Failed dist-upgrade | Kicksecure repository is not enabled

Greetings,

i am in the process of upgrading my whonix workstation to the latest release upgrade.
I have followed the instructions to perform a release upgrade in place.

When i run:

sudo release-upgrade 

I get

+ true 'ERROR: File /etc/apt/sources.list.d/derivative.list does not contain the Kicksecure repository.
Kicksecure repository is not enabled. Enable it first before proceeding.

See:
https://www.kicksecure.com/wiki/Project-APT-Repository

Aborting.'
+ exit 1

Occasionally this does not happen and i am able to perform a release upgrade however that leads to a broken system that is completely nonfunctional and can not boot

Enable it. Visit the link provided in the error message.

1 Like

Great Idea, i would even go so far to call it a truly fantastic idea. You wouldn’t believe me if i told you i had the same one. Mind blowing!

Jokes aside, thank you for your reply.

After your reply i looked at it again and i ran the " Command Line Interface" instructions which seemingly worked at first but gave me:

Errors were encountered while processing:
 linux-image-6.1.0-13-amd64
 linux-image-amd64
 linux-headers-6.1.0-13-amd64
 linux-headers-amd64
 tirdad-dkms
 tirdad
 non-qubes-vm-enhancements-cli
 non-qubes-whonix-workstation-cli
 non-qubes-whonix-workstation-xfce
 non-qubes-vm-enhancements-gui
E: Sub-process /usr/bin/dpkg returned an error code (1)
+ true 'ERROR: An error was encountered during installation of release upgrade. See above.'
+ exit 1

Which bricked my system and made it also unbootable.

Before that, this may be helpful,
I followed the instructions laid out in the Kicksecure section but aborted because i thought it is not applicable.
As far as i can say there are no instructions for how to enable it at all in Whonix,
there are instructions for how to change it in Quebes,
and the operating system Kicksecure, but again not for how to enable it.

This in my mind does also not explain why i am occasionally able to upgrade without having to enable it.

The log is too short. That’s just the summary or result. It’s not what actually went wrong.

1 Like

The following is the error log for the Kicksecure error, the initial error i faced

user@host:~$ sudo release-upgrade 
+ set -e
+ set -o pipefail
+ shopt -s nullglob
+ version=2.0
+ [[ -v source_codename ]]
+ source_codename=bullseye
+ [[ -v target_codename ]]
+ target_codename=bookworm
+ true 'INFO: (release-upgrade version: 2.0) Release upgrade from Debian bullseye to Debian bookworm in progress...'
+ trap error_handler ERR
++ id -u
+ '[' 0 '!=' 0 ']'
+ export DEBDEBUG=1
+ DEBDEBUG=1
+ true 'INFO: Checking if tor@default systemd unit is running...'
+ systemctl --no-pager status tor@default
● tor@default.service - anon-ws-disable-stacked-tor
     Loaded: loaded (/lib/systemd/system/tor@default.service; enabled-runtime; vendor preset: enabled)
    Drop-In: /lib/systemd/system/tor@default.service.d
             └─50_anon_ws_disable_stacked_tor.conf, 51_anon_ws_disable_stacked_tor.conf
     Active: active (running) since Mon 2023-11-06 18:03:01 UTC; 15min ago
       Docs: https://www.whonix.org/wiki/Dev/anon-ws-disable-stacked-tor
   Main PID: 605 (tor)
      Tasks: 2 (limit: 4597)
     Memory: 752.0K
        CPU: 7ms
     CGroup: /system.slice/system-tor.slice/tor@default.service
             ├─605 /bin/bash /usr/bin/tor --defaults-torrc /usr/share/tor/tor-service-defaults-torrc -f /etc/tor/torrc …
             └─608 sleep infinity

Nov 06 18:03:01 host systemd[1]: Started anon-ws-disable-stacked-tor.
+ test -f /etc/apt/sources.list.d/debian.list
+ test -f /etc/apt/sources.list.d/derivative.list
++ cat /etc/apt/sources.list.d/derivative.list
++ grep --invert-match '\#'
++ grep --invert-match '^$'
+ derivative_list_contents='deb [signed-by=/usr/share/keyrings/derivative.asc] tor+https://deb.whonix.org bullseye main contrib non-free'
+ '[' 'deb [signed-by=/usr/share/keyrings/derivative.asc] tor+https://deb.whonix.org bullseye main contrib non-free' = '' ']'
+ echo 'deb [signed-by=/usr/share/keyrings/derivative.asc] tor+https://deb.whonix.org bullseye main contrib non-free'
+ grep --quiet kicksecure.com
+ echo 'deb [signed-by=/usr/share/keyrings/derivative.asc] tor+https://deb.whonix.org bullseye main contrib non-free'
+ grep --quiet w5j6stm77zs6652pgsij4awcjeel3eco7kvipheu6mtr623eyyehj4yd.onion
+ true 'ERROR: File /etc/apt/sources.list.d/derivative.list does not contain the Kicksecure repository.
Kicksecure repository is not enabled. Enable it first before proceeding.

See:
https://www.kicksecure.com/wiki/Project-APT-Repository

Aborting.'
+ exit 1
user@host:~$ 

You need to fix that, then release upgrade and then provide the log.

I would agree that i need to fix “that”. The question is how?
I am still unsure if the below is the right way.

user@host:~$ sudo repository-dist --enable --repository stable
[sudo] password for user:         
INFO '/usr/bin/repository-dist': Using distribution 'bullseye' (version of derivative) as apt repository.
INFO '/usr/bin/repository-dist': Creating '/etc/apt/sources.list.d/derivative.list'...
## Copyright (C) 2012 - 2022 ENCRYPTED SUPPORT LP <adrelanos@whonix.org>
## See the file COPYING for copying conditions.

## /etc/apt/sources.list.d/derivative.list

## This file has been automatically created by repository-dist.
## If you make manual changes to it, your changes get lost next time you run
## the repository-dist tool.
## You can conveniently manage this file, using the repository-dist tool.
## For any modifications (delete this file, use stable version, use testers
## version or use developers version), please use the repository-dist tool.
## Run:
##    sudo repository-dist
## Leaving source line disabled by default to save some time, it's not useful
## anyway, since it's better to get the source code from the git repository.

deb [signed-by=/usr/share/keyrings/derivative.asc] tor+https://deb.kicksecure.com bullseye main contrib non-free
#deb-src [signed-by=/usr/share/keyrings/derivative.asc] tor+https://deb.kicksecure.com bullseye main contrib non-free

deb [signed-by=/usr/share/keyrings/derivative.asc] tor+https://deb.whonix.org bullseye main contrib non-free
#deb-src [signed-by=/usr/share/keyrings/derivative.asc] tor+https://deb.whonix.org bullseye main contrib non-free

INFO '/usr/bin/repository-dist': Done.
user@host:~$ 

The above leads me to:

If the below is not sufficient could you tell me, how i could provide you with the necessary logs?

#####################################################################
## INFO: END  : setup-wizard-dist postinst configure' '3:7.8-1
#####################################################################
'
+ exit 0
Setting up whonix-shared-default-applications-gui (3:23.8-1) ...
Processing triggers for sgml-base (1.31) ...
Setting up polkitd (122-3) ...
Creating group 'polkitd' with GID 998.
Creating user 'polkitd' (polkit) with UID 998 and GID 998.
invoke-rc.d: policy-rc.d denied execution of reload.
Setting up policykit-1-gnome (0.105-8) ...
Setting up pkexec (122-3) ...
Setting up gdm3 (43.0-3) ...
Installing new version of config file /etc/gdm3/Init/Default ...
Installing new version of config file /etc/gdm3/Xsession ...

Configuration file '/etc/gdm3/daemon.conf.dist-orig', does not exist on system.
Installing new config file as you requested.

Configuration file '/etc/pam.d/gdm-smartcard-pkcs11-exclusive', does not exist on system.
Installing new config file as you requested.

Configuration file '/etc/pam.d/gdm-smartcard-sssd-exclusive', does not exist on system.
Installing new config file as you requested.

Configuration file '/etc/pam.d/gdm-smartcard-sssd-or-password', does not exist on system.
Installing new config file as you requested.
update-alternatives: using /etc/pam.d/gdm-smartcard-sssd-exclusive to provide /etc/pam.d/gdm-smartcard (gdm-smartcard) in auto mode
Removing obsolete conffile /etc/dbus-1/system.d/gdm.conf ...
invoke-rc.d: policy-rc.d denied execution of reload.
Setting up policykit-1 (122-3) ...
Removing obsolete conffile /etc/pam.d/polkit-1 ...
Removing obsolete conffile /etc/polkit-1/localauthority.conf.d/50-localauthority.conf ...
Removing obsolete conffile /etc/polkit-1/localauthority.conf.d/51-debian-sudo.conf ...
Setting up zulupolkit (6.2.0-1) ...
Setting up kicksecure-desktop-applications-xfce (3:27.4-1) ...
Setting up zulucrypt-gui (6.2.0-1) ...
Errors were encountered while processing:
 linux-image-6.1.0-13-amd64
 linux-image-amd64
 linux-headers-6.1.0-13-amd64
 linux-headers-amd64
 tirdad-dkms
 tirdad
 non-qubes-vm-enhancements-cli
 non-qubes-whonix-workstation-cli
 non-qubes-whonix-workstation-xfce
 non-qubes-vm-enhancements-gui
E: Sub-process /usr/bin/dpkg returned an error code (1)
+ true 'ERROR: An error was encountered during installation of release upgrade. See above.'
+ exit 1
user@host:~$ 

The log is too short. Don’t cut it.

