Whonix Stable Release

From Whonix

About this Whonix Stable Release Page
Support Status stable
Difficulty easy
Maintainer torjunkie [archive]
Support Support

Whonix ™ 15 Changelog[edit]

Whonix ™ 15 was released on July 1, 2019. [1] Significantly, Whonix ™ 15 is based on the Debian buster (Debian 10) distribution which was officially released on July 6, 2019 instead of Debian stretch (Debian 9). The buster release has nearly 60,000 packages and over 62 per cent of them were updated [2] [3] -- see the official Debian 10 release notes [archive] to learn more.

All Platforms[edit]

Bug Fixes[edit]

  • Fixed file saving issues in scurl wrappers. [4] [5] [6]
  • Fixed the partial truncation of text in Whonix Connection Wizard. [7]
  • Installed cryptsetup by default so errors do not appear when using a GUI and interacting with encrypted containers. [8] [9] [10]


  • Ported the build script to cowbuilder; build packages in chroot and use mmdebstrap for better security. [11]


  • Modified whonixcheck so it suggests to start networking / onion-grater if it is not running. [12]
  • Improved the /usr/share/sdwdate/unit_test [13] [14]
  • Improved the sdwdate message Tor consensus message. [15]
  • Confirmed the sanity of systemd DNS after porting to Debian buster. [16]
  • Established sane built-in defaults even if configuration files are non-existing. [17] [18]
  • Updated the onion list time sources for sdwdate so that offline and unwanted onions were removed. [19]

Improved Functionality and Usability[edit]

Security Enhancements[edit]


Bug Fixes[edit]

  • Corrected a VirtualBox error related to guest utils not starting. [40] [41]


  • Significantly reduced the size of Non-Qubes-Whonix images using zerofree. [42]

Improved Functionality and Usability[edit]

Security Enhancements[edit]

Qubes-Whonix ™[edit]

Bug Fixes[edit]

  • Correctly configured Qubes-Whonix ™ XFCE default start menu entries (whitelisted appmenus). [59]


  • Created Qubes-Whonix 15 template configuration files. [60] [61]
  • Confirmed the Whonix-15-gateway template builds. [62]

Improved Functionality and Usability[edit]

  • Simplified instructions for VM kernel [archive] in Qubes-Whonix ™ by installing the same recommended Qubes packages as Qubes Debian packages. [63] [64]
  • In DisposableVMs, tb-updater / tb-starter was modified to no longer copy Tor Browser to the user home directory at first boot -- /var/cache/tb-binary is now directly used to improve startup performance. [65] [66]

Security Enhancements[edit]

  • Confirmed Qubes-Whonix ™ TemplateMVs cannot upgrade in timesync-fail-closed mode. [67] [68]

Whonix ™ 15 Updates[edit]

As Whonix ™ is now a rolling distribution, users will benefit from regular small security and usability improvements, features and bug fixes as they enter the Whonix ™ stable repository. Those will be announced here.


Point releases were announced on 10 September, 22 November and 23 November 2019. [69] [70] [71] [72] Notable changes are listed below. Note that an in-place upgrade is not recommended for KVM -- significant changes have been made to the host settings that require the current machines and virtual networks to be replaced with updated ones. Refer to the KVM wiki for detailed installation instructions.


Bug Fixes[edit]

  • Fixed anon-connection-wizard truncated text.
  • Fixed whonixcheck msgcollector permission errors.
  • Corrected authentication failures related to Anon Connection Wizard and Whonix repository. [75]
  • Fixed a tb-starter bug.
  • Resolved the apt-get error relating to Debian's suite value changing from 'testing' to 'stable'. [76]
  • Fixed starting pkexec-based applications from start menu, such as gdebi, synaptic and gparted. [77]
  • Added an encrypted swap file to the system to avoid Whonix-Gateway freezing (for systems with low RAM) during the apt-get dist-upgrade procedure. [78] [79] [80]
  • Worked around a NoScript race condition that permitted JavaScript on around 30 sites in Tor Browser when the Security Slider was set to Safest. [81] [82]
  • Prevented the keyboard-configuration debconf popup during apt-get dist-upgrade. [83] [84]
  • Implemented a command-not-found permission fix to avoid the WARNING:root:could not open file '/etc/apt/sources.list' message. [85] [86]


