qubes-doc/privacy/whonix-customize.md
2018-04-05 19:10:31 -05:00

2.8 KiB

layout title permalink redirect_from
doc Customizing Whonix /doc/whonix/customize/ /doc/privacy/customizing-whonix/

Customizing Whonix

There are numerous ways to customize your Whonix install. All require a degree of technical knowledge and comfort with the command line.

Enabling AppArmor

This is an optional security enhancement (for testers-only). If you're technical & interested, proceed, but do so at your own risk!

Note, if you want to use Tor bridges, AppArmor has been known in the past to cause problems with obfsproxy see this issue

You will want to complete the following instructions in both the Whonix-Gateway referred to in Qubes VM Manager as whonix-gw and the Whonix-Workstation or whonix-ws. You only need to apply these settings to the TemplateVMs before creating any template based VMs from these Whonix templates.

(This is because, since Qubes Q3, TemplateBasedVMs inherit the kernelopts setting of their TemplateVM.)

Configuring Whonix-Gateway

Launch the dom0 terminal app Konsole (konsole)or Terminal Emulator (xfce4-terminal) from your Qubes App Launcher. Then get a list of current kernel parameters.

qvm-prefs -g whonix-gw kernelopts

In Qubes 3.2 and 4.0, this will show: nopat

Keep those existing kernel parameters and add apparmor=1 security=apparmor by entering:

qvm-prefs -s whonix-gw kernelopts "nopat apparmor=1 security=apparmor"

When running the command to get a list of current kernel parameters again (just hit the arrow up key twice, so you don't have to type the command again).

qvm-prefs -g whonix-gw kernelopts

It should show the old and the new kernel parameters. For example:

nopat apparmor=1 security=apparmor

Once you started the VM, you can check if AppArmor is now active.

sudo aa-status --enabled ; echo $?

It should show: 0

Configuring Whonix-Workstation

In dom0 terminal Konsole or Terminal Emulator, get a list of current kernel parameters.

qvm-prefs -g whonix-ws kernelopts

In current version of Qubes, this will show nopat as a response. To keep those existing kernel parameters and add apparmor=1 security=apparmor do the following:

qvm-prefs -s whonix-ws kernelopts "nopat apparmor=1 security=apparmor"

When running the command to get a list of current kernel parameters again (just hit the arrow up key twice, so you don't have to type the command again).

qvm-prefs -g whonix-ws kernelopts

It should show the old and the new kernel parameters. For example:

nopat apparmor=1 security=apparmor

Once you started the VM, you can check if AppArmor is now active by typing:

sudo aa-status --enabled ; echo $?

It should show: 0