mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-10-01 01:25:40 -04:00
Merge branch 'unman-patch-1'
This commit is contained in:
commit
2adbae839d
1
doc.md
1
doc.md
@ -94,6 +94,7 @@ Privacy Guides
|
||||
--------------
|
||||
|
||||
* [Whonix for Privacy & Anonymity](/doc/whonix/)
|
||||
* [Running Tails in Qubes](/doc/tails/)
|
||||
* [Anonymizing your MAC Address](/doc/anonymizing-your-mac-address/)
|
||||
* [TorVM](/doc/torvm/)
|
||||
* [Martus](/doc/martus/)
|
||||
|
74
privacy/tails.md
Normal file
74
privacy/tails.md
Normal file
@ -0,0 +1,74 @@
|
||||
---
|
||||
layout: doc
|
||||
title: Running Tails in Qubes
|
||||
permalink: /doc/tails/
|
||||
redirect_from:
|
||||
- /doc/running-tails
|
||||
---
|
||||
|
||||
Running Tails in Qubes
|
||||
============================
|
||||
|
||||
Tails is the amnesic incognito live system. Its aims are preserving privacy and anonymity.
|
||||
|
||||
To run Tails under Qubes:
|
||||
|
||||
1. Read about [creating and using HVM qubes](https://www.qubes-os.org/doc/hvm/)
|
||||
|
||||
2. Download and verify Tails from http://tails.boum.org in a qube, (saved as `/home/user/Downloads/tails.iso` on qube "isoVM" for purposes of this guide).
|
||||
|
||||
3. Create a HVM
|
||||
|
||||
- in Manager, click VM menu and select "Create VM"
|
||||
- Name the new qube - "Tails"
|
||||
- Select "HVM"
|
||||
- Configure networking
|
||||
- Click "OK" to create new HVM.
|
||||
|
||||
4. Open dom0 Konsole and start Tails:
|
||||
|
||||
qvm-start Tails --cdrom=isoVM:/home/user/Downloads/tails.iso
|
||||
|
||||
5. Configure Tails at start up.
|
||||
|
||||
6. Once the Tails qube has started, configure networking in the qube.
|
||||
|
||||
- Check the IP address allocated to the qube - either from GUI Manager, or ```qvm-ls -n Tails``` in Konsole. (E.g. 10.137.1.101 with gateway 10.137.1.1)
|
||||
- In the Tails qube, open systems menu in top-right corner. Select "Wired Settings", and change IPv4 configuration from "Automatic (DHCP)" to "Manual".
|
||||
- Enter the Address: 10.137.1.101 in our example.
|
||||
- Enter the Netmask: 255.255.255.0
|
||||
- Enter the Gateway: 10.137.1.1 in our example.
|
||||
- Enter DNS: 10.137.1.1 in our example.
|
||||
- Click "Apply". You should now see "Connected".
|
||||
|
||||
7. Use Tails as normal.
|
||||
|
||||
## Usage Notes
|
||||
|
||||
###Display issues:
|
||||
**Black screen on start up.**
|
||||
|
||||
This was reported with earlier versions of Tails: I believe the problem is now fixed.
|
||||
If you do encounter this problem, you can try to constrain display settings by appending vga codes to the Tails boot parameters.
|
||||
(If you do not know the codes, append vga=999, and a helpful prompt will appear.)
|
||||
|
||||
N.B Tails 2.3 does not appear to honour the vga code.
|
||||
|
||||
**Window extends beyond bottom of screen.**
|
||||
|
||||
This seems to arise because Tails sizes to the height of the screen, but there is a title bar at the top of the window.
|
||||
Either remove the title bar altogether, or move the window upwards using ALT+drag.
|
||||
|
||||
###Persistent Volume
|
||||
The persistence tools will not work because Tails has not been launched from USB.
|
||||
The HVM disk(s) can be configured and mounted from within Tails to provide persistent storage.
|
||||
|
||||
###Shutdown
|
||||
The Tails qube will not shut down cleanly.
|
||||
Kill it from the GUI Manager or ```qvm-kill Tails``` in Konsole.
|
||||
|
||||
###Security
|
||||
You will probably want to implement [MAC spoofing](https://www.qubes-os.org/doc/anonymizing-your-mac-address/).
|
||||
|
||||
Read [the warnings](https://tails.boum.org/doc/advanced_topics/virtualization/) from the Tails team about operating in a virtual machine.
|
||||
While the Qubes security model mitigates most of the risks identified, traces of the Tails session may remain on the disk.
|
Loading…
Reference in New Issue
Block a user