  • Bumped base Debian packages to 10.1

Contentious Changes[edit]

  • Tor Browser Updater (by Whonix developers): reduced old versions being kept to 0 in /var/cache/tb-binary

Developer Notes[edit]

  • Added anon-base-files to whonix-host-xfce-kvm-freedom.
  • Added hardened-malloc to hardened-packages-dependencies-cli.
  • Removed unneeded dependency live-config-systemd.
  • anon-base-files:
    • Do not create a home folder during postinst.
    • Leave user user creation to Qubes.
    • Fixed and actually use --no-create-home.


Improved Functionality and Usability[edit]

  • Disabled whonixcheck “Connecting to Tor…” and “Connected to Tor.” messages. [88]
  • Added support for OnionShare “bundled Tor”.
  • Packaged str_replace for literal search and replace functions.
  • Display the pulseaudio plugin by default.
  • Added arc-theme, gnome-themes-extra, gnome-themes-extra-data and gtk2-engines-murrine for better visual presentation and a more modern look.
  • Set SUDO_EDITOR="mousepad" if: mousepad is installed and the environment variable SUDO_EDITOR has not already been set.
  • Updated Tor Browser to version 9.
  • The Whonix build script now optionally supports installing packages from the Whonix remote repository, rather than building packages locally. [89]
  • Simplified the default sudo lecture (presenting text upon first run) so it only shows the default password for Whonix. [90] [91] [92]
  • Removed the deprecated obfs3 bridges option from Anon Connection Wizard.
  • Enabled serial console functionality in VirtualBox, see: Serial Console. [93] [94]
  • From the VirtualBox host, simplify the sending of SysRq commands to VirtualBox VMs using the vboxmanage command. [95]

Kernel Hardening[edit]

Significant kernel [archive] and other security hardening has been implemented; numerous enhancements have been made to security-misc [archive]:

  • Enabled kernel panic on kernel oops after boot, see: set oops=panic kernel parameter or kernel.panic_on_oops=1 sysctl for better security [archive].
  • Enabled usergroups, so group permissions are the same as user permissions. [96]
  • Removed read, write and execute access for others for all users who have home folders under folder /home. [97] [98]
  • Group sudo membership is required to use su.
  • Passwordless, recovery / emergency mode has been implemented.
  • Lock user accounts with pam_tally2 after five failed authentication attempts are detected. [99]
  • The thunderbolt and firewire modules were blacklisted, since they can be used for Direct Memory Access (DMA) attacks.
  • Every module must now be signed before being loaded; any module that is unsigned or signed with an invalid key cannot be loaded. [100]
  • Uncommon network protocols were blacklisted: these are rarely used and may have unknown vulnerabilities. [101]
  • Enabled IOMMU [archive].
  • The SysRq key is restricted to only allow shutdowns/reboots.
  • A systemd service mounts /proc with hidepid=2 at boot, thereby preventing users from seeing each other’s processes.
  • A systemd service clears on boot as these contain kernel symbols that could be useful to an attacker. [102]
  • Remove after a kernel upgrade.
  • The kernel logs are restricted to root only.
  • The BPF JIT compiler is restricted to the root user and is hardened.
  • The ptrace system call is restricted to the root user only.
  • Added user root to group sudo. This is necessary so it is still possible to login as a user in a virtual console. [103]
  • Kernel symbols in /proc/kallsyms are hidden. This prevents malware from reading and using them to learn more about system vulnerabilities that can be attacked.
  • Kexec is disabled because it can be used for live patching of the running kernel.
  • Bluetooth is blacklisted to reduce the attack surface.
  • For a full list of changes, see: [archive]


