-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Stop users from changing their anon-whonix
net qube to sys-firewall
to avoid IP leaks
#8551
Comments
I could be wrong, but this definitely sounds like a feature request to me.
Keep in mind that this won't affect changing it from the command line. I imagine you probably want at least a warning there too. |
anon-whonix
Net Qube to sys-firewall
to avoid IP leaksanon-whonix
net qube to sys-firewall
to avoid IP leaks
anon-whonix
net qube to sys-firewall
to avoid IP leaksanon-whonix
net qube to sys-firewall
to avoid IP leaks
I would say this is a grave usability bug. But ultimately, it doesn't matter much if classified as bug or feature request.
That would be nice too. |
Does not look like a bug to me. As I understand the out-of-box settings are properly set. So, the only case when something goes wrong is when user manually and explicitly change qube settings (NetVM). Is it so important to prevent it? I mean it can happen with VPN netvm that user forgets, or other qube, that supposed to use whonix, but user decided to change the netvm. I would consider more important to prevent changing netvm for offline qubes (e.g. Also in case the user does this, without understanding what they are doing, the onion sites will stop opening, and the user will be able to understand that they broke something. I get it that |
On Wed, Sep 27, 2023 at 02:07:21PM -0700, Andrew David Wong wrote:
I could be wrong, but this definitely sounds like a feature request to me.
yup.
> Prohibited by QVMM to change a VM with the `anon-vm` qvm-tag to use a VM without the `anon-gateway` qvm-tag.
Keep in mind that this won't affect changing it from the command line. I imagine you probably want at least a warning there too.
that, and what about sys-whonix2 or whatever named sys-whonix clones people might
use? (or whatever named sys-firewall clones (or not clones) people might use...)
…--
cheers,
Holger
⢀⣴⠾⠻⢶⣦⠀
⣾⠁⢠⠒⠀⣿⡁ holger@(debian|reproducible-builds|layer-acht).org
⢿⡄⠘⠷⠚⠋⠀ OpenPGP: B8BF54137B09D35CF026FE9D 091AB856069AAA1C
⠈⠳⣄
The road to fascism is lined with people telling you to stop overreacting.
|
On Thu, Sep 28, 2023 at 02:01:03AM -0700, Holger Levsen wrote:
that, and what about sys-whonix2 or whatever named sys-whonix clones people might
use? (or whatever named sys-firewall clones (or not clones) people might use...)
...and what about differently named anon-whonix qubes?
…--
cheers,
Holger
⢀⣴⠾⠻⢶⣦⠀
⣾⠁⢠⠒⠀⣿⡁ holger@(debian|reproducible-builds|layer-acht).org
⢿⡄⠘⠷⠚⠋⠀ OpenPGP: B8BF54137B09D35CF026FE9D 091AB856069AAA1C
⠈⠳⣄
The empty vessel makes the greatest sound. (William Shakespeare)
|
@h01ger different names are not an issue here - both anon-whonix and sys-whonix can (and should) be distinguished by tags, that are added automatically to relevant qubes. |
@adrelanos AFAIR Whonix Workstation used to check if it's connected to Whonix Gateway at start, warn if it isn't and maybe even block network, no? Was this feature removed, or do I remember it wrong? Generally, I don't think blocking is appropriate (but technically possible). But a warning in a GUI settings may be a good idea. |
On Thu, Sep 28, 2023 at 02:48:12AM -0700, Marek Marczykowski-Górecki wrote:
@h01ger different names are not an issue here - both anon-whonix and sys-whonix can (and should) be distinguished by tags, that are added automatically to relevant qubes.
ah, nice. thanks.
…--
cheers,
Holger
⢀⣴⠾⠻⢶⣦⠀
⣾⠁⢠⠒⠀⣿⡁ holger@(debian|reproducible-builds|layer-acht).org
⢿⡄⠘⠷⠚⠋⠀ OpenPGP: B8BF54137B09D35CF026FE9D 091AB856069AAA1C
⠈⠳⣄
If nothing saves us from death, may love at least save us from life.
|
Just as a hint to you (not relevant to this topic): I accomplish this by dedicated templates -- the ones for offline qubes do not have the qubes-core-agent-networking package installed. In that case you can assign netvm's until the cows come home and there won't be a leak. |
Great idea, thank you! It requires user to be advanced enough for managing own templates, but great. I proposed a different enhancement that can kind of solve this problem too: #8555 |
I don't think this ever existed. Would be hard to implement in a clean, stable way.
Similar stuff is implemented. (Notify if connected to non-torified UpdatesProxy; block networking if firewall failed to load.)
Yes, that would be great! |
@adrelanos, is this issue a duplicate of either of these issues? Are they duplicates of each other? |
Related discussion thread on the Whonix Forums: |
I think it should be stated that Whonix appears broken without sys-whonix as its NetVM. Tor Browser won't work, apt won't work, curl, wget and so and so won't work. I don't agree with locking it down entirely, but in almost all cases changing the NetVM to anything but sys-whonix or none* will result in an IP leak, a "broken" system, and a confused user. Abstracting away from Whonix is great, but if that results in nothing ever happening, then not so much. Adding a warning is the bare minimum I would expect to protect less technical users. * Whonix VMs without networking are still useful to work in a generic environment (UTC timezone, etc). |
Qubes OS release
R4.2
Brief summary
Some users are shooting their own feet by setting the Net Qube of
anon-whonix
tosys-firewall
. See this example.There should be some protection in place in QVMM or otherwise to prevent this.
Steps to reproduce
anon-whonix
to besys-firewall
curl.anondist-orig 1.1.1.1
Expected behavior
simplified:
Not possible to change
anon-whonix
to any VM other thansys-whonix
as Net Qube.formalized:
Prohibited by QVMM to change a VM with the
anon-vm
qvm-tag to use a VM without theanon-gateway
qvm-tag.(I wouldn't be opposed to this being only a warning that the user can choose to ignore. But that part does not seem important. That part could remain "patches welcome".)
Actual behavior
Functional networking. IP leak.
Additional information
Whonix for VirtualBox does not have the issue of new users being able to reconfigure this. While possible for advanced users, not something as simple as point and click as it can be done with Qubes. Details here: #3994 (comment)
The text was updated successfully, but these errors were encountered: