Whonix ™ for VirtualBox with XFCE
From Whonix
< VirtualBox Testers Only Version
Warning: This is the testers-only version of Whonix ™ for VirtualBox. For the stable version, go to VirtualBox.
1. Download Whonix ™ XFCE for Windows
, MacOS
and Linux
FREE
By downloading, you acknowledge that you have read, understood and agreed to our Terms of Service and License Agreement.
Version: 15.0.1.5.1
Type | Connection | Link | Download Security without Verification |
Download Security with Verification |
![]() |
![]() |
Medium | High [1] | |
![]() |
![]() |
Medium | High | |
![]() |
![]() |
- | - | |
![]() |
![]() |
- | - | |
![]() |
Verify images using this Signing Key |
Verify the Whonix ™ Images Whonix ™ virtual machine images are cryptographically signed by Whonix developer Patrick Schleizer using OpenPGP. [2]
Digital signatures can increase security but this requires knowledge. Learn more about digital software signature verification.
If you know how to use an OpenPGP key, download the Whonix ™ Signing Key and the Whonix ™ signatures straight away.
Otherwise, use the following instructions:
2. Install VirtualBox
Recommended VirtualBox version: 6.1.14
- Windows
, Mac
: Download VirtualBox
[archive] and install.
- Linux
: please press expand on the right side.
Recommendations for Linux users:
- The recommended host Linux kernel version is the same version that Debian
buster
is using, see linux-image-amd64 [archive]. - Linux users only: use the recommended Linux distribution as a host for Whonix ™ VirtualBox is Debian Linux [archive] version
buster
.
Hosts using a non-Debian OS:
Install VirtualBox as per the normal mechanism for your Linux distribution. Whonix ™ has has been tested with, expects VirtualBox version 6.1.14
For example VirtualBox version 5.2.18
has been reported to not be compatible.
Ubuntu hosts:
Ubuntu bionic
(18.04LTS
) APT repository ships only VirtualBox version 5.2.18
and Whonix ™ will probably not work.
You might want to release-upgrade to Ubuntu focal
(20.04LTS
) which provides VirtualBox version 6.1.6
.
Debian hosts:
These instructions are for Debian buster
, which is recommended. Other Debian releases might work, but this is untested. In that case, replace buster
with the actual codename your release.
Note: this applies to Whonix ™ 15
. Later Whonix ™ versions may use a codename different to buster
.
To acquire the Recommended VirtualBox version tested with Whonix ™, package virtualbox-6.1
should be installed from Whonix ™ repository. [3]
1. On the host.
Open a terminal.
2. Add Whonix ™ repository.
1. Download the Signing Key.
wget https://www.whonix.org/patrick.asc
2. Optional: Check the Signing Key for better security.
3. Add Whonix's signing key.
sudo apt-key --keyring /etc/apt/trusted.gpg.d/whonix.gpg add ~/patrick.asc
4. Add Whonix's APT repository.
echo "deb https://deb.whonix.org buster main contrib non-free" | sudo tee /etc/apt/sources.list.d/whonix.list
3. Update the package lists.
sudo apt-get update
4. Install VirtualBox and Linux kernel headers.
sudo apt-get install virtualbox-6.1 linux-headers-$(dpkg --print-architecture)
5. Add your current user to group vboxusers
. [4]
sudo adduser $(whoami) vboxusers
The procedure is now complete.
3. Import Whonix ™ into VirtualBox
For Whonix ™ VirtualBox import instructions, please press on expand on the right.
Click on File then choose Import Appliance...
Navigate and select Whonix ™ image and press next
Do NOT change anything! Just click on Import
Wait until Whonix ™ .ova
has been imported
Now start both Whonix-Gateway ™ and Whonix-Workstation ™
Miscellaneous
There are also Video Tutorials.
If you still need help, please check the Support page.
For command line import instructions, see footnote. [5]
4. Start Whonix ™
Starting Whonix ™ is simple.
Start VirtualBox
→ Double-click the Whonix-Gateway ™ and Whonix-Workstation ™
.
First time user?