1 Like

The Upgrade process generates quite a large amount of outputs.
I am also a bit weary of accidentally sending sensitive info.
Rather then increasing the terminal buffer to infinity and sending you tons of logs could you tell me what you are looking for?

The below is the full output with the default terminal buffer.

++ '[' '' = true ']'
++ colors
++ '[' xterm-256color = '' ']'
++ [[ -t 2 ]]
+++ type -t exception_handler_general
++ '[' '' = function ']'
+++ trap -p ERR
++ '[' '' = '' ']'
++ trap error_handler_pre ERR
++ bash -n /usr/libexec/helper-scripts/pre.bsh
++ bash -n /var/lib/dpkg/info/security-misc.postinst
++ own_filename=security-misc.postinst
++ source_config_folder
++ '[' security-misc = '' ']'
++ pre_bsh_settings_folder=security-misc_maint.d
++ shopt -s nullglob
++ local i
++ true 'folder 1: /etc/security-misc_maint.d/*.conf'
++ true 'folder 2: /usr/local/etc/security-misc_maint.d/*.conf'
++ shopt -u nullglob
++ check_scripts_to_skip
++ local skip_script
+ set -e
+ true '
#####################################################################
## INFO: BEGIN: security-misc postinst configure' '3:28.6-1
#####################################################################
'
+ case "$1" in
+ '[' -d /etc/skel/.gnupg ']'
+ chmod 700 /etc/skel/.gnupg
+ glib-compile-schemas /usr/share/glib-2.0/schemas
+ pam-auth-update --package
+ /usr/libexec/security-misc/permission-lockdown
+ command -v update-grub
+ update-grub
Generating grub configuration file ...
Found linux image: /boot/vmlinuz-6.1.0-13-amd64
Found linux image: /boot/vmlinuz-5.10.0-26-amd64
Found initrd image: /boot/initrd.img-5.10.0-26-amd64
Found linux image: /boot/vmlinuz-5.10.0-23-amd64
Found initrd image: /boot/initrd.img-5.10.0-23-amd64
Found linux image: /boot/vmlinuz-4.19.0-9-amd64
Found initrd image: /boot/initrd.img-4.19.0-9-amd64
Found linux image: /boot/vmlinuz-6.1.0-13-amd64
Found linux image: /boot/vmlinuz-5.10.0-26-amd64
Found initrd image: /boot/initrd.img-5.10.0-26-amd64
Found linux image: /boot/vmlinuz-5.10.0-23-amd64
Found initrd image: /boot/initrd.img-5.10.0-23-amd64
Found linux image: /boot/vmlinuz-4.19.0-9-amd64
Found initrd image: /boot/initrd.img-4.19.0-9-amd64
Warning: os-prober will not be executed to detect other bootable partitions.
Systems on them will not be added to the GRUB boot configuration.
Check GRUB_DISABLE_OS_PROBER documentation entry.
done
+ /usr/libexec/security-misc/mmap-rnd-bits
/usr/libexec/security-misc/mmap-rnd-bits: INFO: Successfully written ASLR map config file:
/etc/sysctl.d/30_security-misc_aslr-mmap.conf
+ true 'INFO: debhelper beginning here.'
+ package=security-misc
+ ours=.security-misc
+ theirs=.security-misc-orig
+ '[' configure = configure ']'
+ check_undisplace_unlink /etc/login.defs
+ prefix=/etc/login.defs
+ suffix=
+ file=/etc/login.defs
+ ourfile=/etc/login.defs.security-misc
+ theirfile=/etc/login.defs.security-misc-orig
+ LC_ALL=C
+ dpkg-divert --list security-misc
+ grep -xFq 'diversion of /etc/login.defs to /etc/login.defs.security-misc-orig by security-misc'
+ check_undisplace_unlink /usr/bin/pkexec
+ prefix=/usr/bin/pkexec
+ suffix=
+ file=/usr/bin/pkexec
+ ourfile=/usr/bin/pkexec.security-misc
+ theirfile=/usr/bin/pkexec.security-misc-orig
+ LC_ALL=C
+ dpkg-divert --list security-misc
+ grep -xFq 'diversion of /usr/bin/pkexec to /usr/bin/pkexec.security-misc-orig by security-misc'
+ displace_link /etc/securetty
+ prefix=/etc/securetty
+ suffix=
+ file=/etc/securetty
+ ourfile=/etc/securetty.security-misc
+ theirfile=/etc/securetty.security-misc-orig
+ displace_link_divert /etc/securetty /etc/securetty.security-misc /etc/securetty.security-misc-orig
+ file=/etc/securetty
+ ourfile=/etc/securetty.security-misc
+ theirfile=/etc/securetty.security-misc-orig
+ LC_ALL=C
+ dpkg-divert --list security-misc
+ grep -xFq 'diversion of /etc/securetty to /etc/securetty.security-misc-orig by security-misc'
+ displace_link_symlink /etc/securetty /etc/securetty.security-misc /etc/securetty.security-misc-orig
+ file=/etc/securetty
+ ourfile=/etc/securetty.security-misc
+ theirfile=/etc/securetty.security-misc-orig
+ '[' '!' -L /etc/securetty ']'
+ '[' '!' -L /etc/securetty ']'
++ readlink /etc/securetty
++ basename /etc/securetty.security-misc
++ readlink /etc/securetty
++ basename /etc/securetty.security-misc-orig
+ '[' securetty.security-misc '!=' securetty.security-misc -a securetty.security-misc '!=' securetty.security-misc-orig ']'
+ displace_link /etc/security/faillock.conf
+ prefix=/etc/security/faillock.conf
+ suffix=
+ file=/etc/security/faillock.conf
+ ourfile=/etc/security/faillock.conf.security-misc
+ theirfile=/etc/security/faillock.conf.security-misc-orig
+ displace_link_divert /etc/security/faillock.conf /etc/security/faillock.conf.security-misc /etc/security/faillock.conf.security-misc-orig
+ file=/etc/security/faillock.conf
+ ourfile=/etc/security/faillock.conf.security-misc
+ theirfile=/etc/security/faillock.conf.security-misc-orig
+ LC_ALL=C
+ dpkg-divert --list security-misc
+ grep -xFq 'diversion of /etc/security/faillock.conf to /etc/security/faillock.conf.security-misc-orig by security-misc'
+ displace_link_symlink /etc/security/faillock.conf /etc/security/faillock.conf.security-misc /etc/security/faillock.conf.security-misc-orig
+ file=/etc/security/faillock.conf
+ ourfile=/etc/security/faillock.conf.security-misc
+ theirfile=/etc/security/faillock.conf.security-misc-orig
+ '[' '!' -L /etc/security/faillock.conf ']'
+ '[' '!' -L /etc/security/faillock.conf ']'
++ readlink /etc/security/faillock.conf
++ basename /etc/security/faillock.conf.security-misc
++ readlink /etc/security/faillock.conf
++ basename /etc/security/faillock.conf.security-misc-orig
+ '[' faillock.conf.security-misc '!=' faillock.conf.security-misc -a faillock.conf.security-misc '!=' faillock.conf.security-misc-orig ']'
+ displace_link /etc/dkms/framework.conf
+ prefix=/etc/dkms/framework.conf
+ suffix=
+ file=/etc/dkms/framework.conf
+ ourfile=/etc/dkms/framework.conf.security-misc
+ theirfile=/etc/dkms/framework.conf.security-misc-orig
+ displace_link_divert /etc/dkms/framework.conf /etc/dkms/framework.conf.security-misc /etc/dkms/framework.conf.security-misc-orig
+ file=/etc/dkms/framework.conf
+ ourfile=/etc/dkms/framework.conf.security-misc
+ theirfile=/etc/dkms/framework.conf.security-misc-orig
+ LC_ALL=C
+ dpkg-divert --list security-misc
+ grep -xFq 'diversion of /etc/dkms/framework.conf to /etc/dkms/framework.conf.security-misc-orig by security-misc'
+ displace_link_symlink /etc/dkms/framework.conf /etc/dkms/framework.conf.security-misc /etc/dkms/framework.conf.security-misc-orig
+ file=/etc/dkms/framework.conf
+ ourfile=/etc/dkms/framework.conf.security-misc
+ theirfile=/etc/dkms/framework.conf.security-misc-orig
+ '[' '!' -L /etc/dkms/framework.conf ']'
+ '[' '!' -L /etc/dkms/framework.conf ']'
++ readlink /etc/dkms/framework.conf
++ basename /etc/dkms/framework.conf.security-misc
++ readlink /etc/dkms/framework.conf
++ basename /etc/dkms/framework.conf.security-misc-orig
+ '[' framework.conf.security-misc '!=' framework.conf.security-misc -a framework.conf.security-misc '!=' framework.conf.security-misc-orig ']'
+ dpkg-maintscript-helper rm_conffile /etc/sudoers.d/umask-security-misc -- configure 3:28.6-1
+ dpkg-maintscript-helper rm_conffile /etc/default/grub.d/40_only_allow_signed_modules.cfg -- configure 3:28.6-1
+ dpkg-maintscript-helper rm_conffile /etc/sysctl.d/sysrq.conf -- configure 3:28.6-1
+ dpkg-maintscript-helper rm_conffile /etc/apparmor.d/usr.lib.security-misc.pam_tally2-info -- configure 3:28.6-1
+ dpkg-maintscript-helper rm_conffile /etc/apparmor.d/usr.lib.security-misc.permission-lockdown -- configure 3:28.6-1
+ dpkg-maintscript-helper rm_conffile /etc/sysctl.d/fs_protected.conf -- configure 3:28.6-1
+ dpkg-maintscript-helper rm_conffile /etc/sysctl.d/kptr_restrict.conf -- configure 3:28.6-1
+ dpkg-maintscript-helper rm_conffile /etc/sysctl.d/suid_dumpable.conf -- configure 3:28.6-1
+ dpkg-maintscript-helper rm_conffile /etc/sysctl.d/harden_bpf.conf -- configure 3:28.6-1
+ dpkg-maintscript-helper rm_conffile /etc/sysctl.d/ptrace_scope.conf -- configure 3:28.6-1
+ dpkg-maintscript-helper rm_conffile /etc/sysctl.d/tcp_timestamps.conf -- configure 3:28.6-1
+ dpkg-maintscript-helper rm_conffile /etc/sysctl.d/mmap_aslr.conf -- configure 3:28.6-1
+ dpkg-maintscript-helper rm_conffile /etc/sysctl.d/dmesg_restrict.conf -- configure 3:28.6-1
+ dpkg-maintscript-helper rm_conffile /etc/sysctl.d/coredumps.conf -- configure 3:28.6-1
+ dpkg-maintscript-helper rm_conffile /etc/sysctl.d/kexec.conf -- configure 3:28.6-1
+ dpkg-maintscript-helper rm_conffile /etc/sysctl.d/tcp_hardening.conf -- configure 3:28.6-1
+ dpkg-maintscript-helper rm_conffile /etc/sysctl.d/tcp_sack.conf -- configure 3:28.6-1
+ dpkg-maintscript-helper rm_conffile /etc/modprobe.d/uncommon-network-protocols.conf -- configure 3:28.6-1
+ dpkg-maintscript-helper rm_conffile /etc/modprobe.d/blacklist-bluetooth.conf -- configure 3:28.6-1
+ dpkg-maintscript-helper rm_conffile /etc/modprobe.d/vivid.conf -- configure 3:28.6-1
+ dpkg-maintscript-helper rm_conffile /etc/modprobe.d/blacklist-dma.conf -- configure 3:28.6-1
+ dpkg-maintscript-helper rm_conffile /etc/modprobe.d/msr.conf -- configure 3:28.6-1
+ dpkg-maintscript-helper rm_conffile /etc/modprobe.d/30_nf_conntrack_helper_disable.conf -- configure 3:28.6-1
+ dpkg-maintscript-helper rm_conffile /etc/security/limits.d/disable-coredumps.conf -- configure 3:28.6-1
+ dpkg-maintscript-helper rm_conffile /etc/default/grub.d/40_cold_boot_attack_defense.cfg -- configure 3:28.6-1
+ '[' configure = configure ']'
+ deb-systemd-helper unmask hide-hardware-info.service
+ deb-systemd-helper --quiet was-enabled hide-hardware-info.service
+ deb-systemd-helper update-state hide-hardware-info.service
+ '[' configure = configure ']'
+ deb-systemd-helper unmask permission-hardening.service
+ deb-systemd-helper --quiet was-enabled permission-hardening.service
+ deb-systemd-helper update-state permission-hardening.service
+ '[' configure = configure ']'
+ deb-systemd-helper unmask proc-hidepid.service
+ deb-systemd-helper --quiet was-enabled proc-hidepid.service
+ deb-systemd-helper enable proc-hidepid.service
+ '[' configure = configure ']'
+ deb-systemd-helper unmask remount-secure.service
+ deb-systemd-helper --quiet was-enabled remount-secure.service
+ deb-systemd-helper update-state remount-secure.service
+ '[' configure = configure ']'
+ deb-systemd-helper unmask remove-system-map.service
+ deb-systemd-helper --quiet was-enabled remove-system-map.service
+ deb-systemd-helper enable remove-system-map.service
+ '[' configure = configure ']'
+ '[' -d /run/systemd/system ']'
+ systemctl --system daemon-reload
+ '[' -n 3:28.6-1 ']'
+ _dh_action=restart
+ deb-systemd-invoke restart hide-hardware-info.service permission-hardening.service proc-hidepid.service remount-secure.service remove-system-map.service
/usr/sbin/policy-rc.d returned 101, not running 'restart hide-hardware-info.service permission-hardening.service proc-hidepid.service remount-secure.service remove-system-map.service'
+ true 'INFO: Done with debhelper.'
+ true '
#####################################################################
## INFO: END  : security-misc postinst configure' '3:28.6-1
#####################################################################
'
+ exit 0
Setting up apparmor-utils (3.0.8-3) ...

