-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
disallow setting netvm of whonix-ws to a non whonix-gw #7614
Comments
I believe Whonix already has internal safeguards to prevent such leaks from occurring. Is this correct, @adrelanos? |
Does that mean the GUI should disallow it, but the CLI should permit it? Seems inconsistent. |
No, both should disallow it.
I said this because I presented a scratch code for the cli. Untested and probably insufficient, just a getting started. |
There's an updates-proxy check but setting anon-whonix to sys-firewall... There's not much that can be done from inside the VM. This is a feature required from the virtualizer. From the Whonix integration perspective, Qubes dom0 is "the virtualizer" (even if technically Xen is involved too). Even if something could be done from within the VM, it would be much better to have the safeguards enforced on the host / virtualizer (Qubes dom0) level. Unfortunately, even Whonix for VirtualBox is doing better in this regard. related: |
As it is an enhancement and not a bug, I will state some considerations. For disposables, are disposables templates are based on an app qube, the disposable check is harder because it has to check against the template of the disposable template. For standalone, the features of the template are cloned to it at creation, so it is easier. |
How is this issue different from #3994? |
If you see the edit on this comment #3994 (comment) Adrelanos explained here So I opened a new ticket, because the previous one is related to the proxy, template networking, this one is just related to the netvm of whonix-ws (appvm, disp, standalone). |
This ticket is to disallow settings (using GUI and/or CLI) which are insecure and while maybe still hard to implement might be quite a bit easier less controversial. #3994 is about changing Qubes internal networking default to secure values. The default networking setting would be |
Duplicate of #8551 |
This appears to be a duplicate of an existing issue (see #8551 (comment)). If so, please comment on the appropriate existing issue instead. If anyone believes this is not really a duplicate, please leave a comment briefly explaining why. We'll be happy to take another look and, if appropriate, reopen this issue. Thank you. |
The problem you're addressing (if any)
A Whonix Workstation such as anon-whonix can connect to any netvm. It is set by default to the default Whonix Gateway sys-whonix.
Leaks may occur.
The solution you'd like
I wish for the NetVM property for vms with property
whonix-ws
to only set as its proxy a vm with propertywhonix-gw
.The value to a user, and who that user might be
Value: ensure there are not clearnet leaks
Target user: All Qubes-Whonix user
Some things I've thought of
The same way templates for disposables can only be a disposable template vm, I wish to only be allowed to set a netvm of a whonix-ws to a whonix-gw.
The properties are already set by default to both whonix vm templates, the vms can have tags anon-vm and anon-gateway.
What is missing is the code for the gui to only show list and the backend to block incorrect netvms.
Some untested scratch:
The text was updated successfully, but these errors were encountered: