Long Wiki Edit Thread

torjunkie:

1. Can .onion links be added to all those download pages for VirtualBox etc where people are downloading with Tor Browser?

Right now we have the clearnet address links only e.g.

https://download.whonix.org/linux/13.0.0.1.4/Whonix-Gateway-13.0.0.1.4.ova

Which would change to (?) →

http://download.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/linux/13.0.0.1.4/Whonix-Gateway-13.0.0.1.4.ova

Forcing .onion on Project applies?

Or you mean the hidden by default download table? I don’t mind much
about that one since hidden by default. That can be super complex super
secure.

2. I also note re: VLC →

[SECURITY] [DSA 4203-1] vlc security update

Hans Jerry Illikainen discovered a type conversion vulnerability in the MP4 demuxer of the VLC media player, which could result in the execution of arbitrary code if a malformed media file is played.

This update upgrades VLC in stretch to the new 3.x release series (as security fixes couldn’t be sensibly backported to the 2.x series). In addition two packages needed to be rebuild to ensure compatibility with VLC 3; phonon-backend-vlc (0.9.0-2+deb9u1) and goldencheetah (4.0.0~DEV1607-2+deb9u1).

VLC in jessie cannot be migrated to version 3 due to incompatible library changes with reverse dependencies and is thus now declared end-of-life for jessie. We recommend to upgrade to stretch or pick a different media player if that’s not an option.

Warning required for VLC users in Whonix 13 (Jessie)?

Yes.

For now the wiki should point to this Qubes doc chapter. The claims that are made in our version should be verified ( i.e can use custom firewall rule-sets). Its always possible that I missed something and although custom rules cannot be used with Whonix, they can be used with other VMs.This could make the system vulnerable and is not a chance that should be taken when there is an option that has already passed review. No custom rule-sets but a second non-DispVM firewall-VM can be used. Lets give marmarek whatever time he needs to ensure these instructions are sound.

The edits will be ready for your review later today :wink:

Nitpick @torjunkie:

Symmetric Keys A older method of encryption. One key is used for both
encryption and decryption.

Older implies obsolete? Luks encryption is symmetric. And it works well.
Not outdated / obsolete at all. Symmetric encryption even won’t fall
short against Post-Quantum Cryptography (PQCrypto). So when practical
(not very much when communicating with people you can’t meet in person),
I would even prefer symmetric encryption.

The latter sentence worth pointing out in the wiki? @HulaHoop

2 Likes

Done!

https://www.whonix.org/w/index.php?title=System_Hardening_Checklist&oldid=33815&diff=cur

1 Like

Changing to this makes sense →

Symmetric encryption depends on using a password to encrypt the single key used for both encryption and decryption.

2 Likes

@torjunkie

When you have a free moment could you please unlock the following template for editing. I’ll be sure to complete the edits promptly this time around. :slight_smile:

https://www.whonix.org/wiki/Template:Persistent_Tor_Entry_Guards_Introduction

I also have a questions. In the introduction, for the text that I added bold type, should they be links to the stated instructions?

P.S. Thanks for all the help with this chapter!

1 Like

0brand:

When you have a free moment could you please unlock the following template for editing. I’ll be sure to complete the edits promptly this time around. :slight_smile:

I’ve promoted your account to wiki admin just now so you can do that.

(Doesn’t require remove edit lock then. Can edit right away as admin.)

2 Likes

Tor entry guards edits complete.

https://www.whonix.org/wiki/Template:Persistent_Tor_Entry_Guards_Introduction

https://whonix.org/w/index.php?title=Tor&oldid=33697&diff=cur

2 Likes

Will fix that.

That’s great 0brand, thanks for doing the editing.

Yes, agree links are better.

1 Like

@Patrick

I made few mistakes when editing Tor entry guards.

  • failed to format subheading
  • failed to format a “Info Box” and “Warning”
  • duplicate text
  • did not use the same formatting style throughout page

All have been fixed with the latest proposed edits.

https://whonix.org/w/index.php?title=Tor&oldid=33864&diff=cur

Sorry about that. Won’t happen again.

//cc @torjunkie

1 Like

Trust page → Fixed (and defluffed) :wink:

Outstanding Qs re: this page

  • Verifiable builds. Not currently possible for Whonix I understand. If so, this part needs to change “Some readers might be curious why Whonix is verifiable…” (Whonix is also marked in Red in the table as a “no” for verifiable).
  • The onion link to Tor signing keys is wrong (doesn’t resolve). Does anyone know where signing keys are on the Tor Project .onion these days i.e. tor.xxxxxxxxx.onion/signingkeys?

No problem 0brand - multiple fix-ups are the norm.

One thing you did cut from the edits was the number of bits of info related to exposure of 1, 2 or 3 guards. I think that is still useful to footnote somewhere. Maybe even the fingerprinting or data collection page.

I’ll replace the footnote in entry guards chapter.

Additional fingerprinting content was added to “Tor entry guards”. Maybe add some of that content under a new “Entry Guards” subheading in “fingerprinting” and “Data Collection” chapters.

I’ll get it done!

1 Like

torjunkie:

Trust page → Fixed (and defluffed) :wink:

:slight_smile:

  • Verifiable builds. Not currently possible for Whonix I understand.

Correct.

1 Like

@0brand

An old attack was observed in the wild that exploited a JavaScript vulnerability in Firefox. [11] The observed version of the attack collected the hostname and MAC address of the victims’ computers, and sent that information to a remote web server. This threat is partially mitigated nowadays by the development of a security slider in the Tor Browser Bundle, which prevents the execution of JavaScript code completely with the correct settings.

The real Q is would it have leaked the MAC address and hostname if successfully run in Whonix-Workstation? I gather not for MAC address, yes for generic Whonix-WS hostname, but that needs to be explicitly clarified I think.

Another nit, spacing on the templates that were edited. After bullet points or mboxes, an extra carriage return is usually required so it doesn’t look bunched up.

@Patrick this Whonix History page on the main ToC is severely outdated i.e. doesn’t show versions beyond 0.4.5.

http://kkkkkkkkkk63ava6.onion/wiki/History

Since we are nearly at Whonix 14, I think this should be removed from the main ToC, and simply sit in a link somewhere stating “Users can read more about the early history of Whonix here.”

Either that, or insert descriptions for > 0.4.5 → Whonix 13. Which seems a lot of work for very little benefit.

Another option, we just keep the top “history” section, and put all the version info in a separate “Whonix Version” wiki page, since it is ancient and almost nobody will care / read it anyhow.

2 Likes

In the “Comparison with Others” chapter, it refers to “Qubes OS TorVM” as part of all the comparison.

It is deprecated, see:

Redirecting…

On that basis, recommend we:

  1. Note that; or
  2. Delete all the stuff related to TorVM in the wiki page; or
  3. Send all that info to a deprecated page for posterity, since it’s not a fair comparison if the project is dead. Then I would footnote: “QubesOS TorVM was previously part of this comparison, but it has been deprecated. Interested readers can refer to the historical comparison here [embedded link].”
1 Like

While clean-up & dusting out the Whonix attic is on the cards:

1. The entire page of Dev/Old Changelog should be moved back to the dev backroom where it belongs and moved out of the Whonix Overview section IMO.

It is strictly dev interest only, old and out-of-date for recent developments, badly needs editing, and is probably only read very occasionally.

A leaner, focused ToC page increases readibility and reduces overall complaints e.g. as noticed with various forum topics decreasing in frequency as documentation became clearer or was created to fill a void.

2. There is also a need to manage the size of documentation “chunks” in the most extreme cases. Right now, some of those Tor pages could easily be collapsed into a single page, while the Security etc pages could have a entire section of their own on the main TOC.

The Security Guide in particular has a logical structure to break down into 5 or 6 chunks (pages) e.g. security by platform/VM (host, Whonix-WS, Whonix-GW, Qubes-Whonix) and a couple of other miscellaneous bits (operating system / software package updates, repositories, etc.) that would nicely round out a section on the main TOC, called “Basic Security Guide”.

The same method can be repeated for “Advanced Security Guide”, which is far too long. Now we have a “collapsible” ToC, the impact is negligible, but the improvement will be great.

2 Likes

Please add.

1 Like

Add zerofree → fixed.

TODO reminder:

  • Remove Dev/Old Changelog from ToC
  • Note no leak of MAC address with that Tor Browser attack
  • Split history page from ancient Whonix version info OR link only to History page (TBD) and remove from ToC
  • Full screen fingerprinting issue
  • Guard fingerprint note
  • Minor template nits
  • Add some (more) shit to Email section
  • Clean up the remainder of the Whonix Overview section harshly
  • Cleave Security Guide into chunks
  • Add remainder of Whonix 14 changes to release notes (from link)
  • Merge some Tor pages in Whonix Overview section
  • Finish Whonix Comparison nit edits (I’ll just note Qubes TorVM is deprecated and kept for comparison purposes only - easiest solution)
2 Likes

Note to self: should use this link Whonix for Windows, macOS, Linux inside VirtualBox more now that I created it a while ago. Just created and then didn’t put it into use.

There is now a separate wiki page for stable and testers-only VirtualBox version.

Should not share the link https://download.whonix.org as it clearly says:

This page is intended for developers only!
Regular users should vist https://www.whonix.org/download/ instead.

My mistake.

I guess we need the same for KVM. @HulaHoop

1 Like

Requests by Patrick

  • Add wiki Libre Software
    development vs development inside a company works → wiki faq
  • Add to use curl in Whonix users should use curl.anondist-orig → Dev/anon-ws-disable-stacked-tor

Would like to complete at some point

Working on Libre development for 2 week or so. Unfortunately I’ve been having some creative difficulties. Writers block? I’m close to finishing and normally I would say I’ll have it done latter on today. However, its most likely going to take me a few more days with the way progress is going. As soon as this it finished (all edits are complete and pushed to wiki) I should be able to complete my backlog rather quickly.

I apologize for the delay

2 Likes