Connections drop on Tor 0.4.8.9

Qubes bug report:

I’ve tested this in debian-12 VM in KVM and I can reproduce the issue.
Check if vanguards is running, the service is not enabled by default when it’s installed.
Also the issue seems to be occurring after some time will pass when you visit a few sites or wait a few minutes.

1 Like

Maybe only VMs are causing this but hardware doesn’t?

1 Like

I can confirm that this is also an issue in KVM Whonix as well.

1 Like

I’ve reproduced this issue on bare metal debian as well.

1 Like

Any updates on the issue? I did not see progress on the bug reports since last month, however, the problem still persists and it makes Whonix completely unusable to be honest.

Then you’re suffering from this issue for no reason. Solution available for a long time already.

No, not really. From public sources only. Quote from that Bug report:

1 Like
1 Like

Newer Tor version and vanguards disabling is now in the testers repository.

1 Like

There was a recent incident where a Tor user (a bad one, but not relevant to the technical discussion) was deanonymized due to timing attacks. This was only possible because the police were able to trace the user’s connections back to the guard relay due to the lack of second-layer Tor relay protection (Vanguard), as he was using an outdated version of Ricochet without Vanguard enabled.

This shows that Vanguard is absolutely necessary to avoid being deanonymized on Tor. The deanonymization attack is still complicated and not trivial to pull off, but it is possible.

For this reason, I would like to ask what the current state of Whonix’s missing Vanguard problem is, and recommend that efforts to find a working solution be intensified. As far as I know, Whonix does not have Vanguard protection because it is no longer compatible. This cannot be the case with Vanguard-Lite, which is used in Tor Browser. So why not at least patch Vanguard-Lite back into Whonix?

At the same time, I hope Mr. Perry will step up his efforts on the “Next” label (which has been attached for 9 months now…).

You can find a recent blog post about the timing/deanonymization attack on the Tor Project website. I am not able to attach the link here, maybe an admin can do that. The blog post is titled: “Is Tor still safe to use?”

Congratulations to the second duplicate of the same topic.

Because it already is.

Thanks for your reply. I wasn’t aware of the other post. How can I verify that Vanguard-Lite is enabled? Also, does Vanguard-Lite work when I connect to bridges, or just in Tor’s default configuration?

If you need to ask such basic questions you will also unfortunately also lack the skills to do any meaningful analysis.

Wrong forum. You can ask Tor directly.

This issue was resolved. Closing.

For anything on vanguards, there is vanguards - Additional protections for Tor Onion Services.