Configuration file '/etc/apparmor/easyprof.conf', does not exist on system.
Installing new config file as you requested.
Installing new version of config file /etc/apparmor/logprof.conf ...
Installing new version of config file /etc/apparmor/severity.db ...
Setting up libgeocode-glib-2-0:amd64 (3.26.3-6) ...
dpkg: dependency problems prevent configuration of non-qubes-whonix-workstation-cli:
 non-qubes-whonix-workstation-cli depends on non-qubes-vm-enhancements-cli; however:
  Package non-qubes-vm-enhancements-cli is not configured yet.

dpkg: error processing package non-qubes-whonix-workstation-cli (--configure):
 dependency problems - leaving unconfigured
Setting up desktop-config-dist-dependencies (3:8.7-1) ...
dpkg: dependency problems prevent configuration of non-qubes-whonix-workstation-xfce:
 non-qubes-whonix-workstation-xfce depends on non-qubes-whonix-workstation-cli; however:
  Package non-qubes-whonix-workstation-cli is not configured yet.

dpkg: error processing package non-qubes-whonix-workstation-xfce (--configure):
 dependency problems - leaving unconfigured
Setting up gir1.2-soup-3.0:amd64 (3.2.2-2) ...
Setting up gir1.2-handy-1:amd64 (1.8.1-1) ...
Setting up whonix-firewall (3:13.1-1) ...
Installing new version of config file /etc/apparmor.d/abstractions/whonix-firewall ...
Installing new version of config file /etc/apparmor.d/whonix-firewall ...
Installing new version of config file /etc/whonix_firewall.d/30_whonix_gateway_default.conf ...
Installing new version of config file /etc/whonix_firewall.d/30_whonix_host_default.conf ...
Installing new version of config file /etc/whonix_firewall.d/30_whonix_workstation_default.conf ...
++ '[' '' = true ']'
++ colors
++ '[' xterm-256color = '' ']'
++ [[ -t 2 ]]
+++ type -t exception_handler_general
++ '[' '' = function ']'
+++ trap -p ERR
++ '[' '' = '' ']'
++ trap error_handler_pre ERR
++ bash -n /usr/libexec/helper-scripts/pre.bsh
++ bash -n /var/lib/dpkg/info/whonix-firewall.postinst
++ own_filename=whonix-firewall.postinst
++ source_config_folder
++ '[' whonix-firewall = '' ']'
++ pre_bsh_settings_folder=whonix-firewall_maint.d
++ shopt -s nullglob
++ local i
++ true 'folder 1: /etc/whonix-firewall_maint.d/*.conf'
++ true 'folder 2: /usr/local/etc/whonix-firewall_maint.d/*.conf'
++ shopt -u nullglob
++ check_scripts_to_skip
++ local skip_script
+ set -e
+ true '
#####################################################################
## INFO: BEGIN: whonix-firewall postinst configure' '3:11.5-1
#####################################################################
'
+ case "$1" in
+ true 'INFO: Configuring whonix-firewall...'
+ user_account_list='clearnet tunnel notunnel systemcheck sdwdate updatesproxycheck'
+ for user_account in $user_account_list
+ adduser --home /run/clearnet --no-create-home --quiet --system --group --shell /bin/false clearnet
+ for user_account in $user_account_list
+ adduser --home /run/tunnel --no-create-home --quiet --system --group --shell /bin/false tunnel
+ for user_account in $user_account_list
+ adduser --home /run/notunnel --no-create-home --quiet --system --group --shell /bin/false notunnel
+ for user_account in $user_account_list
+ adduser --home /run/systemcheck --no-create-home --quiet --system --group --shell /bin/false systemcheck
+ for user_account in $user_account_list
+ adduser --home /run/sdwdate --no-create-home --quiet --system --group --shell /bin/false sdwdate
+ for user_account in $user_account_list
+ adduser --home /run/updatesproxycheck --no-create-home --quiet --system --group --shell /bin/false updatesproxycheck
+ '[' '!' -f /etc/whonix_firewall.d/50_user.conf ']'
+ true 'INFO: End configuring whonix-firewall.'
+ true 'INFO: debhelper beginning here.'
+ '[' configure = configure ']'
+ APP_PROFILE=/etc/apparmor.d/whonix-firewall
+ '[' -f /etc/apparmor.d/whonix-firewall ']'
+ LOCAL_APP_PROFILE=/etc/apparmor.d/local/whonix-firewall
+ test -e /etc/apparmor.d/local/whonix-firewall
+ aa-enabled --quiet
+ apparmor_parser -r -T -W /etc/apparmor.d/whonix-firewall
+ dpkg-maintscript-helper rm_conffile /etc/whonix_firewall.d/30_default -- configure 3:11.5-1
+ dpkg-maintscript-helper rm_conffile /etc/network/if-pre-up.d/30_whonix_firewall -- configure 3:11.5-1
+ dpkg-maintscript-helper rm_conffile /etc/whonix_firewall.d/30_default.conf -- configure 3:11.5-1
+ '[' configure = configure ']'
+ deb-systemd-helper unmask whonix-firewall-restarter.service
+ deb-systemd-helper --quiet was-enabled whonix-firewall-restarter.service
+ deb-systemd-helper enable whonix-firewall-restarter.service
+ '[' configure = configure ']'
+ deb-systemd-helper unmask whonix-firewall.service
+ deb-systemd-helper --quiet was-enabled whonix-firewall.service
+ deb-systemd-helper enable whonix-firewall.service
+ '[' configure = configure ']'
+ '[' -d /run/systemd/system ']'
+ systemctl --system daemon-reload
+ '[' -n 3:11.5-1 ']'
+ _dh_action=restart
+ deb-systemd-invoke restart whonix-firewall-restarter.service whonix-firewall.service
/usr/sbin/policy-rc.d returned 101, not running 'restart whonix-firewall-restarter.service whonix-firewall.service'
+ true 'INFO: Done with debhelper.'
+ true '
#####################################################################
## INFO: END  : whonix-firewall postinst configure' '3:11.5-1
#####################################################################
'
+ exit 0
Setting up exo-utils (4.18.0-1) ...
Setting up python3-pythran (0.11.0+ds-7) ...
Setting up vlc-plugin-qt:amd64 (3.0.20-0+deb12u1) ...
Setting up xfce4-panel (4.18.2-1) ...
Installing new version of config file /etc/xdg/xfce4/panel/default.xml ...
Setting up python3-txaio (21.2.1-2) ...
Setting up mousepad (0.5.10-2) ...
Setting up ipython3 (8.5.0-4) ...
Setting up python3-autobahn (22.7.1+dfsg1-2) ...
Setting up xfce4-settings (4.18.2-1) ...
Installing new version of config file /etc/xdg/autostart/xfsettingsd.desktop ...
Installing new version of config file /etc/xdg/xfce4/xfconf/xfce-perchannel-xml/xsettings.xml ...
Setting up libedataserver-1.2-27:amd64 (3.46.4-2) ...
Setting up mate-notification-daemon (1.26.0-1+deb12u1) ...
Setting up libsoup-gnome2.4-1:amd64 (2.74.3-1) ...
Setting up vlc (3.0.20-0+deb12u1) ...
Setting up libkf5windowsystem5:amd64 (5.103.0-1) ...
Setting up xfce4-terminal (1.0.4-1) ...
Setting up anon-ws-disable-stacked-tor (3:8.0-1) ...
Installing new version of config file /etc/X11/Xsession.d/20torbrowser ...
Installing new version of config file /etc/anon-ws-disable-stacked-tor.d/30_anon-dist.conf ...
Installing new version of config file /etc/profile.d/20_torbrowser.sh ...
Installing new version of config file /etc/rsyslog.d/anon-ws-disable-stacked-tor.conf ...
++ '[' '' = true ']'
++ colors
++ '[' xterm-256color = '' ']'
++ [[ -t 2 ]]
+++ type -t exception_handler_general
++ '[' '' = function ']'
+++ trap -p ERR
++ '[' '' = '' ']'
++ trap error_handler_pre ERR
++ bash -n /usr/libexec/helper-scripts/pre.bsh
++ bash -n /var/lib/dpkg/info/anon-ws-disable-stacked-tor.postinst
++ own_filename=anon-ws-disable-stacked-tor.postinst
++ source_config_folder
++ '[' anon-ws-disable-stacked-tor = '' ']'
++ pre_bsh_settings_folder=anon-ws-disable-stacked-tor_maint.d
++ shopt -s nullglob
++ local i
++ true 'folder 1: /etc/anon-ws-disable-stacked-tor_maint.d/*.conf'
++ true 'folder 2: /usr/local/etc/anon-ws-disable-stacked-tor_maint.d/*.conf'
++ shopt -u nullglob
++ check_scripts_to_skip
++ local skip_script
+ set -e
+ true '
#####################################################################
## INFO: BEGIN: anon-ws-disable-stacked-tor postinst configure' '3:7.1-1
#####################################################################
'
+ case "$1" in
+ true 'INFO: Configuring anon-ws-disable-stacked-tor...'
+ configure_function
+ adduser --quiet --system --disabled-password --home /var/lib/tor --no-create-home --shell /bin/false --group debian-tor
+ addgroup --quiet debian-tor
+ true
+ adduser --quiet user debian-tor
+ true 'INFO: End configuring anon-ws-disable-stacked-tor.'
+ '[' -d /run/systemd/system ']'
+ systemd-tmpfiles --create /usr/lib/tmpfiles.d/anon-ws-disable-stacked-tor.conf
+ true 'INFO: debhelper beginning here.'
+ '[' configure = configure ']'
++ command -v systemd-tmpfiles
+ '[' -x /usr/bin/systemd-tmpfiles ']'
+ systemd-tmpfiles --create anon-ws-disable-stacked-tor.conf
+ package=anon-ws-disable-stacked-tor
+ ours=.anondist
+ theirs=.anondist-orig
+ '[' configure = configure ']'
+ check_undisplace_unlink /etc/init.d/tor
+ prefix=/etc/init.d/tor
+ suffix=
+ file=/etc/init.d/tor
+ ourfile=/etc/init.d/tor.anondist
+ theirfile=/etc/init.d/tor.anondist-orig
+ LC_ALL=C
+ dpkg-divert --list anon-ws-disable-stacked-tor
+ grep -xFq 'diversion of /etc/init.d/tor to /etc/init.d/tor.anondist-orig by anon-ws-disable-stacked-tor'
+ check_undisplace_unlink /etc/rinetd.conf
+ prefix=/etc/rinetd.conf
+ suffix=
+ file=/etc/rinetd.conf
+ ourfile=/etc/rinetd.conf.anondist
+ theirfile=/etc/rinetd.conf.anondist-orig
+ LC_ALL=C
+ dpkg-divert --list anon-ws-disable-stacked-tor
+ grep -xFq 'diversion of /etc/rinetd.conf to /etc/rinetd.conf.anondist-orig by anon-ws-disable-stacked-tor'
+ check_undisplace_unhide /etc/init.d/tor /usr/share/anon-ws-disable-stacked-tor/etc++init.d++tor
+ file=/etc/init.d/tor
+ hiddenfile=/usr/share/anon-ws-disable-stacked-tor/etc++init.d++tor
+ LC_ALL=C
+ dpkg-divert --list anon-ws-disable-stacked-tor
+ grep -xFq 'diversion of /etc/init.d/tor to /usr/share/anon-ws-disable-stacked-tor/etc++init.d++tor by anon-ws-disable-stacked-tor'
+ displace_link /etc/default/tor
+ prefix=/etc/default/tor
+ suffix=
+ file=/etc/default/tor
+ ourfile=/etc/default/tor.anondist
+ theirfile=/etc/default/tor.anondist-orig
+ displace_link_divert /etc/default/tor /etc/default/tor.anondist /etc/default/tor.anondist-orig
+ file=/etc/default/tor
+ ourfile=/etc/default/tor.anondist
+ theirfile=/etc/default/tor.anondist-orig
+ LC_ALL=C
+ dpkg-divert --list anon-ws-disable-stacked-tor
+ grep -xFq 'diversion of /etc/default/tor to /etc/default/tor.anondist-orig by anon-ws-disable-stacked-tor'
+ displace_link_symlink /etc/default/tor /etc/default/tor.anondist /etc/default/tor.anondist-orig
+ file=/etc/default/tor
+ ourfile=/etc/default/tor.anondist
+ theirfile=/etc/default/tor.anondist-orig
+ '[' '!' -L /etc/default/tor ']'
+ '[' '!' -L /etc/default/tor ']'
++ readlink /etc/default/tor
++ basename /etc/default/tor.anondist
++ readlink /etc/default/tor
++ basename /etc/default/tor.anondist-orig
+ '[' tor.anondist '!=' tor.anondist -a tor.anondist '!=' tor.anondist-orig ']'
+ displace_link /usr/bin/tor
+ prefix=/usr/bin/tor
+ suffix=
+ file=/usr/bin/tor
+ ourfile=/usr/bin/tor.anondist
+ theirfile=/usr/bin/tor.anondist-orig
+ displace_link_divert /usr/bin/tor /usr/bin/tor.anondist /usr/bin/tor.anondist-orig
+ file=/usr/bin/tor
+ ourfile=/usr/bin/tor.anondist
+ theirfile=/usr/bin/tor.anondist-orig
+ LC_ALL=C
+ dpkg-divert --list anon-ws-disable-stacked-tor
+ grep -xFq 'diversion of /usr/bin/tor to /usr/bin/tor.anondist-orig by anon-ws-disable-stacked-tor'
+ displace_link_symlink /usr/bin/tor /usr/bin/tor.anondist /usr/bin/tor.anondist-orig
+ file=/usr/bin/tor
+ ourfile=/usr/bin/tor.anondist
+ theirfile=/usr/bin/tor.anondist-orig
+ '[' '!' -L /usr/bin/tor ']'
+ '[' '!' -L /usr/bin/tor ']'
++ readlink /usr/bin/tor
++ basename /usr/bin/tor.anondist
++ readlink /usr/bin/tor
++ basename /usr/bin/tor.anondist-orig
+ '[' tor.anondist '!=' tor.anondist -a tor.anondist '!=' tor.anondist-orig ']'
+ displace_link /usr/sbin/tor
+ prefix=/usr/sbin/tor
+ suffix=
+ file=/usr/sbin/tor
+ ourfile=/usr/sbin/tor.anondist
+ theirfile=/usr/sbin/tor.anondist-orig
+ displace_link_divert /usr/sbin/tor /usr/sbin/tor.anondist /usr/sbin/tor.anondist-orig
+ file=/usr/sbin/tor
+ ourfile=/usr/sbin/tor.anondist
+ theirfile=/usr/sbin/tor.anondist-orig
+ LC_ALL=C
+ dpkg-divert --list anon-ws-disable-stacked-tor
+ grep -xFq 'diversion of /usr/sbin/tor to /usr/sbin/tor.anondist-orig by anon-ws-disable-stacked-tor'
+ displace_link_symlink /usr/sbin/tor /usr/sbin/tor.anondist /usr/sbin/tor.anondist-orig
+ file=/usr/sbin/tor
+ ourfile=/usr/sbin/tor.anondist
+ theirfile=/usr/sbin/tor.anondist-orig
+ '[' '!' -L /usr/sbin/tor ']'
+ '[' '!' -L /usr/sbin/tor ']'
++ readlink /usr/sbin/tor
++ basename /usr/sbin/tor.anondist
++ readlink /usr/sbin/tor
++ basename /usr/sbin/tor.anondist-orig
+ '[' tor.anondist '!=' tor.anondist -a tor.anondist '!=' tor.anondist-orig ']'
+ dpkg-maintscript-helper rm_conffile /etc/systemd/system/tor.service.d/20_anon_ws_disable_stacked_tor.conf -- configure 3:7.1-1
+ dpkg-maintscript-helper rm_conffile /etc/rinetd.conf.anondist -- configure 3:7.1-1
+ dpkg-maintscript-helper rm_conffile /etc/init.d/tor.anondist -- configure 3:7.1-1
+ '[' configure = configure ']'
+ deb-systemd-helper unmask anon-ws-disable-stacked-tor.service
+ deb-systemd-helper --quiet was-enabled anon-ws-disable-stacked-tor.service
+ deb-systemd-helper enable anon-ws-disable-stacked-tor.service
+ '[' configure = configure ']'
+ deb-systemd-helper unmask anon-ws-disable-stacked-tor_autogen__run_anon-ws-disable-stacked-tor_127.0.0.1_9050.sock.socket
+ deb-systemd-helper --quiet was-enabled anon-ws-disable-stacked-tor_autogen__run_anon-ws-disable-stacked-tor_127.0.0.1_9050.sock.socket
+ deb-systemd-helper enable anon-ws-disable-stacked-tor_autogen__run_anon-ws-disable-stacked-tor_127.0.0.1_9050.sock.socket
+ '[' configure = configure ']'
+ deb-systemd-helper unmask anon-ws-disable-stacked-tor_autogen__run_anon-ws-disable-stacked-tor_127.0.0.1_9051.sock.socket
+ deb-systemd-helper --quiet was-enabled anon-ws-disable-stacked-tor_autogen__run_anon-ws-disable-stacked-tor_127.0.0.1_9051.sock.socket
+ deb-systemd-helper enable anon-ws-disable-stacked-tor_autogen__run_anon-ws-disable-stacked-tor_127.0.0.1_9051.sock.socket
+ '[' configure = configure ']'
+ deb-systemd-helper unmask anon-ws-disable-stacked-tor_autogen__run_anon-ws-disable-stacked-tor_127.0.0.1_9150.sock.socket
+ deb-systemd-helper --quiet was-enabled anon-ws-disable-stacked-tor_autogen__run_anon-ws-disable-stacked-tor_127.0.0.1_9150.sock.socket
+ deb-systemd-helper enable anon-ws-disable-stacked-tor_autogen__run_anon-ws-disable-stacked-tor_127.0.0.1_9150.sock.socket
+ '[' configure = configure ']'
+ deb-systemd-helper unmask anon-ws-disable-stacked-tor_autogen__run_anon-ws-disable-stacked-tor_127.0.0.1_9151.sock.socket
+ deb-systemd-helper --quiet was-enabled anon-ws-disable-stacked-tor_autogen__run_anon-ws-disable-stacked-tor_127.0.0.1_9151.sock.socket
+ deb-systemd-helper enable anon-ws-disable-stacked-tor_autogen__run_anon-ws-disable-stacked-tor_127.0.0.1_9151.sock.socket
+ '[' configure = configure ']'
+ deb-systemd-helper unmask anon-ws-disable-stacked-tor_autogen__run_tor_control.socket
+ deb-systemd-helper --quiet was-enabled anon-ws-disable-stacked-tor_autogen__run_tor_control.socket
+ deb-systemd-helper enable anon-ws-disable-stacked-tor_autogen__run_tor_control.socket
+ '[' configure = configure ']'
+ deb-systemd-helper unmask anon-ws-disable-stacked-tor_autogen__run_tor_socks.socket
+ deb-systemd-helper --quiet was-enabled anon-ws-disable-stacked-tor_autogen__run_tor_socks.socket
+ deb-systemd-helper enable anon-ws-disable-stacked-tor_autogen__run_tor_socks.socket
+ '[' configure = configure ']'
+ deb-systemd-helper unmask anon-ws-disable-stacked-tor_autogen_port_9050.socket
+ deb-systemd-helper --quiet was-enabled anon-ws-disable-stacked-tor_autogen_port_9050.socket
+ deb-systemd-helper enable anon-ws-disable-stacked-tor_autogen_port_9050.socket
+ '[' configure = configure ']'
+ deb-systemd-helper unmask anon-ws-disable-stacked-tor_autogen_port_9051.socket
+ deb-systemd-helper --quiet was-enabled anon-ws-disable-stacked-tor_autogen_port_9051.socket
+ deb-systemd-helper enable anon-ws-disable-stacked-tor_autogen_port_9051.socket
+ '[' configure = configure ']'
+ deb-systemd-helper unmask anon-ws-disable-stacked-tor_autogen_port_9102.socket
+ deb-systemd-helper --quiet was-enabled anon-ws-disable-stacked-tor_autogen_port_9102.socket
+ deb-systemd-helper enable anon-ws-disable-stacked-tor_autogen_port_9102.socket
+ '[' configure = configure ']'
+ deb-systemd-helper unmask anon-ws-disable-stacked-tor_autogen_port_9150.socket
+ deb-systemd-helper --quiet was-enabled anon-ws-disable-stacked-tor_autogen_port_9150.socket
+ deb-systemd-helper enable anon-ws-disable-stacked-tor_autogen_port_9150.socket
+ '[' configure = configure ']'
+ deb-systemd-helper unmask anon-ws-disable-stacked-tor_autogen_port_9151.socket
+ deb-systemd-helper --quiet was-enabled anon-ws-disable-stacked-tor_autogen_port_9151.socket
+ deb-systemd-helper enable anon-ws-disable-stacked-tor_autogen_port_9151.socket
+ '[' configure = configure ']'
+ '[' -d /run/systemd/system ']'
+ systemctl --system daemon-reload
+ '[' -n 3:7.1-1 ']'
+ _dh_action=restart
+ deb-systemd-invoke restart anon-ws-disable-stacked-tor.service anon-ws-disable-stacked-tor_autogen__run_anon-ws-disable-stacked-tor_127.0.0.1_9050.sock.service anon-ws-disable-stacked-tor_autogen__run_anon-ws-disable-stacked-tor_127.0.0.1_9050.sock.socket anon-ws-disable-stacked-tor_autogen__run_anon-ws-disable-stacked-tor_127.0.0.1_9051.sock.service anon-ws-disable-stacked-tor_autogen__run_anon-ws-disable-stacked-tor_127.0.0.1_9051.sock.socket anon-ws-disable-stacked-tor_autogen__run_anon-ws-disable-stacked-tor_127.0.0.1_9150.sock.service anon-ws-disable-stacked-tor_autogen__run_anon-ws-disable-stacked-tor_127.0.0.1_9150.sock.socket anon-ws-disable-stacked-tor_autogen__run_anon-ws-disable-stacked-tor_127.0.0.1_9151.sock.service anon-ws-disable-stacked-tor_autogen__run_anon-ws-disable-stacked-tor_127.0.0.1_9151.sock.socket anon-ws-disable-stacked-tor_autogen__run_tor_control.service anon-ws-disable-stacked-tor_autogen__run_tor_control.socket anon-ws-disable-stacked-tor_autogen__run_tor_socks.service anon-ws-disable-stacked-tor_autogen__run_tor_socks.socket anon-ws-disable-stacked-tor_autogen_port_9050.service anon-ws-disable-stacked-tor_autogen_port_9050.socket anon-ws-disable-stacked-tor_autogen_port_9051.service anon-ws-disable-stacked-tor_autogen_port_9051.socket anon-ws-disable-stacked-tor_autogen_port_9102.service anon-ws-disable-stacked-tor_autogen_port_9102.socket anon-ws-disable-stacked-tor_autogen_port_9150.service anon-ws-disable-stacked-tor_autogen_port_9150.socket anon-ws-disable-stacked-tor_autogen_port_9151.service anon-ws-disable-stacked-tor_autogen_port_9151.socket
/usr/sbin/policy-rc.d returned 101, not running 'restart anon-ws-disable-stacked-tor.service anon-ws-disable-stacked-tor_autogen__run_anon-ws-disable-stacked-tor_127.0.0.1_9050.sock.service anon-ws-disable-stacked-tor_autogen__run_anon-ws-disable-stacked-tor_127.0.0.1_9050.sock.socket anon-ws-disable-stacked-tor_autogen__run_anon-ws-disable-stacked-tor_127.0.0.1_9051.sock.service anon-ws-disable-stacked-tor_autogen__run_anon-ws-disable-stacked-tor_127.0.0.1_9051.sock.socket anon-ws-disable-stacked-tor_autogen__run_anon-ws-disable-stacked-tor_127.0.0.1_9150.sock.service anon-ws-disable-stacked-tor_autogen__run_anon-ws-disable-stacked-tor_127.0.0.1_9150.sock.socket anon-ws-disable-stacked-tor_autogen__run_anon-ws-disable-stacked-tor_127.0.0.1_9151.sock.service anon-ws-disable-stacked-tor_autogen__run_anon-ws-disable-stacked-tor_127.0.0.1_9151.sock.socket anon-ws-disable-stacked-tor_autogen__run_tor_control.service anon-ws-disable-stacked-tor_autogen__run_tor_control.socket anon-ws-disable-stacked-tor_autogen__run_tor_socks.service anon-ws-disable-stacked-tor_autogen__run_tor_socks.socket anon-ws-disable-stacked-tor_autogen_port_9050.service anon-ws-disable-stacked-tor_autogen_port_9050.socket anon-ws-disable-stacked-tor_autogen_port_9051.service anon-ws-disable-stacked-tor_autogen_port_9051.socket anon-ws-disable-stacked-tor_autogen_port_9102.service anon-ws-disable-stacked-tor_autogen_port_9102.socket anon-ws-disable-stacked-tor_autogen_port_9150.service anon-ws-disable-stacked-tor_autogen_port_9150.socket anon-ws-disable-stacked-tor_autogen_port_9151.service anon-ws-disable-stacked-tor_autogen_port_9151.socket'
+ true 'INFO: Done with debhelper.'
+ true '
#####################################################################
## INFO: END  : anon-ws-disable-stacked-tor postinst configure' '3:7.1-1
#####################################################################
'
+ exit 0
Setting up libqt5xdg3:amd64 (3.10.0-2+b2) ...

