This page needs a revision.

It should target testers. Behavior / stuff they could do to check if Whonix is working fine.

Advanced users / developers and testers only[edit]

On Whonix-Gateway and Whonix-Workstation[edit]


Check for systemd ordering cycles. There should be none.

sudo journalctl | cat | grep -i "ordering cycle"

Check for failed systemd units. (Whonix 14 whonixcheck will have a test for this.)

sudo systemctl --failed list-units


Check locale.


Check if there are any DENIED messages from AppArmor inside /var/log/syslog.

Whonix 13:

cat /var/log/syslog | grep DENIED

Whonix 14:

sudo cat /var/log/audit/audit.log | grep DENIED

Install dpkg-dev, which is required for dpkg-vendor.

sudo apt-get install --no-install-recommends dpkg-dev
Run dpkg-vendor --query vendor.

dpkg-vendor --query vendor

The output must be "Whonix".

Check apt config and see if periodic updates are disabled.

apt-config dump

Install test wise new kernel.


Remove test wise linux-image-486 kernel.

sudo apt-get remove linux-image-486

Check content of /etc/network/interfaces.

cat /etc/network/interfaces

Check content of /etc/resolv.conf.

cat /etc/resolv.conf
Check /etc/apt/sources.list.

cat /etc/apt/sources.list

Check iptables.

sudo iptables --list


sudo iptables-save-deterministic

Reboot from terminal while X is running.

Switch to terminal.


sudo reboot

Should not show any errors such as "failed to kill service".


Check if aptitude is functional.

sudo aptitude update



Test re-installation of x11-common.

sudo apt-get install --reinstall x11-common


sudo service kdm stop

sudo service kdm start

Test on Whonix-Gateway[edit]

Check Tor version.

sudo tor --version

Check obfsproxy version. Must include obfs3.

obfsproxy -h

Check Tor logs.

less /var/log/tor/log

Check Tor warnings.

grep warn /var/log/tor/log

The message [warn] Socks version 71 not recognized. (Tor is not an http proxy.) can be ignored.

Check clock skew.

grep clock /var/log/tor/log

Test if arm is fully functional.


Test if arm's new identity function is working.

After logging in you should see Whonix help/welcome/disclaimer message.

Test connecting to an obfsproxy bridge.

Check /var/log/syslog for AppArmor error messages.

grep DENIED /var/log/syslog

Test Whonix-Workstation[edit]


Ping the Whonix-Gateway. Will NOT work.

# You will not be able to ping the Whonix-Gateway,
# because ICMP is blocked by the firewall.
# If you want to test it, you have to adjust the firewall,
# or to deactivate the firewall while testing.


Power off Whonix-Gateway. Try to ping outside or to use the browser in Whonix-Workstation. Obviously, should NOT work.


Power on Whonix-Gateway again. Visit with Tor Browser. You should see a “Congratulations”.


Use a Tor Browser to visit a .onion address (Try the onion service)


Test Tor Button's New Identity Feature.


Note: Ping commands should NOT work for external addresses from your Whonix-Workstation, ICMP traffic[4] is not proxied, and filtered by Whonix's Firewall (/usr/bin/whonix_firewall), because Tor does not support UDP.


dig must only return a single IP, compare with the output on Whonix-Gateway or Host.


Test gpg. Example.

gpg --keyserver --recv A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89

Test curl uwt wrapper.

curl http://idnxcnkne4qt76tg.onion

whonixcheck --leak-tests


Setup an onion service on Whonix-Gateway and test if it works. You can access your own test onion service using Tor Browser.


See if whonixcheck gets autostarted.


Test HexChat, connect to a an SSL protected IRC server.


test HexChat, connect to a hidden IRC server.


Install lighttpd.

sudo apt-get install lighttpd

Restart lighttpd.

sudo service lighttpd restart

Try to download the local index.html.



cat index.html

Let's check if git is working. A good testing target would be a hidden git server. Therefore, check if Gittor is online by visiting its list of public Gittor repositories. Test it.

git clone http://wzrtr6gpencksu3d.onion/gitlab/w00t/pgp-auth.git

Check if regular git servers are reachable as well.

git clone

Default Browser[edit]

Quick Launcher[edit]

Check if the Tor Browser quick launcher (fav icon) next to the start menu button is visible and startable.

Text Links[edit]

1. Open Konsole.

2. Run the following command.


3. Right click on the echoed and choose open link.

4. Check if it opens asks for confirmation to open that file in Tor Browser. Check if nothing happens, when pressing No (which should be the default!) and check if it opens a new Tor Browser window when pressing Yes.

File Links[edit]

1. Create a file ~/test.html with the following content.


2. Open Dolphin (default file manager) and double click on that file.

3. Check if it opens asks for confirmation to open that file in Tor Browser.


1. Open Konsole.

2. Run the following command.


3. Check if it opens asks for confirmation to open that file in Tor Browser.

4. Check the same for.


5. Check the same for.


6. Check the same for.



Remove open-link-confirmation.

sudo apt-get remove open-link-confirmation

And repeat these tests.


Leak Tests[edit]

See Dev/Leak Tests.


  1. timedatectl
          Local time: Sat 2015-05-16 02:27:46 UTC
      Universal time: Sat 2015-05-16 02:27:46 UTC
            RTC time: Sat 2015-05-16 02:27:46
           Time zone: Etc/UTC (UTC, +0000)
         NTP enabled: no
    NTP synchronized: no
     RTC in local TZ: no
          DST active: n/a
  2. Not so important since it would probably be shown during "sudo systemctl list-units --failed". Check if /var/run/bootclockrandomization/success exists.
    ls -la /var/run/bootclockrandomization/success
    Check boot clock randomization log.
    cat /var/log/bootclockrandomization.log
    sudo service bootclockrandomization status
    echo $?
    Check if /var/run/timesanitycheck/success exists.
    ls -la /var/run/timesanitycheck/success
    Check log of time sanity check.
    cat /var/log/timesanitycheck.log
    Check status of time sanity check.
    sudo service timesanitycheck status
    echo $?
  3. Not so important. Probably sdwdate-gui would show any issues. Check if /var/run/sdwdate/success exists
    ls -la /var/run/sdwdate/success
    Check log of sdwdate.
    cat /var/log/sdwdate.log
    Check status of sdwdate.
    sudo service sdwdate status
    echo $?
  5. Obsolete because of whonixcheck --leak-tests. Test curl through TransPort.
    UWT_DEV_PASSTHROUGH=1 curl http://idnxcnkne4qt76tg.onion

Random News:

Want to make Whonix safer and more usable? We're looking for helping hands. Check out the Open Issues and development forum.

https | (forcing) onion

Share: Twitter | Facebook

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! See Conditions for Contributions to Whonix, then Edit! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation.

Whonix is a licensee of the Open Invention Network. Unless otherwise noted, the content of this page is copyrighted and licensed under the same Libre Software license as Whonix itself. (Why?)