Re: [qubes-users] using two whonix-gw instances

2019-10-01 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 10/1/19 2:59 AM, tetrahe...@danwin1210.me wrote:
> 
> A 2nd sys-whonix gateway for this situation would seem to reduce the
> vulnerability. Or maybe I am just being paranoid?

I agree and decided to go with two gateways for the following reason: running 
two gateways is like having two PC's on the local network each running Tor ... 
in this way Virtualization/Qubes is responsible so an accidental 
misconfiguration / bug in Whonix is less likely to result in a compromise

I'll still have it on my todo list to read through both the Whonix and the TOR 
design. But until then, I'll go ahead with the two gateways.

/Sven
-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAl2TjlsACgkQ2m4We49U
H7ZVHhAAo4lVq0o0wYkmfrcLUlOIQMb9Yaxg9RwKswy17aSDOqmsxBIT/+1leQQJ
thxC/mlxzuzi7zTcqEJmQEU0iV+YWMzUdT55Wr2KV+6mTD+CGmus4Qx9uEYBLEvl
iP/F0ABgvfgQGLGryOSfSd/jWeOdSEgiBOkf0Y7xIrN/A3jp2zaxZV4TdY91YAJQ
/qnYqoq88z0xiQg8UT3NdIA2XvLDtDZ3aZX4UEyhAFgihBTpDQKybtgJhlM0Rqjd
Abbn9YXj0Odcl8oBDv2Yk03jKPcD9z18upkLuZzpi+cPVfhARSa0CljiFvwAzbkf
HzJTYM/uE6hnvLFMws4PAZYwawQ/MoSfuLuN2G4MkUJm0h2+GsMLQ0+2fdPufWZg
mjX4vIQZPaK+eV/SxslmMgzzpkOXTcKhz9MAF6lU1d2QYKcAFQq30NNacAT65q7H
KRNz7nNH8640lie0oQWZrUJ7HzSIFodVHS9P37V7DIGsQX5VPD30N5ezObsyowi/
piL4GEVtwUA0/kCxtW4kR8as08g06/tMXxxDF6vXFL7tAqmog14tr+vWxSii0eN8
LGSpwMDzGnLgrhnUwJOmX1uYenOkRYLjaH2DRVajZE4jKtQmUW31MG4jDPePF2HO
QEofFXZ7WyH1rFeFhdGZbQIVl71mevw039xJXjHShi6Wx8ILQVA=
=zW2c
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b7807df8-e1c4-eee9-cfc1-b51176e88566%40svensemmler.org.


Re: [qubes-users] using two whonix-gw instances

2019-09-30 Thread tetrahedra via qubes-users

On Thu, Sep 26, 2019 at 10:09:04AM -0500, Sven Semmler wrote:
My understanding is that TOR actually runs in the gateway and the the workstation(s) enable typical Qubes style compartmentalization. Meaning that if app-anon-1 is compromised, the sys-whonix and a potential app-anon-2 are not. When I create a second sys-whonix-id I can see via the Tor control panel that it uses a different Onion circuits than the first instance. 


Would it be recommended to use a separate sys-whonix gateway for
applications where one needs to expose the Tor ControlPort to AppVMs?

While the ControlPort would be protected by a password (this is
mandatory for non-local access) it seems conceivable that either:

a) the AppVM that has legitimate access (and the password) to the
ControlPort might get compromised, or

b) another AppVM (without legit access or the password) might be used to
exploit a vulnerability in the exposed ControlPort

A 2nd sys-whonix gateway for this situation would seem to reduce the
vulnerability. Or maybe I am just being paranoid?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191001025926.GA1477%40danwin1210.me.


Re: [qubes-users] using two whonix-gw instances

2019-09-30 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 9/25/19 8:31 PM, Claudia wrote:
> One way to find out for sure. Open /etc/torrc (or ~/.config/tor/torrc, or 
> other torrc location), and look for stream isolation flags. Make sure you 
> understand exactly what each one means.

Thank you!

/Sven
-BEGIN PGP SIGNATURE-
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=KPtn
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c418f75e-da1a-988f-14d5-4fa9ea4f0c24%40svensemmler.org.


Re: [qubes-users] using two whonix-gw instances

2019-09-27 Thread Claudia

tetrahedra via qubes-users:

On Wed, Sep 25, 2019 at 11:32:20PM +, 'awokd' via qubes-users wrote:

Sven Semmler:

On 9/25/19 5:26 PM, 'Jackie' via qubes-users wrote:
even different applications within the same vm, will use different 
tor circuits.


