Upgrading Whonix 12 to Whonix 13
From Whonix
High Level Overview[edit]
1. Backup your data. (Ideally have a copy of your VM, so you can try again.)
2. Consider running the optional #Sanity Tests.
3. Upgrade Whonix-Workstation ™.
4. Power off Whonix-Workstation ™.
5. Upgrade Whonix-Gateway ™.
6. Restart Whonix-Gateway ™.
7. Restart Whonix-Workstation ™
Sanity Tests[edit]
These are optional, but recommended. If you want to do them, please press on expand on the right.
sudo dpkg --audit ; echo $?
Expected output.
0
sudo dpkg --configure -a ; echo $?
Expected output:
0
sudo apt-get update
sudo apt-get dist-upgrade
Test wise install python-qt4.
sudo apt-get install python-qt4 ; echo $?
## ... successful installation of python-qt4 ... 0
Upgrading[edit]
(Downloading a new Whonix-Gateway ™ / Whonix-Workstation ™ would be probably easier than applying the following instructions for upgrading, but this upgrade should be quite smooth.)
Backups are important as noted in above chapter #Before you start.
Consider doing the #Sanity Tests described above. They'll check if your system is affected by obvious grave issues, that you must fix before attempting to upgrade. If your package manager is broken, for example because you mixed packages from Debian stable with packages from Debian testing, then the upgrade may fail in the middle leaving your system in a difficult to resolve situation.
Consider keeping the full terminal (Konsole) log. Even if everything apparently worked, there might be issues after reboot. In case of a bug report in the forums you would be asked to share the upgrading log so the issue can be investigated.
If you are using Qubes R3.0 as your host operating system, you are advised to upgrade your VMs and dom0 to R3.1 before proceeding. Follow the Qubes R3.0 > R3.1 upgrade instructions on the Qubes website [archive].
sudo whonix_repository --enable --repository stable
You are late for upgrading Whonix ™ 12 to Whonix ™ 13. Therefore you need to upgrade Whonix ™ singing key.
Get Whonix ™ signing key.
The following command using gpg
with --recv-keys
is not recommended for security reasons and is often non-functional. [1] This is not a Whonix ™-specific issue. The OpenPGP public key should be downloaded from the web instead; see also Secure Downloads. This procedure is currently undocumented and can be resolved as per the Free Support Principle. Documentation contributions will be happily considered.
gpg --recv-keys "916B 8D99 C38E AF5E 8ADC 7A2A 8D66 066A 2EEA CCDA"
Verify Whonix ™ signing key.
Add to apt-key.
gpg --export "916B 8D99 C38E AF5E 8ADC 7A2A 8D66 066A 2EEA CCDA" | sudo apt-key add -
Become root.
sudo su
Do a usual upgrade of your system's packages from Debian.
Enable extensive debugging so reporting eventual bugs becomes easier.
export DEBDEBUG=1
Update the package lists.
apt-get update
Upgrade.
apt-get dist-upgrade
Update your package lists again. [2]
apt-get update
It is recommended to have the Whonix-Gateway ™ or Whonix-Workstation ™ meta package installed to make sure nothing is broken. (If you like to uninstall it later as per Whonix Debian Packages, you're free to do so. Still, it is recommended to re-install it before removal to make sure you're as close to official package selection as possible.)
If you are upgrading Qubes-Whonix ™, please press on expand on the right.
If you are upgrading Whonix-Gateway ™...
apt-get install qubes-whonix-gateway apt-get purge whonix-gateway
If you are upgrading Whonix-Workstation ™...
apt-get install qubes-whonix-workstation apt-get purge whonix-workstation
If you are upgrading Non-Qubes-Whonix ™, please press on expand on the right.
