HowTo: Install the Stable Version of Qubes-Whonix ™ 15
From Whonix
< Qubes
Installation[edit]
Remove Old Versions[edit]
Note: If Qubes-Whonix ™ 14 is installed and you want to get Qubes-Whonix ™ 15, there is no need to uninstall Qubes-Whonix ™ before proceeding. [1] In other words, in that case the remaining text below in this very section (
Remove Old Versions
) can be ignored.
If you are already running any version of Qubes-Whonix ™, it must be uninstalled before a complete (re-)installation is performed. This applies to those who:
- Selected Qubes-Whonix ™ auto-configuration when Qubes was installed.
- Installed Qubes-Whonix ™ after installing the Qubes platform.
Before re-installation, back up any existing data stored in Whonix VMs.
In summary, three options are available (listed in order of preference):
Update dom0[edit]
Launch a dom0
terminal.
Click the Qubes App Launcher (blue/grey "Q")
→ Open the Terminal Emulator (Xfce Terminal)
Upgrade Qubes dom0
. This step is mandatory. [2]
sudo qubes-dom0-update
Adjust Whonix Version Number[edit]
This step can be skipped on Qubes 4.0.2
and above when installing Whonix ™ 15.
1. In dom0
open file whonix.jinja
with root rights. [3]
sudo nano /srv/formulas/base/virtual-machines-formula/qvm/whonix.jinja
2. Change 14
to 15
.
3. Save the file.
Please report if this step was necessary for you!
Download Whonix ™ Templates and Configure sys-whonix
and anon-whonix
[edit]
Before executing the call in this section, note it can take a long time to finish. Fast Internet connections take only a few minutes, while slow connections can take twenty minutes or more (it is far slower over Tor). No progress indicator is shown, so do not interrupt the salt process once it has started or this can lead to an unstable system [archive]. [4]
The following qubesctl
command [5] will:
- Download both Whonix-Gateway ™ and Whonix-Workstation ™ TemplateVMs.
- Configure
sys-whonix
andanon-whonix
safely. [6]
In dom0
, run.
sudo qubesctl state.sls qvm.anon-whonix
Refer to the footnotes for troubleshooting tips. [7] [8] [9]
Optional Steps[edit]
Whonix ™ DisposableVM Template VM[edit]
In Qubes R4 and above a whonix-ws-15-dvm
DisposableVM Template can optionally be set up as a base for Disposable VMs. [10]
In dom0
, run.
sudo qubesctl state.sls qvm.whonix-ws-dvm
Updates over Tor[edit]
TemplateVMs[edit]
To force all TemplateVM updates over Tor, [11] use salt in dom0
.
sudo qubesctl state.sls qvm.updates-via-whonix
To undo this setting, modify /etc/qubes-rpc/policy/qubes.UpdatesProxy
in dom0
. [12] See also How-to: Fix dom0 Qubes-Whonix ™ UpdatesProxy Settings.
dom0[edit]
To force dom0
updates over Tor, set Qubes' dom0
UpdateVM to sys-whonix
. [13]
Qube Manager
→ System
→ Global Settings
→ Dom0 UpdateVM:
sys-whonix
→ OK
To revert this change, set Qubes' dom0
UpdateVM to sys-firewall
or another preferred VM. [14]
Qubes Manager
→ System
→ Global Settings
→ Dom0 UpdateVM:
sys-firewall
→ OK
Enable AppArmor[edit]
If you are interested, click on Expand on the right.
The following steps should be completed in dom0
for both whonix-gw-15
and whonix-ws-15
TemplateVMs. [15] After these settings are applied to the Whonix ™ templates, the sys-whonix
(ProxyVM) and anon-whonix
(AppVM) will inherit the AppArmor kernel settings.
It is unnecessary to recreate the sys-whonix
and anon-whonix
TemplateBasedVMs to benefit from the new kernel parameters.[16] It is also important to verify AppArmor is active in the sys-whonix
and anon-whonix
VMs after making these changes.
Whonix-Gateway ™[edit]
1. Open a dom0
terminal.
Qubes App Launcher (blue/grey "Q")
→ System Tools
→ Xfce Terminal
2. List the current kernel parameters.
qvm-prefs -g whonix-gw-15 kernelopts
Qubes R4 and later releases will show.
nopat
3. Keep the existing kernel parameters and add apparmor=1 security=apparmor
.
For example.
qvm-prefs -s whonix-gw-15 kernelopts "nopat apparmor=1 security=apparmor"
qvm-prefs -s sys-whonix kernelopts "nopat apparmor=1 security=apparmor"
4. List the current kernel parameters again (hit the up arrow key twice; it is unnecessary to type the command again).
qvm-prefs -g whonix-gw-15 kernelopts
The output should show AppArmor is part of the new kernel parameters. For example.
nopat apparmor=1 security=apparmor
5. Start the sys-whonix
ProxyVM and confirm AppArmor is now active.
sudo aa-status --enabled ; echo $?
The output should show.
0
Whonix-Workstation ™[edit]
1. Open a dom0
terminal.
Qubes App Launcher (blue/grey "Q")
→ System Tools
→ Xfce Terminal
2. List the current kernel parameters.
qvm-prefs -g whonix-ws-15 kernelopts
Qubes R4 and later releases will show.
nopat
3. Keep the existing kernel parameters and add apparmor=1 security=apparmor
.