I know this is true of apps that come with whonix-ws, but is it the 
case for apps added later like Signal? I think you'd still be OK if 
Signal was the only thing added, but don't know about something like 
Signal and Discord in the same AppVM.


I'm fairly sure the answer is "no, stream isolation is only automatic
for apps which are wrapped by `uwt` or which otherwise take steps to be
isolated, and this just happens to be the case for most whonix-default
apps"...



I think the OP was talking about isolation between VMs, not isolation of 
apps within the same VM.


This is kind of how Qubes is designed in the first place. A random 
untrusted app, like a browser, could easily be exploited, and 
coredump/ptrace/what-have-you another app in the same VM and thereby 
break Tor isolation that way. Network- and machine-level isolation are 
different things, but the underlying concepts (e.g. 
compartmentalization) are kind of the same.


But nevertheless, in regards to the quote at hand... Yes, the 
preinstalled applications are preconfigured for stream isolation, either 
internally or by uwt. User installed apps, unless specifically 
configured, will use the TransPort & DNSPort and will be isolated only 
as specified by the TransPort & DNSPort isolation flags (whonix appears 
to just use Tor defaults, so effectively none).


For foreground applications (as opposed to services), it's easy to use 
torsocks with IsolatePID=1 to isolate a process. You can also enable 
torsocks globally (and thus isolate background processes as well), but 
I've never tried it on Whonix (and there must be some reason they're not 
doing this by default).


https://www.whonix.org/wiki/Stream_Isolation

-
This free account was provided by VFEmail.net - report spam to ab...@vfemail.net

ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of the 
NSA's hands!
$24.95 ONETIME Lifetime accounts with Privacy Features!  
15GB disk! No bandwidth quotas!
Commercial and Bulk Mail Options!  


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2c317f8d-b37b-9a15-2eb8-71cf36220b6f%40vfemail.net.


Re: [qubes-users] using two whonix-gw instances

2019-09-27 Thread Claudia

'Jackie' via qubes-users:

Sven Semmler:
In addition to my fairly standard dvm based on whonix-ws connected to 
sys-whonix based on whonix-ws I have now done the following:


1) cloned sys-whonix to sys-whonix-id
2) created app-signal based on whonix-ws
3) installed signal in whonix-ws
4) connected both app-email-private and app-signal to sys-whonix-id

The idea being:

1) sys-whonix and the instances of whonix-ws connected to it are for 
truly anonymous browsing. I have never nor will I ever type in 
anything even remotely identifying into those qubes.


2) sys-whonix-id is used more like a VPN in that the endpoint of the 
connection (my email provider or my phone in case of signal) knows 
very well who I am ... not anonymous at all. However no one in between 
my PC and those end points should be able to tell.


Here is my assumption I would like to check against the members of 
this group: while both instances (since cloned) will use the same 
entry guards, the resulting TOR circuits will be different and there 
is no way the traffic on the one connection can be correlated to the 
other - right?


/Sven


Hi,

I'm certainly no expert, but i'm not sure having two sys-whonix vms is 
necessary here. Whonix vms have stream isolation so different whonix 
appvms, or even different applications within the same vm, will use 
different tor circuits.


Of course it's possible that just coincidentally two applications in the 
same or different vms could happen to use the same exit node for a 
period of time, but that would also be possible if they use separate 
sys-whonix proxy vms.


But i might be missing something here, so somebody please correct me if so.



One way to find out for sure. Open /etc/torrc (or ~/.config/tor/torrc, 
or other torrc location), and look for stream isolation flags. Make sure 
you understand exactly what each one means.


 IsolateClientAddr

Don’t share circuits with streams from a different client address. 
(On by default and strongly recommended when supported; you can disable 
it with NoIsolateClientAddr. Unsupported and force-disabled when using 
Unix domain sockets.)


IsolateSOCKSAuth

Don’t share circuits with streams for which different SOCKS 
authentication was provided. (For HTTPTunnelPort connections, this 
option looks at the Proxy-Authorization and X-Tor-Stream-Isolation 
headers. On by default; you can disable it with NoIsolateSOCKSAuth.)


IsolateClientProtocol

Don’t share circuits with streams using a different protocol. 
(SOCKS 4, SOCKS 5, TransPort connections, NATDPort connections, and 
DNSPort requests are all considered to be different protocols.)


IsolateDestPort

Don’t share circuits with streams targeting a different destination 
port.