Configuration file '/etc/xdg/lxqt-qtxdg.conf', does not exist on system.
Installing new config file as you requested.

Configuration file '/etc/xdg/qtxdg.conf', does not exist on system.
Installing new config file as you requested.
Setting up libgdata22:amd64 (0.18.1-2) ...
Setting up python3-pyqt5 (5.15.9+dfsg-1) ...
Setting up libecal-2.0-2:amd64 (3.46.4-2) ...
Setting up libmutter-11-0:amd64 (43.6-1~deb12u1) ...
Setting up whonix-workstation-packages-recommended-cli (3:23.8-1) ...
Setting up libgweather-4-0:amd64 (4.2.0-2) ...
Setting up python3-scipy (1.10.1-2) ...
Setting up gvfs:amd64 (1.50.3-1) ...
Setting up python3-txtorcon (22.0.0-1) ...
Setting up gnome-keyring (42.1-1+b2) ...
Installing new version of config file /etc/xdg/autostart/gnome-keyring-pkcs11.desktop ...
Installing new version of config file /etc/xdg/autostart/gnome-keyring-secrets.desktop ...
Installing new version of config file /etc/xdg/autostart/gnome-keyring-ssh.desktop ...
Created symlink /etc/systemd/user/graphical-session-pre.target.wants/gnome-keyring-daemon.service → /usr/lib/systemd/user/gnome-keyring-daemon.service.
Created symlink /etc/systemd/user/sockets.target.wants/gnome-keyring-daemon.socket → /usr/lib/systemd/user/gnome-keyring-daemon.socket.
Setting up libthunarx-3-0:amd64 (4.18.4-1) ...
Setting up pavucontrol (5.0-2) ...
Setting up xserver-xorg-input-all (1:7.7+23) ...
dpkg: dependency problems prevent configuration of non-qubes-vm-enhancements-gui:
 non-qubes-vm-enhancements-gui depends on non-qubes-vm-enhancements-cli; however:
  Package non-qubes-vm-enhancements-cli is not configured yet.