For example.
qvm-prefs -s whonix-ws-15 kernelopts "nopat apparmor=1 security=apparmor"
qvm-prefs -s anon-whonix kernelopts "nopat apparmor=1 security=apparmor"
4. List the current kernel parameters again (hit the up arrow key twice; it is unnecessary to type the command again).
qvm-prefs -g whonix-ws-15 kernelopts
The output should show AppArmor is part of the new kernel parameters. For example.
nopat apparmor=1 security=apparmor
5. Start the anon-whonix
AppVM and confirm AppArmor is now active.
sudo aa-status --enabled ; echo $?
The output should show.
0
Update and Launch Applications[edit]
Before starting applications in the Whonix-Workstation ™ AppVM, update both Whonix-Gateway ™ and Whonix-Workstation ™ TemplateVMs.
To launch an application like Tor Browser:
Qubes App Launcher (blue/grey "Q")
→ Domain: anon-whonix
→ Tor Browser (AnonDist)
Additional Information[edit]
Warnings[edit]
- If you do not know what metadata or a man-in-the-middle attack is.
- If you think nobody can eavesdrop on your communications because you are using Tor.
- If you have no idea how Whonix works.
Then read the Design and Goals, Whonix ™ and Tor Limitations and Tips on Remaining Anonymous pages to decide whether Whonix is the right tool for you based on its limitations.
It is recommended to refer to these additional references:
- Known Issues
- Read and apply the Post Installation Security Advice.
- Follow Whonix ™ Developments
Reinstallation Errors[edit]
In Qubes R4.0, after uninstalling old Whonix ™ templates and attempting reinstallation via:
[user@dom0 ~]$ sudo qubesctl state.sls qvm.anon-whonix
The result is.
'state.sls' is not available. DOM0 configuration failed, not continuing
The solution is to restart Qubes after uninstalling old Whonix ™ versions.
Footnotes[edit]
- ↑
This is because the name of the TemplateVMs changed from:
whonix-gw-14
towhonix-gw-15
whonix-ws-14
towhonix-ws-15
- ↑
- This is required to make sure a recent version of Qubes repository definition files, Qubes salt, qubes-core-admin-addon-whonix [archive] as well as qubes-mgmt-salt-dom0-virtual-machines [archive] are installed.
- ↑
- ↑ add salt download progress indicator [archive]
- ↑
- ↑
- ↑
If an error message appears stating that
qubesctl
does not exist or the command is not recognized, then it is necessary to enable the testing repository and installsalt
.sudo qubes-dom0-update --best --allowerasing --enablerepo=qubes-dom0-current-testing qubes-mgmt-salt-dom0-virtual-machines
Please report if this step was necessary for you!
- ↑
Sometimes the Qubes Community Templates repository must also be enabled by editing Qubes'
dom0
repository definition files.In
dom0
.1. Open file
/etc/yum.repos.d/qubes-templates.repo
with root rights.sudo nano /etc/yum.repos.d/qubes-templates.repo
2. In section
[qubes-templates-community]
setenabled = 1
3. Save.
Please report if step this was necessary for you!
- ↑
If
qubesctl
still does not work, try shutting down Qubes OS and rebooting the machine. Please report if this step was necessary for you! - ↑ https://github.com/QubesOS/qubes-mgmt-salt-dom0-virtual-machines/blob/master/qvm/whonix-ws-15-dvm.sls [archive]
- ↑
- In Qubes-R4 and above, RPC/qrexec UpdatesProxy is used to update TemplateVMs
- doc/software-update-vm/#technical-details-r40
- salt [archive]
- https://github.com/QubesOS/qubes-mgmt-salt-dom0-virtual-machines/blob/master/qvm/updates-via-whonix.sls [archive]
- ↑ https://groups.google.com/forum/?_escaped_fragment_=topic/qubes-users/_jI2uWPPMMA#!topic/qubes-users/_jI2uWPPMMA [archive]
- ↑
Or manually set the torified UpdateVM in
dom0
terminal.qubes-prefs updatevm sys-whonix
- ↑
To revert this change in
dom0
terminal, run.qubes-prefs updatevm sys-firewall
- ↑
While Debian has enabled AppArmor by default since the
buster
release, Fedora has not. This matters since Qubes, which is Fedora based, by default uses thedom0
(not VM) kernel. Therefore this is still required even though Whonix ™ is based on a recent enough Debian version. - ↑ Since Qubes R3.0, TemplateBasedVMs inherit the kernelopts setting of their TemplateVM [archive].
Whonix ™ is Supported by Evolution Host DDoS Protected VPS. Stay private and get your VPS with Bitcoin or Monero.
Search engines: YaCy | Qwant | ecosia | MetaGer | peekier | Whonix ™ Wiki
Love Whonix ™ and want to help spread the word? You can start by telling your friends or posting news about Whonix ™ on your website, blog or social media.
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to Conditions for Contributions to Whonix ™, then Edit! Edits are held for moderation. Policy of Whonix Website and Whonix Chat and Policy On Nonfreedom Software applies.
Copyright (C) 2012 - 2020 ENCRYPTED SUPPORT LP. Whonix ™ is a trademark. Whonix ™ is a licensee [archive] of the Open Invention Network [archive]. Unless otherwise noted, the content of this page is copyrighted and licensed under the same Freedom Software license as Whonix ™ itself. (Why?)
Whonix ™ is a derivative of and not affiliated with Debian [archive]. Debian is a registered trademark [archive] owned by Software in the Public Interest, Inc [archive].
Whonix ™ is produced independently from the Tor® [archive] anonymity software and carries no guarantee from The Tor Project [archive] about quality, suitability or anything else.
By using our website, you acknowledge that you have read, understood and agreed to our Privacy Policy, Cookie Policy, Terms of Service, and E-Sign Consent. Whonix ™ is provided by ENCRYPTED SUPPORT LP. See Imprint, Contact.