IsolateDestAddr

Don’t share circuits with streams targeting a different destination 
address.



https://www.torproject.org/docs/tor-manual.html.en


Since IsolateClientAddr is on by default, and since every whonix-ws has 
a different address, one can assume that circuits will never be shared 
between different VMs. So a single gateway should sufficiently isolate 
traffic from different VMs.



Important note: Applications accessing the same Tor instance, via any 
SOCKS address/port, can discover information about the remote 
destinations of other applications on the same Tor instance.


So the reason to use two separate Tor instances (whonix-gw VMs) is only 
if you're worried about untrusted or exploitable applications which 
could discover where other applications (even on different workstation 
VMs connected to the same gateway) are visiting. But it has nothing to 
do with external traffic analysis or stream isolation or anything like that.


This is the same reason it's not recommended to expose your Tor SOCKS 
port to the local network or anywhere else. Anyone who can access it can 
find out what sites you're visiting.


For example, if you have two whonix-ws VMs using the same whonix-gw, a 
browser in VM1 could be exploited and discover what sites you are 
visiting in VM2.


So, in theory, you are right for using two different whonix-gw VMs, one 
for anonymous work and one for non-anonymous work. However, I would 
imagine that the Qubes and Whonix developers know about this and have 
done everything right. I just don't know enough about Qubes/Whonix in 
particular.




As far as entry guards... Yes, I believe the cloned VM will use the same 
guards, at least initially. However I don't think guard selection is 
deterministic, so after a while (usually a month) the two VMs will 
select a new, different set of guards.


Generally you want to use as few guards as possible, so you want to use 
the same ones in as many places as possible. To be precise, you want to 
always use the same guard to connect to a given location (to the best 
extent that is practical, anyway).


So if whonix-gw1 and whonix-gw2 are both connecting to google.com using 
different guards, the likelihood of being deanonymized by a 

Re: [qubes-users] using two whonix-gw instances

2019-09-26 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

My understanding is that TOR actually runs in the gateway and the the 
workstation(s) enable typical Qubes style compartmentalization. Meaning that if 
app-anon-1 is compromised, the sys-whonix and a potential app-anon-2 are not. 
When I create a second sys-whonix-id I can see via the Tor control panel that 
it uses a different Onion circuits than the first instance. 

Patrick pointed me to the Whonix forum and to the Tor project for answers. I'll 
report back here once I got clarification.

/Sven
-BEGIN PGP SIGNATURE-
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=doZL
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e4e51178-c9a2-e67a-a3ce-49c101d84586%40svensemmler.org.


Re: [qubes-users] using two whonix-gw instances

2019-09-26 Thread tetrahedra via qubes-users

On Wed, Sep 25, 2019 at 11:32:20PM +, 'awokd' via qubes-users wrote:

Sven Semmler:

On 9/25/19 5:26 PM, 'Jackie' via qubes-users wrote:

even different applications within the same vm, will use different tor circuits.


I know this is true of apps that come with whonix-ws, but is it the 
case for apps added later like Signal? I think you'd still be OK if 
Signal was the only thing added, but don't know about something like 
Signal and Discord in the same AppVM.


I'm fairly sure the answer is "no, stream isolation is only automatic
for apps which are wrapped by `uwt` or which otherwise take steps to be
isolated, and this just happens to be the case for most whonix-default
apps"...

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190926092207.GA1787%40danwin1210.me.


Re: [qubes-users] using two whonix-gw instances

2019-09-25 Thread 'awokd' via qubes-users

Sven Semmler:

On 9/25/19 5:26 PM, 'Jackie' via qubes-users wrote:

even different applications within the same vm, will use different tor circuits.


I know this is true of apps that come with whonix-ws, but is it the case 
for apps added later like Signal? I think you'd still be OK if Signal 
was the only thing added, but don't know about something like Signal and 
Discord in the same AppVM.



Oh wow... that sounds great. I just discovered there is actually a whonix-users 
group ... I will post my question there too.


Please follow up here too if you get more clarification.

--
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ea4dbc74-aa29-dfc0-fda6-4b5dbe7db372%40danwin1210.me.


Re: [qubes-users] using two whonix-gw instances

2019-09-25 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 9/25/19 5:26 PM, 'Jackie' via qubes-users wrote:
> Whonix vms have stream isolation so different whonix appvms, or even 
> different applications within the same vm, will use different tor circuits.

Oh wow... that sounds great. I just discovered there is actually a whonix-users 
group ... I will post my question there too. 

Thank you!

/Sven
-BEGIN PGP SIGNATURE-
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=a4uj
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fd38deb5-4057-631f-c333-8f679e2ed8d4%40svensemmler.org.