dpkg: error processing package non-qubes-vm-enhancements-gui (--configure):
 dependency problems - leaving unconfigured
Setting up gnome-settings-daemon (43.0-4) ...
Setting up whonix-workstation-packages-dependencies-pre (3:23.8-1) ...
Setting up libebook-contacts-1.2-4:amd64 (3.46.4-2) ...
Setting up libgupnp-1.6-0:amd64 (1.6.3-1) ...
Setting up gir1.2-adw-1:amd64 (1.2.2-1) ...
Setting up gir1.2-gweather-4.0:amd64 (4.2.0-2) ...
Setting up xfdesktop4 (4.18.1-1) ...
Setting up gir1.2-soup-2.4:amd64 (2.74.3-1) ...
Setting up whonix-shared-packages-dependencies-cli (3:23.8-1) ...
Setting up libgupnp-igd-1.0-4:amd64 (1.2.0-3) ...
Setting up systemcheck (3:28.1-1) ...
Installing new version of config file /etc/apparmor.d/usr.bin.systemcheck ...
Installing new version of config file /etc/apparmor.d/usr.libexec.systemcheck.canary ...
Installing new version of config file /etc/default/systemdcheckd ...
Installing new version of config file /etc/sudoers.d/systemcheck ...
Installing new version of config file /etc/systemcheck.d/30_default.conf ...
Installing new version of config file /etc/xdg/autostart/systemcheck-deprecation-notice.desktop ...
++ '[' '' = true ']'
++ colors
++ '[' xterm-256color = '' ']'
++ [[ -t 2 ]]
+++ type -t exception_handler_general
++ '[' '' = function ']'
+++ trap -p ERR
++ '[' '' = '' ']'
++ trap error_handler_pre ERR
++ bash -n /usr/libexec/helper-scripts/pre.bsh
++ bash -n /var/lib/dpkg/info/systemcheck.postinst
++ own_filename=systemcheck.postinst
++ source_config_folder
++ '[' systemcheck = '' ']'
++ pre_bsh_settings_folder=systemcheck_maint.d
++ shopt -s nullglob
++ local i
++ true 'folder 1: /etc/systemcheck_maint.d/*.conf'
++ true 'folder 2: /usr/local/etc/systemcheck_maint.d/*.conf'
++ shopt -u nullglob
++ check_scripts_to_skip
++ local skip_script
+ set -e
+ true '
#####################################################################
## INFO: BEGIN: systemcheck postinst configure' '3:25.8-1
#####################################################################
'
+ source /usr/libexec/helper-scripts/torsocks-remove-ld-preload
++ : 1
++ : /usr/lib/x86_64-linux-gnu/torsocks/libtorsocks.so
++ '[' 1 = 1 ']'
++ set -x
++ '[' 1 = 1 ']'
++ true 'LD_PRELOAD: /usr/lib/x86_64-linux-gnu/torsocks/libtorsocks.so'
+++ echo /usr/lib/x86_64-linux-gnu/torsocks/libtorsocks.so
+++ sed 's/\/usr\/lib\/torsocks\/libtorsocks.so//g'
++ LD_PRELOAD=/usr/lib/x86_64-linux-gnu/torsocks/libtorsocks.so
++ '[' 1 = 1 ']'
++ true 'exit code: 0'
++ export LD_PRELOAD
++ '[' 1 = 1 ']'
++ true 'exit code: 0'
++ true 'LD_PRELOAD: /usr/lib/x86_64-linux-gnu/torsocks/libtorsocks.so'
+ case "$1" in
+ adduser debian-tor
+ true
+ adduser --home /var/lib/canary --no-create-home --quiet --system --group canary
+ adduser canary debian-tor
adduser: The user `canary' is already a member of `debian-tor'.
+ adduser --home /var/lib/systemcheck --no-create-home --quiet --system --group systemcheck
+ adduser systemcheck debian-tor
adduser: The user `systemcheck' is already a member of `debian-tor'.
+ adduser systemcheck systemd-journal
adduser: The user `systemcheck' is already a member of `systemd-journal'.
+ '[' -d /run/systemd/system ']'
+ systemd-tmpfiles --create /usr/lib/tmpfiles.d/systemcheck.conf
+ true 'INFO: debhelper beginning here.'
+ '[' configure = configure ']'
+ APP_PROFILE=/etc/apparmor.d/usr.bin.systemcheck
+ '[' -f /etc/apparmor.d/usr.bin.systemcheck ']'
+ LOCAL_APP_PROFILE=/etc/apparmor.d/local/usr.bin.systemcheck
+ test -e /etc/apparmor.d/local/usr.bin.systemcheck
+ aa-enabled --quiet
+ apparmor_parser -r -T -W /etc/apparmor.d/usr.bin.systemcheck
+ '[' configure = configure ']'
+ APP_PROFILE=/etc/apparmor.d/usr.libexec.systemcheck.canary
+ '[' -f /etc/apparmor.d/usr.libexec.systemcheck.canary ']'
+ LOCAL_APP_PROFILE=/etc/apparmor.d/local/usr.libexec.systemcheck.canary
+ test -e /etc/apparmor.d/local/usr.libexec.systemcheck.canary
+ aa-enabled --quiet
+ apparmor_parser -r -T -W /etc/apparmor.d/usr.libexec.systemcheck.canary
+ '[' configure = configure ']'
++ command -v systemd-tmpfiles
+ '[' -x /usr/bin/systemd-tmpfiles ']'
+ systemd-tmpfiles --create systemcheck.conf
+ dpkg-maintscript-helper rm_conffile /etc/whonix.d/30_whonixcheck_default -- configure 3:25.8-1
+ dpkg-maintscript-helper rm_conffile /etc/whonix.d/30_whonixcheck_default.conf -- configure 3:25.8-1
+ dpkg-maintscript-helper rm_conffile /etc/systemcheck.d/30_whonixcheck_default.conf -- configure 3:25.8-1
+ dpkg-maintscript-helper rm_conffile /etc/default/whonixcheckd -- configure 3:25.8-1
+ dpkg-maintscript-helper rm_conffile /etc/sudoers.d/whonixcheck -- configure 3:25.8-1
+ dpkg-maintscript-helper rm_conffile /etc/apparmor.d/usr.bin.whonixcheck -- configure 3:25.8-1
+ dpkg-maintscript-helper rm_conffile /etc/apparmor.d/usr.lib.systemcheck.canary -- configure 3:25.8-1
+ '[' configure = configure ']'
+ deb-systemd-helper unmask canary.service
+ deb-systemd-helper --quiet was-enabled canary.service
+ deb-systemd-helper enable canary.service
+ '[' configure = configure ']'
+ '[' -d /run/systemd/system ']'
+ systemctl --system daemon-reload
+ '[' -n 3:25.8-1 ']'
+ _dh_action=restart
+ deb-systemd-invoke restart canary.service
/usr/sbin/policy-rc.d returned 101, not running 'restart canary.service'
+ true 'INFO: Done with debhelper.'
+ deprecation_notice
+ true 'INFO: This version is not yet deprecated.'
+ return 0
+ true '
#####################################################################
## INFO: END  : systemcheck postinst configure' '3:25.8-1
#####################################################################
'
+ exit 0
Setting up thunar (4.18.4-1) ...
Setting up libnice10:amd64 (0.1.21-1) ...
Setting up liblxqt1:amd64 (1.2.0-8) ...
Setting up gir1.2-mutter-11:amd64 (43.6-1~deb12u1) ...
Setting up non-qubes-audio (3:27.4-1) ...
Setting up kicksecure-desktop-environment-essential-gui (3:27.4-1) ...
Setting up xfce4-session (4.18.1-1) ...
Installing new version of config file /etc/X11/Xsession.d/55xfce4-session ...
Installing new version of config file /etc/xdg/autostart/xscreensaver.desktop ...
Setting up libebackend-1.2-11:amd64 (3.46.4-2) ...
Setting up whonix-workstation-packages-dependencies-cli (3:23.8-1) ...
Setting up sdwdate-gui (1:9.0-1) ...
Installing new version of config file /etc/qubes-rpc/whonix.GatewayCommand ...
Installing new version of config file /etc/qubes-rpc/whonix.NewStatus ...
Installing new version of config file /etc/qubes-rpc/whonix.SdwdateStatus ...
Installing new version of config file /etc/sdwdate-gui.d/30_default.conf ...
Installing new version of config file /etc/sudoers.d/sdwdate-gui ...
Installing new version of config file /etc/xdg/autostart/sdwdate-gui.desktop ...
++ '[' '' = true ']'
++ colors
++ '[' xterm-256color = '' ']'
++ [[ -t 2 ]]
+++ type -t exception_handler_general
++ '[' '' = function ']'
+++ trap -p ERR
++ '[' '' = '' ']'
++ trap error_handler_pre ERR
++ bash -n /usr/libexec/helper-scripts/pre.bsh
++ bash -n /var/lib/dpkg/info/sdwdate-gui.postinst
++ own_filename=sdwdate-gui.postinst
++ source_config_folder
++ '[' sdwdate-gui = '' ']'
++ pre_bsh_settings_folder=sdwdate-gui_maint.d
++ shopt -s nullglob
++ local i
++ true 'folder 1: /etc/sdwdate-gui_maint.d/*.conf'
++ true 'folder 2: /usr/local/etc/sdwdate-gui_maint.d/*.conf'
++ shopt -u nullglob
++ check_scripts_to_skip
++ local skip_script
+ set -e
+ true '
#####################################################################
## INFO: BEGIN: sdwdate-gui postinst configure' '1:8.2-1
#####################################################################
'
+ case "$1" in
+ adduser --home /run/sdwdate-gui --quiet --system --group sdwdate-gui
+ usermod -m -d /run/sdwdate-gui sdwdate-gui
usermod: user sdwdate-gui is currently used by process 1131
