whonix

Ambox warning pn.svg.png Documentation for this is incomplete. Contributions are happily considered!

Potential Issues When using A Custom Gateway[edit]

TODO: document

  • Gateway IP Change required? See chapter below.
  • Tor Control Protocol Access. See chapter below.
  • Custom gateway might not provide all the Tor SocksPorts that Whonix-Gateway ™ provides. Fixable by adjusting Tor configuration of the custom gateway.
  • Custom gateway might not provide transparent proxying. This might be intended if the user prefers an IsolatingProxy [archive] setup.

Gateway IP Change[edit]

grep the Whonix ™ source code for the following search term.


For example. (Creation of the mygrep script is documented in above link.)

mygrep -r "IP HARDCODED"

Perhaps IP change can be avoided with some iptables trick?

Forum discussion: [archive]

Tor Control Protocol Access[edit]

Two options. Either:

  • Allow filtered Tor control protocol access through onion-grater.
  • unfiltered Tor control protocol access. A compromised workstation with unfiltered Tor control protocol access can acquire the real external cleranet IP. [1]
  • No Tor control protocol access. This would break some functionality.

Which applications require Tor control protocol access?

Filtered Access using onion-grater[edit]


Unfiltered Access not using onion-grater[edit]

This setting comes from Debian system Tor upstream package default file /usr/share/tor/tor-service-defaults-torrc.

CookieAuthFile /run/tor/control.authcookie

The file location for this file is non-ideal since it will change at every boot. By re-configuring Tor on the other gateway to use a different file location the contents of this file might be constant. Untested.

On the Whonix-Workstation ™ package anon-ws-disable-stacked-tor script /usr/lib/anon-ws-disable-stacked-tor/state-files copies at boot /usr/share/anon-ws-disable-stacked-tor/control.authcookie to the right places.

By copying the control.authcookie file from the gateway to Whonix-Workstation ™ /usr/share/anon-ws-disable-stacked-tor/control.authcookie one might be able to have Tor cookie authentication. Contents of /usr/share/anon-ws-disable-stacked-tor/control.authcookie will be overwritten when package anon-ws-disable-stacked-tor is upgraded.

Therefore this exercise might be a bit pointless. A better solution might be to use Tor Browser control protocol authentication using a Tor control password rather than Tor control auth cookie.

Open file /etc/X11/Xsession.d/50user in an editor with root rights.

(Qubes-Whonix ™: In TemplateVM)

This box uses sudoedit for better security [archive]. This is an example and other tools could also achieve the same goal. If this example does not work for you or if you are not using Whonix, please refer to this link.

sudoedit /etc/X11/Xsession.d/50user

Paste the following contents.

## see also /usr/lib/anon-ws-disable-stacked-tor/

## See workstation file ~/.tb/tor-browser/Browser/start-tor-browser
## or Tor Browser file Browser/start-tor-browser script for comment
## why quoting looks weird.
export TOR_CONTROL_PASSWD='"password"'

## Overwrite what /usr/lib/anon-ws-disable-stacked-tor/ /
## /etc/X11/Xsession.d/20torbrowser is doing.
export TOR_CONTROL_IPC_PATH="/run/anon-ws-disable-stacked-tor/"


This would have to be combined with Tor setting HashedControlPassword on the other gateway. Untested.


text=Jobs in USA
Jobs in USA

Search engines: YaCy | Qwant | ecosia | MetaGer | peekier | Whonix ™ Wiki

Follow: 1024px-Telegram 2019 Logo.svg.png Iconfinder Apple Mail 2697658.png Twitter.png Facebook.png Rss.png Reddit.jpg 200px-Mastodon Logotype (Simple).svg.png

Support: 1024px-Telegram 2019 Logo.svg.png Discourse logo.png Matrix logo.svg.png

Donate: Donate Bank Wire Paypal Bitcoin accepted here Monero accepted here Contriute

Whonix donate bitcoin.png Monero donate Whonix.png United Federation of Planets 1000px.png

Twitter-share-button.png Facebook-share-button.png Telegram-share.png link=mailto:?subject=Other Gateways&body= link= Gateways link= Gateways link= Gateways%20 Gateways

Do you wonder why Whonix ™ will always be free? Check out Why Whonix ™ is Freedom Software.

https link onion link

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to Conditions for Contributions to Whonix ™, then Edit! Edits are held for moderation. Policy of Whonix Website and Whonix Chat and Policy On Nonfreedom Software applies.

Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP. Whonix ™ is a trademark. Whonix ™ is a licensee [archive] of the Open Invention Network [archive]. Unless otherwise noted, the content of this page is copyrighted and licensed under the same Freedom Software license as Whonix ™ itself. (Why?)

The personal opinions of moderators or contributors to the Whonix ™ project do not represent the project as a whole.

Whonix ™ is a derivative of and not affiliated with Debian [archive]. Debian is a registered trademark [archive] owned by Software in the Public Interest, Inc [archive].

Whonix ™ is produced independently from the Tor® [archive] anonymity software and carries no guarantee from The Tor Project [archive] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our Privacy Policy, Cookie Policy, Terms of Service, and E-Sign Consent. Whonix ™ is provided by ENCRYPTED SUPPORT LP. See Imprint, Contact.

By using our website, you acknowledge that you have read, understood and agreed to our Privacy Policy, Cookie Policy, Terms of Service, and E-Sign Consent.