Re: [qubes-users] using two whonix-gw instances

2019-09-25 Thread 'Jackie' via qubes-users

Sven Semmler:

In addition to my fairly standard dvm based on whonix-ws connected to 
sys-whonix based on whonix-ws I have now done the following:

1) cloned sys-whonix to sys-whonix-id
2) created app-signal based on whonix-ws
3) installed signal in whonix-ws
4) connected both app-email-private and app-signal to sys-whonix-id

The idea being:

1) sys-whonix and the instances of whonix-ws connected to it are for truly 
anonymous browsing. I have never nor will I ever type in anything even remotely 
identifying into those qubes.

2) sys-whonix-id is used more like a VPN in that the endpoint of the connection 
(my email provider or my phone in case of signal) knows very well who I am ... 
not anonymous at all. However no one in between my PC and those end points 
should be able to tell.

Here is my assumption I would like to check against the members of this group: 
while both instances (since cloned) will use the same entry guards, the 
resulting TOR circuits will be different and there is no way the traffic on the 
one connection can be correlated to the other - right?

/Sven


Hi,

I'm certainly no expert, but i'm not sure having two sys-whonix vms is 
necessary here. Whonix vms have stream isolation so different whonix 
appvms, or even different applications within the same vm, will use 
different tor circuits.


Of course it's possible that just coincidentally two applications in the 
same or different vms could happen to use the same exit node for a 
period of time, but that would also be possible if they use separate 
sys-whonix proxy vms.


But i might be missing something here, so somebody please correct me if so.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4e3a67aa-aa89-952f-daaf-7a91ae6993ae%40danwin1210.me.


[qubes-users] using two whonix-gw instances

2019-09-25 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

In addition to my fairly standard dvm based on whonix-ws connected to 
sys-whonix based on whonix-ws I have now done the following:

1) cloned sys-whonix to sys-whonix-id
2) created app-signal based on whonix-ws
3) installed signal in whonix-ws
4) connected both app-email-private and app-signal to sys-whonix-id

The idea being:

1) sys-whonix and the instances of whonix-ws connected to it are for truly 
anonymous browsing. I have never nor will I ever type in anything even remotely 
identifying into those qubes. 

2) sys-whonix-id is used more like a VPN in that the endpoint of the connection 
(my email provider or my phone in case of signal) knows very well who I am ... 
not anonymous at all. However no one in between my PC and those end points 
should be able to tell.

Here is my assumption I would like to check against the members of this group: 
while both instances (since cloned) will use the same entry guards, the 
resulting TOR circuits will be different and there is no way the traffic on the 
one connection can be correlated to the other - right?

/Sven


-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAl2L5bAACgkQ2m4We49U
H7aWew/+PBWpr9Y7dJ8TaQIKb6gE/YmaCGACNt7z1JREYQXtSKmYa2ktQtwOSDJf
vxKCECnJhfKAm6IsgFUiACtYcPM/3Cfj002N4dXXmzas6RrXl4i7MFTBi91P+wvJ
wU/sGAO2Lvb9PqfTanQZzaEmLk/ulECSpRRpeS8X1b92XOuFNnLJWJnQvdCacyre
qgwdX8L0mLTx71Q5uckWJpJZgu97qh7tZke3/OlBGKCG5J1WYKKKHb9uvzTwDmET
ZY1GYfI3rSLuHZz0jeIx+5R39GLJuVfkQwj6nHF0pz8uQSSo05+DUrF0J9bIV0uu
wYzNGvJjNcrhPAvD38viAO7Q7uPK+MgeYBZpHkQ+nL/uzGrdQr00RICnVdH+n8Zy
D7aMBK9IvObFhDA76nEIaC1A2WarOaNb4QOR2xkMgl0ba06JcWVogSu3llFd8VuB
4bhxlPK3mitwNb25nsKV3dkMZ8ieV/H3r3Qjm0GgtzQGrppSLsYEnozqHp4vDhkY
dHk1T5xbA36zewXY9BBeAYUtAfV36+dCXoLaWIdXDxXd1dC1nVgQOtYyRQ7QSvZ9
u+LDEshgDjdGZ7qN7u+zS5SJjJmHNhjr465eTq1znoh2gaMvPbruh0UUzXyAnCpm
zlEyYPT/b9bRmgsMiwPp8eutIzYNRadNDd1khaynosIup63waeg=
=Jmzb
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1f900152-275c-1503-aaa1-59d462d33a54%40svensemmler.org.