If you are upgrading Whonix-Gateway ™...
apt-get install non-qubes-whonix-gateway apt-get purge whonix-gateway
If you are upgrading Whonix-Workstation ™...
apt-get install non-qubes-whonix-workstation apt-get purge whonix-workstation
Purge packages which are deprecated in Whonix ™ and replaced by new functionality.
apt-get purge anon-gw-build-upgrade-tor anon-shared-build-apt-sources-tpo deb.torproject.org-keyring anon-shared-build-upgrade-torsocks timesync
Get rid of old packages.
apt-get autoremove
Delete old problematic files. [3]
rm -f "/etc/apparmor.d/usr.bin.timesync" unlink "/home/user/Desktop/xchat.desktop" unlink "/home/user/Desktop/anondist-torbrowser.desktop" unlink "/home/user/Desktop/timesync.desktop"
If you have been using the apparmor-profiles-extra package (you would know if you did), you should reinstall it.
sudo apt-get install --reinstall apparmor-profiles-extra
Remember to store the terminal (Konsole) log. (File → Save Output As)
Reboot required.
reboot
Qubes users may wish to re-add Tor Browser to Qubes start menu. This can be done the usual Qubes way.
Qubes start menu → domain: anon-whonix → add more shortcuts → click Tor Browser (AnonDist) → press '>' → OK
See also #Qubes specific.
Done.
Qubes specific[edit]
Optional.
VMs based upon whonix-ws TemplateVM will not inherit the default start menu unless you upgrade the following file. Either apply the following steps or manually add Tor Browser to any new TemplateBasedVM based on whonix-ws TemplateVM. [4]
In dom0. Open /var/lib/qubes/vm-templates/whonix-ws/whitelisted-appmenus.list with root rights.
Add. [5]
konsole.desktop dolphin.desktop nautilus.desktop whonixcheck.desktop whonix-irc-chat-support.desktop janondisttorbrowser.desktop anondist-torbrowser_update.desktop
Save.
Done.
Footnotes[edit]
- ↑ https://forums.whonix.org/t/gpg-recv-keys-fails-no-longer-use-keyservers-for-anything/5607 [archive]
- ↑ This is required because the repository uri of Whonix ™ repository has been upgraded to the new location by the whonix-legacy package.
- ↑ Delete apparmor profile. (timesync has been replaced by sdwdate-gui) Delete xchat shortcut. (Has been replaced with its successor hexchat.)
- ↑ This is a native Qube - not Whonix ™ - limitation that will not be fixed due to technical difficulties. During VM upgrades, file /var/lib/qubes/vm-templates/whonix-ws/whitelisted-appmenus.list will not be upgraded.
- ↑ https://github.com/adrelanos/qubes-template-whonix/blob/master/appmenus_wheezy_whonix-workstation/vm-whitelisted-appmenus.list [archive]
Whonix ™ is Supported by Evolution Host DDoS Protected VPS. Stay private and get your VPS with Bitcoin or Monero.
Search engines: YaCy | Qwant | ecosia | MetaGer | peekier | Whonix ™ Wiki
Love Whonix ™ and want to help spread the word? You can start by telling your friends or posting news about Whonix ™ on your website, blog or social media.
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to Conditions for Contributions to Whonix ™, then Edit! Edits are held for moderation. Policy of Whonix Website and Whonix Chat and Policy On Nonfreedom Software applies.
Copyright (C) 2012 - 2020 ENCRYPTED SUPPORT LP. Whonix ™ is a trademark. Whonix ™ is a licensee [archive] of the Open Invention Network [archive]. Unless otherwise noted, the content of this page is copyrighted and licensed under the same Freedom Software license as Whonix ™ itself. (Why?)
Whonix ™ is a derivative of and not affiliated with Debian [archive]. Debian is a registered trademark [archive] owned by Software in the Public Interest, Inc [archive].
Whonix ™ is produced independently from the Tor® [archive] anonymity software and carries no guarantee from The Tor Project [archive] about quality, suitability or anything else.
By using our website, you acknowledge that you have read, understood and agreed to our Privacy Policy, Cookie Policy, Terms of Service, and E-Sign Consent. Whonix ™ is provided by ENCRYPTED SUPPORT LP. See Imprint, Contact.