+ true
+ mkdir -p /run/sdwdate-gui
+ chown sdwdate-gui:sdwdate-gui /run/sdwdate-gui
+ '[' -d /run/systemd/system ']'
+ systemd-tmpfiles --create /usr/lib/tmpfiles.d/sdwdate.conf
+ true 'INFO: debhelper beginning here.'
+ '[' configure = configure ']'
++ command -v systemd-tmpfiles
+ '[' -x /usr/bin/systemd-tmpfiles ']'
+ systemd-tmpfiles --create sdwdate-gui.conf
+ '[' configure = configure ']'
+ deb-systemd-helper unmask sdwdate-gui-shutdown-notify.service
+ deb-systemd-helper --quiet was-enabled sdwdate-gui-shutdown-notify.service
+ deb-systemd-helper enable sdwdate-gui-shutdown-notify.service
+ true 'INFO: Done with debhelper.'
+ true '
#####################################################################
## INFO: END  : sdwdate-gui postinst configure' '1:8.2-1
#####################################################################
'
+ exit 0
Setting up libedata-cal-2.0-2:amd64 (3.46.4-2) ...
Setting up magic-wormhole (0.12.0-1.1) ...
Setting up metadata-cleaner (2.4.0+ds-1) ...
Setting up lxqt-sudo (1.2.0-1) ...
Setting up kicksecure-default-applications-cli (3:27.4-1) ...
Setting up xfce4 (4.18) ...
Setting up kicksecure-desktop-environment-essential-xfce (3:27.4-1) ...
Setting up thunar-volman (4.18.0-1) ...
Setting up libedata-book-1.2-27:amd64 (3.46.4-2) ...
Setting up kicksecure-recommended-cli (3:27.4-1) ...
Setting up thunar-archive-plugin:amd64 (0.5.0-1) ...
Setting up libgstreamer-plugins-bad1.0-0:amd64 (1.22.0-4+deb12u2) ...
Setting up gstreamer1.0-plugins-bad:amd64 (1.22.0-4+deb12u2) ...
Setting up libwebkit2gtk-4.0-37:amd64 (2.42.1-1~deb12u1) ...
Setting up libebook-1.2-21:amd64 (3.46.4-2) ...
Setting up libwebkit2gtk-4.1-0:amd64 (2.42.1-1~deb12u1) ...
Setting up gir1.2-webkit2-4.1:amd64 (2.42.1-1~deb12u1) ...
Setting up repository-dist-wizard (3:9.6-1) ...
Setting up zenity (3.44.0-1) ...
Setting up msgcollector-gui (3:9.5-1) ...
Setting up tb-updater (3:29.9-1) ...
Installing new version of config file /etc/sudoers.d/tpo-downloader ...
++ '[' '' = true ']'
++ colors
++ '[' xterm-256color = '' ']'
++ [[ -t 2 ]]
+++ type -t exception_handler_general
++ '[' '' = function ']'
+++ trap -p ERR
++ '[' '' = '' ']'
++ trap error_handler_pre ERR
++ bash -n /usr/libexec/helper-scripts/pre.bsh
++ bash -n /var/lib/dpkg/info/tb-updater.postinst
++ own_filename=tb-updater.postinst
++ source_config_folder
++ '[' tb-updater = '' ']'
++ pre_bsh_settings_folder=tb-updater_maint.d
++ shopt -s nullglob
++ local i
++ true 'folder 1: /etc/tb-updater_maint.d/*.conf'
++ true 'folder 2: /usr/local/etc/tb-updater_maint.d/*.conf'
++ shopt -u nullglob
++ check_scripts_to_skip
++ local skip_script
+ set -e
+ true '
#####################################################################
## INFO: BEGIN: tb-updater postinst configure' '3:28.9-1
#####################################################################
'
+ true 'INFO: debhelper beginning here.'
+ '[' configure = configure ']'
+ deb-systemd-helper unmask tb-updater-dispvm.service
+ deb-systemd-helper --quiet was-enabled tb-updater-dispvm.service
+ deb-systemd-helper enable tb-updater-dispvm.service
+ '[' configure = configure ']'
+ deb-systemd-helper unmask tb-updater-first-boot.service
+ deb-systemd-helper --quiet was-enabled tb-updater-first-boot.service
+ deb-systemd-helper enable tb-updater-first-boot.service
+ '[' configure = configure ']'
+ '[' -d /run/systemd/system ']'
+ systemctl --system daemon-reload
+ '[' -n 3:28.9-1 ']'
+ _dh_action=restart
+ deb-systemd-invoke restart tb-updater-dispvm.service tb-updater-first-boot.service
/usr/sbin/policy-rc.d returned 101, not running 'restart tb-updater-dispvm.service tb-updater-first-boot.service'
+ true 'INFO: Done with debhelper.'
+ true 'anon_shared_inst_tb: '
+ true 'tb_onion: '
+ true 'tb_disable_anon_ws_dnf_conf: '
+ download
+ mkdir --parents /var/cache/tb-binary
+ ischroot --default-false
+ tool=update-torbrowser
+ update-torbrowser --postinst
INFO: --postinst but outside of Qubes TemplateVM, skipping, ok.
+ true '
#####################################################################
## INFO: END  : tb-updater postinst configure' '3:28.9-1
#####################################################################
'
+ exit 0
Setting up libedataserverui-1.2-4:amd64 (3.46.4-2) ...
Setting up gnome-shell (43.6-1~deb12u2) ...
Setting up whonix-workstation-packages-recommended-gui (3:23.8-1) ...
Setting up evolution-data-server (3.46.4-2) ...
Installing new version of config file /etc/xdg/autostart/org.gnome.Evolution-alarm-notify.desktop ...
Setting up tasksel (3.73) ...
Setting up python3-fonttools (4.38.0-1+b1) ...
Setting up python3-ufolib2 (0.14.0+dfsg1-1) ...
Setting up tasksel-data (3.73) ...
Setting up python3-matplotlib (3.6.3-1+b1) ...
Processing triggers for desktop-file-utils (0.26-1) ...
Processing triggers for hicolor-icon-theme (0.17-2) ...
Processing triggers for libc-bin (2.36-9+deb12u3) ...
Processing triggers for systemd (252.17-1~deb12u1) ...
Processing triggers for debianutils (5.7-0.5~deb12u1) ...
Processing triggers for menu (2.1.49) ...
Setting up setup-dist (3:8.2-1) ...
Installing new version of config file /etc/profile.d/30_setup.sh ...
Installing new version of config file /etc/sudoers.d/setup-dist ...
Setting up kicksecure-dependencies-cli (3:27.4-1) ...
Setting up whonix-shared-packages-recommended-cli (3:23.8-1) ...
Setting up setup-wizard-dist (3:8.9-1) ...
Installing new version of config file /etc/sudoers.d/setup-wizard-dist ...
Installing new version of config file /etc/xdg/autostart/setup-wizard-dist.desktop ...
++ '[' '' = true ']'
++ colors
++ '[' xterm-256color = '' ']'
++ [[ -t 2 ]]
+++ type -t exception_handler_general
++ '[' '' = function ']'
+++ trap -p ERR
++ '[' '' = '' ']'
++ trap error_handler_pre ERR
++ bash -n /usr/libexec/helper-scripts/pre.bsh
++ bash -n /var/lib/dpkg/info/setup-wizard-dist.postinst
++ own_filename=setup-wizard-dist.postinst
++ source_config_folder
++ '[' setup-wizard-dist = '' ']'
++ pre_bsh_settings_folder=setup-wizard-dist_maint.d
++ shopt -s nullglob
++ local i
++ true 'folder 1: /etc/setup-wizard-dist_maint.d/*.conf'
++ true 'folder 2: /usr/local/etc/setup-wizard-dist_maint.d/*.conf'
++ shopt -u nullglob
++ check_scripts_to_skip
++ local skip_script
+ set -e
+ true '
#####################################################################
## INFO: BEGIN: setup-wizard-dist postinst configure' '3:7.8-1
#####################################################################
'
+ case "$1" in
+ true 'INFO: Configuring setup-wizard-dist...'
+ mkdir --parents /var/cache/setup-dist/status-files
+ chmod g+w /var/cache/setup-dist/status-files
+ chmod o+w /var/cache/setup-dist/status-files
+ true 'INFO: End configuring setup-wizard-dist.'
+ true 'INFO: debhelper beginning here.'
+ dpkg-maintscript-helper rm_conffile /etc/sudoers.d/whonix-setup-wizard -- configure 3:7.8-1
+ dpkg-maintscript-helper rm_conffile /etc/xdg/autostart/whonix-setup-wizard.desktop -- configure 3:7.8-1
+ true 'INFO: Done with debhelper.'
+ true '
#####################################################################
## INFO: END  : setup-wizard-dist postinst configure' '3:7.8-1
#####################################################################
'
+ exit 0
Setting up whonix-shared-default-applications-gui (3:23.8-1) ...
Processing triggers for sgml-base (1.31) ...
Setting up polkitd (122-3) ...
Creating group 'polkitd' with GID 998.
Creating user 'polkitd' (polkit) with UID 998 and GID 998.
invoke-rc.d: policy-rc.d denied execution of reload.
Setting up policykit-1-gnome (0.105-8) ...
Setting up pkexec (122-3) ...
Setting up gdm3 (43.0-3) ...
Installing new version of config file /etc/gdm3/Init/Default ...
Installing new version of config file /etc/gdm3/Xsession ...

