Hello,
I have successfully worked with a OpenVPN-over-Tor connection for quite a while with Qubes OS 4.0 and Whonix 15/16.
(NIC → Tor → VPN → Destination)
Unfortunately, with Qubes OS 4.1 there are issues. Other side effects can be excluded due to reproducible qubes installation.
The issue also has been discussed in the Qubes forum in multiple posts:
- User -> Tor -> VPN -> Internet - 4.1 broken? - General - Qubes OS Forum
- Networking Broken in 4.1 Default Templates - General - Qubes OS Forum
- Tor > VPN connection issues - only in 4.1 - multiple test configurations & vpn providers - General - Qubes OS Forum
- [R4.1-rc1] Openvpn issue after migration from R4.0 - General - Qubes OS Forum
Fortunately, a user has found a workaround:
TLDR:
sudo sysctl -w net.ipv4.ip_forward=1
in your whonix gateway will resolve it, until reboot. In your template, you can edit/etc/sysctl.d/anonymizer-config-gateway.conf
and comment out the linenet.ipv4.ip_forward = 0
, and this should fix ARP requests not getting replies.
Now here comes my actual question (besides promoting some discussion about potential error causes):
Do Whonix maintainers have any objections against this workaround from a privacy/security perspective?
If OK, we might add this to the documentation http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/wiki/Tunnels/Connecting_to_Tor_before_a_VPN#Separate_VPN-Gateway for other users encountering same issue.
Thanks!