- If you do not know what metadata or a man-in-the-middle attack is.
- If you think nobody can eavesdrop on your communications because you are using Tor.
- If you have no idea how Whonix works.
Then read the Design and Goals, Whonix ™ and Tor Limitations and Tips on Remaining Anonymous pages to decide whether Whonix is the right tool for you based on its limitations.
See Also
- Documentation
- Stay Tuned
- In case of issues, see VirtualBox Troubleshooting.
For additional VirtualBox guides and information, please press on expand on the right.
Footnotes and Experimental Spectre / Meltdown Defenses
Please press on expand on the right.
VirtualBox Stable Version | VirtualBox Testers Only Version
Testers only! For more information please press on expand on the right.
These experimental [archive] Spectre/Meltdown defenses are related to issues outlined in Firmware Security and Updates. Due to the huge performance penalty and unclear security benefits of applying these changes, it may not be worth the effort. The reason is VirtualBox is still likely vulnerable, even after:
- A host microcode upgrade.
- A host kernel upgrade.
- A VM kernel upgrade.
- A "not vulnerable" result from spectre-meltdown-checker run on the host.
- Installation of the latest VirtualBox version. [6]
- All Spectre/Meltdown-related VirtualBox settings are tuned for better security as documented below.
To learn more, see: VirtualBox 5.2.18 vulnerable to spectre/meltdown despite microcode being installed [archive] and the associated VirtualBox forum discussion [archive]. [7] Users must patiently wait for VirtualBox developers to fix this bug.
On the host. [8] [9] [10] [11] [12] [13] [14]
VBoxManage modifyvm "Whonix-Gateway" --ibpb-on-vm-entry o VBoxManage modifyvm "Whonix-Gateway" --ibpb-on-vm-exit on VBoxManage modifyvm "Whonix-Gateway" --l1d-flush-on-vm-entry on VBoxManage modifyvm "Whonix-Gateway" --l1d-flush-on-sched on VBoxManage modifyvm "Whonix-Gateway" --spec-ctrl on VBoxManage modifyvm "Whonix-Gateway" --nestedpaging off VBoxManage modifyvm "Whonix-Gateway" --mds-clear-on-vm-entry on VBoxManage modifyvm "Whonix-Gateway" --mds-clear-on-sched on
VBoxManage modifyvm "Whonix-Workstation" --ibpb-on-vm-entry on VBoxManage modifyvm "Whonix-Workstation" --ibpb-on-vm-exit on VBoxManage modifyvm "Whonix-Workstation" --l1d-flush-on-vm-entry on VBoxManage modifyvm "Whonix-Workstation" --l1d-flush-on-sched on VBoxManage modifyvm "Whonix-Workstation" --spec-ctrl on VBoxManage modifyvm "Whonix-Workstation" --nestedpaging off VBoxManage modifyvm "Whonix-Workstation" --mds-clear-on-vm-entry on VBoxManage modifyvm "Whonix-Workstation" --mds-clear-on-sched on
These steps must be repeated for every Whonix or non-Whonix VirtualBox VM, including multiple and custom VMs.
The above instructions only apply to the default VM names Whonix-Gateway ™ and Whonix-Workstation ™. Therefore, if Multiple Whonix-Workstation ™ and/or Multiple Whonix-Gateway ™ are configured, then repeat these instructions using the relevant name/s.
Footnotes[edit]
- ↑ It does not matter if the bulk download is done over an insecure channel if software signature verification is used at the end.
- ↑ OpenPGP is a standard for data encryption that provides cryptographic privacy and authentication through the use of keys owned by its users.
- ↑
This is non-ideal but required since VirtualBox in unavailable in official Debian
buster
repository and difficult to install due to VirtualBox Installation Challenges. Alternatively you could install VirtualBox from the Oracle (virtualbox.org) Repository, but this comes with different risks. VirtualBox might be updated by VirtualBox developers before being tested with Whonix ™ which could then lead to issues. (Described in footnote here.) - ↑
Optional: See: https://www.virtualbox.org/manual/ch02.html#install-linux-vboxusers [archive]
Also spams
~/.config/VirtualBox/VBoxSVC.log
log if not done. - ↑
On the Linux platform.
