2.8 KiB
layout | title | permalink | redirect_from |
---|---|---|---|
doc | Customizing Whonix | /doc/whonix/customize/ | /doc/privacy/customizing-whonix/ |
Customizing Whonix
There are numerous ways to customize your Whonix install. All require a degree of technical knowledge and comfort with the command line.
Enabling AppArmor
This is an optional security enhancement (for testers-only). If you're technical & interested, proceed, but do so at your own risk!
Note, if you want to use Tor bridges, AppArmor has been known in the past to cause problems with obfsproxy
see this issue
You will want to complete the following instructions in both the Whonix-Gateway referred to in Qubes VM Manager as whonix-gw
and the Whonix-Workstation or whonix-ws
. You only need to apply these settings to the TemplateVMs before creating any template based VMs from these Whonix templates.
(This is because, since Qubes Q3, TemplateBasedVMs inherit the kernelopts setting of their TemplateVM.)
Configuring Whonix-Gateway
Launch the dom0
terminal app Konsole (konsole)
or Terminal Emulator (xfce4-terminal)
from your Qubes App Launcher. Then get a list of current kernel parameters.
qvm-prefs -g whonix-gw kernelopts
In Qubes 3.2 and 4.0, this will show: nopat
Keep those existing kernel parameters and add apparmor=1 security=apparmor
by entering:
qvm-prefs -s whonix-gw kernelopts "nopat apparmor=1 security=apparmor"
When running the command to get a list of current kernel parameters again (just hit the arrow up key twice, so you don't have to type the command again).
qvm-prefs -g whonix-gw kernelopts
It should show the old and the new kernel parameters. For example:
nopat apparmor=1 security=apparmor
Once you started the VM, you can check if AppArmor is now active.
sudo aa-status --enabled ; echo $?
It should show: 0
Configuring Whonix-Workstation
In dom0
terminal Konsole or Terminal Emulator, get a list of current kernel parameters.
qvm-prefs -g whonix-ws kernelopts
In current version of Qubes, this will show nopat
as a response. To keep those existing kernel parameters and add apparmor=1 security=apparmor
do the following:
qvm-prefs -s whonix-ws kernelopts "nopat apparmor=1 security=apparmor"
When running the command to get a list of current kernel parameters again (just hit the arrow up key twice, so you don't have to type the command again).
qvm-prefs -g whonix-ws kernelopts
It should show the old and the new kernel parameters. For example:
nopat apparmor=1 security=apparmor
Once you started the VM, you can check if AppArmor is now active by typing:
sudo aa-status --enabled ; echo $?
It should show: 0