Configuration file '/etc/gdm3/daemon.conf.dist-orig', does not exist on system.
Installing new config file as you requested.

Configuration file '/etc/pam.d/gdm-smartcard-pkcs11-exclusive', does not exist on system.
Installing new config file as you requested.

Configuration file '/etc/pam.d/gdm-smartcard-sssd-exclusive', does not exist on system.
Installing new config file as you requested.

Configuration file '/etc/pam.d/gdm-smartcard-sssd-or-password', does not exist on system.
Installing new config file as you requested.
update-alternatives: using /etc/pam.d/gdm-smartcard-sssd-exclusive to provide /etc/pam.d/gdm-smartcard (gdm-smartcard) in auto mode
Removing obsolete conffile /etc/dbus-1/system.d/gdm.conf ...
invoke-rc.d: policy-rc.d denied execution of reload.
Setting up policykit-1 (122-3) ...
Removing obsolete conffile /etc/pam.d/polkit-1 ...
Removing obsolete conffile /etc/polkit-1/localauthority.conf.d/50-localauthority.conf ...
Removing obsolete conffile /etc/polkit-1/localauthority.conf.d/51-debian-sudo.conf ...
Setting up zulupolkit (6.2.0-1) ...
Setting up kicksecure-desktop-applications-xfce (3:27.4-1) ...
Setting up zulucrypt-gui (6.2.0-1) ...
Errors were encountered while processing:
 linux-image-6.1.0-13-amd64
 linux-image-amd64
 linux-headers-6.1.0-13-amd64
 linux-headers-amd64
 tirdad-dkms
 tirdad
 non-qubes-vm-enhancements-cli
 non-qubes-whonix-workstation-cli
 non-qubes-whonix-workstation-xfce
 non-qubes-vm-enhancements-gui
E: Sub-process /usr/bin/dpkg returned an error code (1)
+ true 'ERROR: An error was encountered during installation of release upgrade. See above.'
+ exit 1
user@host:~$ 

Try if Broken APT creates a shorter log which is hopefully helpful.

I tried fixing potential issues.
I Found none and there were also no significant logs for it.

I would also find that a bit unusual considering that there are no other indications for it.

Has a release upgrade recently been tested?

What i find a bit unusual and hopefully you can comment on it is; Why is the kicksecure repo needed?

Below the logs for the “broken apt”

user@host:~$ 
sudo apt update
[sudo] password for user:         
Hit:1 tor+https://deb.debian.org/debian bullseye InRelease                     
Get:2 tor+https://deb.whonix.org bullseye InRelease [39.7 kB]                  
Get:3 tor+https://deb.debian.org/debian bullseye-updates InRelease [44.1 kB]   
Get:4 tor+https://deb.debian.org/debian-security bullseye-security InRelease [48.4 kB]
Get:5 tor+https://deb.debian.org/debian bullseye-backports InRelease [49.0 kB] 
Get:6 tor+https://deb.debian.org/debian bullseye-updates/main amd64 Packages.diff/Index [22.9 kB]
Get:7 tor+https://deb.debian.org/debian-security bullseye-security/main amd64 Packages [258 kB]
Get:8 tor+https://deb.debian.org/debian bullseye-updates/main amd64 Packages T-2023-11-13-2005.21-F-2023-11-13-2005.21.pdiff [474 B]
Get:8 tor+https://deb.debian.org/debian bullseye-updates/main amd64 Packages T-2023-11-13-2005.21-F-2023-11-13-2005.21.pdiff [474 B]
Get:9 tor+https://fasttrack.debian.net/debian bullseye-fasttrack InRelease [12.9 kB]
Fetched 475 kB in 2s (190 kB/s)      
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
2 packages can be upgraded. Run 'apt list --upgradable' to see them.
user@host:~$ sudo dpkg --configure -a
user@host:~$ sudo apt install -f
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded.

The log output for sudo apt update shows that

  • the Kicksecure repository has not been enabled.
  • no release upgrade done yet.

The broken APT procedure is useless without previously enabling the Kicksecure repository.

It’s also supposed to be run after the failed release-upgrade. It doesn’t hurt to run it beforehand. Something similar is listed under Sanity Tests on the release upgrade documentation.

Because Whonix is based on Kicksecure. The package repositories have been separated in this release.

No, because this process is only supported for 1 month after a new release has been published and this is several months ago already.

Please try to be pro-active. There’s no need to wait for me to say run:

sudo apt full-upgrade

(With or without -f parameter at the end.)

Updated the broken APT article to include this command just now.

Next suggested steps:

  1. enable the Kicksecure apt repository
  2. release-upgrade
  3. broken APT procedure
1 Like