1. Read License Agreement:vboxmanage import Whonix-XFCE-15.0.1.5.4.ova --vsys 0 --eula show --vsys 1 --eula show
2. Import Whonix-Gateway ™ and Whonix-Workstation ™.
vboxmanage import Whonix-XFCE-15.0.1.5.4.ova --vsys 0 --eula accept --vsys 1 --eula accept
- ↑
VirtualBox version
5.2.18
or above is required since only that version comes with Spectre/Meltdown defenses. See https://forums.whonix.org/t/whonix-vulerable-due-to-missing-processor-microcode-packages/5739/22 [archive]. - ↑ Also see the following Whonix forum discussion: Whonix vulerable due to missing processor microcode packages? spectre / meltdown / retpoline / L1 Terminal Fault (L1TF) [archive]
- ↑
--ibpb-on-vm-[enter|exit] on|off: Enables flushing of the indirect branch prediction buffers on every VM enter or exit respectively. This could be enabled by users overly worried about possible spectre attacks by the VM. Please note that these options may have sever impact on performance.
https://www.virtualbox.org/manual/ch08.html [archive]There is a mistake in the VirtualBox manual stating
enter
which does not work. It is actuallyentry
. - ↑
https://www.virtualbox.org/manual/ch08.html [archive]
--l1d-flush-on-vm-enter on|off: Enables flushing of the level 1 data cache on VM enter. See Section 13.4.1, “CVE-2018-3646”.
- ↑
--l1d-flush-on-sched on|off: Enables flushing of the level 1 data cache on scheduling EMT for guest execution. See Section 13.4.1, “CVE-2018-3646 [archive]”.
https://www.virtualbox.org/manual/ch08.html [archive] - ↑
https://www.virtualbox.org/manual/ch13.html#sec-rec-cve-2018-3646 [archive]
For users not concerned by this security issue, the default mitigation can be disabled using
VBoxManage modifyvm name --l1d-flush-on-sched off
Since we want to enable the security feature we set
--l1d-flush-on-sched on
. - ↑
--spec-ctrl on|off: This setting enables/disables exposing speculation control interfaces to the guest, provided they are available on the host. Depending on the host CPU and workload, enabling speculation control may significantly reduce performance.
https://www.virtualbox.org/manual/ch08.html [archive] - ↑
According to this VirtualBox ticket [archive]
--spec-ctrl
should be set toon
. - ↑
--nestedpaging on|off: If hardware virtualization is enabled, this additional setting enables or disables the use of the nested paging feature in the processor of your host system; see Section 10.7, “Nested paging and VPIDs” and Section 13.4.1, “CVE-2018-3646”.
Whonix ™ is Supported by Evolution Host DDoS Protected VPS. Stay private and get your VPS with Bitcoin or Monero.
Search engines: YaCy | Qwant | ecosia | MetaGer | peekier | Whonix ™ Wiki
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to Conditions for Contributions to Whonix ™, then Edit! Edits are held for moderation. Policy of Whonix Website and Whonix Chat and Policy On Nonfreedom Software applies.
Copyright (C) 2012 - 2020 ENCRYPTED SUPPORT LP. Whonix ™ is a trademark. Whonix ™ is a licensee [archive] of the Open Invention Network [archive]. Unless otherwise noted, the content of this page is copyrighted and licensed under the same Freedom Software license as Whonix ™ itself. (Why?)
Whonix ™ is a derivative of and not affiliated with Debian [archive]. Debian is a registered trademark [archive] owned by Software in the Public Interest, Inc [archive].
Whonix ™ is produced independently from the Tor® [archive] anonymity software and carries no guarantee from The Tor Project [archive] about quality, suitability or anything else.
By using our website, you acknowledge that you have read, understood and agreed to our Privacy Policy, Cookie Policy, Terms of Service, and E-Sign Consent. Whonix ™ is provided by ENCRYPTED SUPPORT LP. See Imprint, Contact.