  • Command line control of KVM VMs is now supported. [104]
  • The microphone is disabled by default.
  • Switched RNG to /dev/urandom
  • pvspinlock is enabled.
  • Fixed Whonix-Gateway firewall desktop shortcuts.
  • No longer install pulseaudio by default on Whonix-Gateway.
  • Various apparmor fixes.
  • Created new apparmor profiles for bootclockrandomization, permission lockdown, and pam tally2 information.
  • Ensured future compatibility for apparmor-profile-everything.
  • Improved the output of remove
  • Fixed the KVM prepare_release script.
  • Fixed the GPU tag in libvirt XML.
  • Updated Tor Browser to version 9.0.1

Security Enhancements[edit]

Much stronger Linux user account isolation has been enforced in non-Qubes-Whonix: [105]


  1. Some fixes/changes were implemented in both Whonix ™ 14 and 15.
  2. [archive]
  3. More than 91 per cent of the source packages included in Debian 10 are reproducible (will build bit-for-bit identical binary packages).
  4. [archive]
  5. [archive]
  6. A few fixes were needed, such as:
    • Remove --remote-name and replace it with --remote-name-all.
    • Improve download wrappers and add --remote-header-name.
  7. [archive]
  8. [archive]
  9. For instance, an error would otherwise appear when using XFCE file manager with encrypted USBs.
  10. [archive]
  11. [archive]
  12. [archive]
  13. [archive]
  14. Specifically:
    • Make it simpler (to split urls into chunks of 3).
    • Generate average, total etc. for each pool.
    • Add curl command for the failures (timeouts).
  15. [archive]
  16. [archive]
  17. [archive]
  18. This was completed for whonix-gw-firewall, whonix-ws-firewall, whonixcheck, sdwdate, uwt, onion-grater (Control Port Filter Proxy), rads, open-link-confirmation, tb-starter, tb-updater and anon-ws-disable-stacked-tor.
  19. [archive]
  20. [archive]
  21. [archive]
  22. [archive]
  23. [archive]
  24. MAT2 only removes metadata from your files, it does not anonymise their content, nor can it handle watermarking, steganography, or any too custom metadata field/system.

  25. [archive]
  26. [archive]
  27. zulumount-gui [archive] is also installed.
  28. [archive]
  29. [archive]
  30. [archive]
  31. [archive]
  32. [archive]
  33. Primarily due to incompatibility with v3 onions.
  34. [archive]
  35. [archive]
  36. nyx is actually the same project; just the name has changed and the presentation is very similar.
  37. [archive]
  38. [archive]
  39. Using the Jitter RNG core, the rngd provides an entropy source that feeds into the Linux /dev/random device if its entropy runs low. ... Especially during boot time, when the entropy of Linux is low, the Jitter RNGd provides a source of sufficient entropy.

  40. [archive]
  41. [archive]
  42. [archive]
  43. [archive]
  44. [archive]
  45. [archive]
  46. [archive]
  47. This means Non-Qubes-Whonix users can boot into live-mode out of the box, without needing to install it.
  48. [archive]
  49. Such as the root password, Whonix ™ home page and so on.
  50. [archive]
  51. [archive]
  52. [archive]
  53. The floppy and optical settings were disabled in both the Gateway and Workstation, while the Gateway audio was also disabled.
  54. kloak is a privacy tool that makes keystroke biometrics less effective. This is accomplished by obfuscating the time intervals between key press and release events, which are typically used for identification. This project is experimental.

  55. [archive]
  56. See recent pull requests here [archive].
  57. [archive]
  58. The specific changes include:

    Kernel symbols in /proc/kallsyms are hidden to prevent malware from reading them and using them to learn more about what to attack on your system.

    Kexec is disabled as it can be used for live patching of the running kernel.

    The BPF JIT compiler is restricted to the root user and is hardened.

    ASLR effectiveness for mmap is increased.

    The ptrace system call is restricted to the root user only.

    The TCP/IP stack is hardened.

    This package makes some data spoofing attacks harder.

    SACK is disabled as it is commonly exploited and is rarely used.

    This package disables the merging of slabs of similar sizes to prevent an attacker from exploiting them.

    Sanity checks, redzoning, and memory poisoning are enabled.

    The kernel now panics on uncorrectable errors in ECC memory which could be exploited.

    Kernel Page Table Isolation is enabled to mitigate Meltdown and increase KASLR effectiveness.

    SMT is disabled as it can be used to exploit the MDS vulnerability.

    All mitigations for the MDS vulnerability are enabled.

    DCCP, SCTP, TIPC and RDS are blacklisted as they are rarely used and may have unknown vulnerabilities.

  59. [archive]
  60. [archive]
  61. [archive]
  62. [archive]
  63. [archive]
  64. [archive]
  65. [archive]
  66. Neither are backups of Tor Browser maintained anymore; previously three backups were stored.
  67. [archive]
  68. timesync-fail-closed means sdwdate did not succeed yet. Networking for all but Tor and sdwdate should still be locked in this scenario.
  69. [archive]
  70. [archive]
  71. [archive]
  72. [archive]
  73. [archive]
  74. [archive]
  75. [archive]
  76. [archive]
  77. [archive]
  78. This also creates a new encrypted swapfile with a random password on every boot.
  79. [archive]
  80. [archive]
  81. [archive]
  82. [archive]
  83. [archive]
  84. [archive]
  85. [archive]
  86. [archive]
  87. [archive]
  88. In favor of sdwdate-gui. whonixcheck connectivity check code checks Tor as well as sdwdate. Due to slow Tor/onion speed it often times out. Improving that code is difficult, so sdwdate-gui is used instead as a solution that provides better visual feedback to users.
  89. [archive]
  90. [archive]
  91. [archive]
  92. [archive]
  93. [archive]
  94. This helps for recovery efforts and simplifies setting up the kernel boot parameters inside the VM.
  95. [archive]
  96. By default, Debian utilizes User Private Groups (UPG) [archive]. Also see: /usr/share/pam-configs/usergroups-security-misc
  97. For example, this affects those running “chmod o-rwx /home/user” during package installation or an upgrade.
  98. This is only performed once for each folder in the parent /home folder, so users who wish to relax file permissions can do so. This action protects files in the user's home folder which were previously created with lax file permissions prior to the installation of this package.
  99. See: unlock instructions. This means it is possible to have short, easy-to-remember, "weak" passwords for the user user account, while still preventing compromised non-root users from bruteforcing it.
  100. This makes it harder to load a malicious module.
  101. See: /etc/modprobe.d/uncommon-network-protocols.conf
  102. Forum discussion [archive].
  103. See: debian/security-misc.postinst
  104. See: KVM Command Line Interface (CLI)
  105. This does not yet apply to Qubes-Whonix.
  106. Qubes issue [archive].
  107. This is a purposeful security feature and there are no user freedom restrictions; read more here.
  108. See: gpg --recv-keys fails / no longer use keyservers for anything [archive].
  109. [archive]
  110. Running any editor as root is insecure. sudoedit copies the file to a temporary location, edits it as a normal user and then overwrites the original using sudo.
  111. [archive]

Follow: Twitter.png Facebook.png 1280px-Gab text logo.svg.png Rss.png Matrix logo.svg.png 1024px-Telegram 2019 Logo.svg.png Discourse logo.svg

Donate: Donate Bank Wire Paypal Bitcoin accepted here Monero accepted here Contriute

Whonix donate bitcoin.png Monero donate whonix.png

Share: Twitter | Facebook

Did you know that Whonix could provide protection against backdoors [archive]? See Verifiable Builds [archive]. Help is wanted and welcomed.

https link onion link

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to Conditions for Contributions to Whonix ™, then Edit! Edits are held for moderation.

Copyright (C) 2012 - 2019 ENCRYPTED SUPPORT LP. Whonix ™ is a trademark. Whonix ™ is a licensee [archive] of the Open Invention Network [archive]. Unless otherwise noted, the content of this page is copyrighted and licensed under the same Freedom Software license as Whonix ™ itself. (Why?)

Whonix ™ is a derivative of and not affiliated with Debian [archive]. Debian is a registered trademark [archive] owned by Software in the Public Interest, Inc [archive].

Whonix ™ is produced independently from the Tor® [archive] anonymity software and carries no guarantee from The Tor Project [archive] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our Privacy Policy, Cookie Policy, Terms of Service, and E-Sign Consent. Whonix ™ is provided by ENCRYPTED SUPPORT LP. See Imprint.