From Whonix


Info Advanced users, developers and willing testers only.

Whonix requires a critical mass of users to properly test planned updates by enabling the stable-proposed-updates or testers repository. [1] Otherwise, bugs might go undiscovered and be inadvertently introduced into the stable repository.

To ensure a stable Whonix system is available at all times, willing testers should:

Then perform normal user activities.

Please only report bugs after first searching relevant Whonix forums and developer portals for the problem.

Whonix-Gateway ™ Tests[edit]

  1. After logging in, the Whonix ™ Setup Wizard / Anon Connection Wizard should appear.
  2. Check the Tor version.
  3. Check Tor config.
  4. Check Tor warnings. Some messages can be safely ignored.
    grep -i warn /var/run/tor/log
  5. Check Tor errors.
    grep -i error /var/run/tor/log
  6. Check for clock skew.
    grep -i clock /var/run/tor/log
  7. Test if arm is fully functional.
  8. Test if the New Identity function is working.
    tor-ctrl -a /var/run/tor/control.authcookie -c "signal newnym"
  9. Test obfsproxy bridge connectivity is functional.

Whonix-Workstation ™ Tests[edit]

Basic Tests[edit]

  1. Power off Whonix-Gateway ™. Try to ping outside or to use the browser in Whonix-Workstation ™. Obviously this should not work.
  2. Power on Whonix-Gateway ™ again. Visit [archive] with Tor Browser. You should see a “Congratulations”.
  3. Ping the Whonix-Gateway ™; this will not work. [2]
  4. Note: Ping commands should NOT work for external addresses from your Whonix-Workstation ™; ICMP traffic [3] is not proxied, and filtered by Whonix ™ Firewall (/usr/bin/whonix_firewall) because Tor does not support UDP.
  5. Use Tor Browser to visit an onion address - try the onion service [archive].
  6. Test Tor Button's New Identity Feature.
  7. dig must only return a single IP; compare that with the output on Whonix-Gateway ™ or Host.
  8. See if whonixcheck gets autostarted.
  9. Setup an Onion Service.
  10. Test the onion service by connecting to its address with Tor Browser.
  11. Test HexChat and connect to a an SSL protected IRC server.
  12. Test HexChat and connect to an onion IRC server.
  13. Run whonixcheck leak tests.
    whonixcheck --leak-tests
  14. Test gpg. Example.
    gpg --keyserver --recv A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89
  15. Test curl uwt wrapper.
    curl http://expyuzz4wqqyqhjn.onion
  16. Install lighttpd.
    sudo apt-get install lighttpd
  17. Restart lighttpd.
    sudo service lighttpd restart
  18. Try to download the local index.html.
  19. Check.
    cat index.html
  20. Install git.
    sudo apt-get install git
  21. Check if regular git servers are reachable.
    git clone
  22. Check if Tor Project git onion service [archive] is online.
  23. If yes, try to clone its onion Tor git repository.
    git clone http://dccbbv6cooddgcrq.onion/tor.git

Default Browser[edit]

Quick Launcher[edit]

Check if the Tor Browser quick launcher (fav icon) next to the start menu button is visible and startable.

Text Links[edit]

1. Open a terminal.

2. Run the following command.


3. Right-click on the echoed [archive] and choose open link.

4. Check it is fully functional.

It should open and ask for confirmation to open that file in Tor Browser. Check that nothing happens when pressing No (which should be the default!) and conversely a new Tor Browser window is opened when pressing Yes.

File Links[edit]

1. Create a file ~/test.html with the following content.


2. Open Thunar (default file manager) and double-click on that file.

3. Check if it opens and asks for confirmation to open that file in Tor Browser.

Terminal Tests[edit]

1. Open a terminal.

2. Run the following command.


3. Check if it asks for confirmation to open that file in Tor Browser.

4. Check the same for.


5. Check the same for.


6. Check the same for.


7. Next, remove open-link-confirmation.

sudo apt-get purge open-link-confirmation

And repeat the tests above.


Test that all the following applications are fully functional:

  1. Metadata
  2. Mixmaster
  3. Tor Browser
  4. Manually Downloading Tor Browser
  5. Check if Tor Browser runs in Whonix ™ out of the box -- without use of the torbrowser script -- by running /home/user/.tb/tor-browser/start-tor-browser.

Leak Tests[edit]

See Dev/Leak Tests.

Whonix-Workstation ™ and Whonix-Gateway ™[edit]


1. Check locale.


2. Check apt config and see if periodic updates are disabled.

apt-config dump

3. Install a new kernel [archive] for testing purposes. [4]

apt-cache search linux-image

sudo apt-get install linux-image-flavour

4. Check the content of /etc/network/interfaces

cat /etc/network/interfaces

5. Check the content of /etc/resolv.conf

cat /etc/resolv.conf

6. Check /etc/apt/sources.list

cat /etc/apt/sources.list

7. Check iptables.

sudo iptables-save-deterministic

8. Reboot from terminal while X is running.

Switch to terminal.


sudo reboot

No errors should appear like "failed to kill service".

Extra Tests[edit]

1. Check if aptitude is functional.

sudo aptitude update

See the footnotes if additional manual tests are preferred. [5] [6]

2. Test the re-installation of x11-common.

sudo apt-get install --reinstall x11-common

Display Manager[edit]

Non-Qubes-Whonix ™ only.

Check lightdm stops and restarts correctly.

sudo service lightdm stop

sudo service lightdm start


  1. The developers repository is only recommended for experts or those in touch with Whonix developers.
  2. You will not be able to ping the Whonix-Gateway ™ because ICMP is blocked by the firewall. If you want to test it, you have to adjust the firewall or deactivate it while testing.
  3. [archive]
  4. The latest Debian kernel versions can be found here [archive].
  5. These checks are not as important because relevant messages would probably be shown during sudo systemctl list-units --failed. Check if /var/run/bootclockrandomization/success exists.
    ls -la /var/run/bootclockrandomization/success
    Check the boot clock randomization log.
    cat /var/log/bootclockrandomization.log
    sudo service bootclockrandomization status
    echo $?
    Check if /var/run/timesanitycheck/success exists.
    ls -la /var/run/timesanitycheck/success
    Inspect the time sanity check log.
    cat /var/log/timesanitycheck.log
    Confirm the time sanity check status.
    sudo service timesanitycheck status
    echo $?
  6. These checks are not as important because sdwdate-gui would likely identify any issues beforehand. Check if /var/run/sdwdate/success exists.
    ls -la /var/run/sdwdate/success
    Check the sdwdate log.
    cat /var/log/sdwdate.log
    Check the sdwdate status.
    sudo service sdwdate status
    echo $?

Follow: Twitter.png Facebook.png 1280px-Gab text logo.svg.png Rss.png Matrix logo.svg.png 1024px-Telegram 2019 Logo.svg.png Discourse logo.svg

Donate: Donate Bank Wire Paypal Bitcoin accepted here Monero accepted here Contriute

Whonix donate bitcoin.png Monero donate whonix.png

Share: Twitter | Facebook

Join us in testing our new AppArmor profiles [archive] for improved security! (forum discussion [archive])

https link onion link

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to Conditions for Contributions to Whonix ™, then Edit! Edits are held for moderation.

Copyright (C) 2012 - 2019 ENCRYPTED SUPPORT LP. Whonix ™ is a trademark. Whonix ™ is a licensee [archive] of the Open Invention Network [archive]. Unless otherwise noted, the content of this page is copyrighted and licensed under the same Freedom Software license as Whonix ™ itself. (Why?)

Whonix ™ is a derivative of and not affiliated with Debian [archive]. Debian is a registered trademark [archive] owned by Software in the Public Interest, Inc [archive].

Whonix ™ is produced independently from the Tor® [archive] anonymity software and carries no guarantee from The Tor Project [archive] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our Privacy Policy, Cookie Policy, Terms of Service, and E-Sign Consent. Whonix ™ is provided by ENCRYPTED SUPPORT LP. See Imprint.