Rather than follow the qubes-dist-upgrade or release-upgrade approach to moving to Qubes 4.3 / Whonix 18 I decided to factory reset and rebulid my various qubes. Here are a couple Whonix-releated things I noticed during the process.
(1) Switching the template of an existing anon-vm qube from whonix-workstation-17 to whonix-workstation-18:
After starting the qube I saw looping notifications, Denied sdwdate-gui.ConnectCheck from <anon qube> to sys-whonix. Noted elsewhere on the forums, and expected. To âfixâ this I create a new anon qube and qvm-copy over the /home/user/.tb dir from the old qube. Seems to be working fine. I think there is nothing wrong in doing this? The browser session is intended to be persistent, not ephemeral/anonymous.
(2) Running update-torbrowser on a fresh whonix-workstation-18 template:
Cloning or renaming the ws17-origin anon vm will automatically add the missing sdwdate-gui-client tag to to the new qube (but not to the original qube).
You are running Qubes R4.3, right? (It sounds like you are, but I wanted to double-check.) qubes-core-admin-addon-whonix (which is preinstalled in R4.3) should automatically add the sdwdate-gui-client tag to any Whonix-Workstation VMs any time a domain-load event is triggered in qubes-core-admin. In concrete terms, this event gets triggered on every single VM when dom0 is restarted, or when the qubesd service is restarted.
If you run sudo systemctl restart qubes.service in dom0, does anon-vm-originally-ws-17 gain the sdwdate-gui-client tag? (Be warned that restarting qubesd can cause some odd behavior, for instance Qube Manager might crash, so make sure you arenât doing any important work when you try this.)
In Kicksecure, there is a unique issue: after an upgrade, all app qubes and disposable VMs work fine after a reboot, but named disposables based on a Kicksecure app qube do not automatically receive the qvm-tag on reboot, you have to add the tag manually.
If the solution is implemented, it will not affect freshly installed Qubes OS when restoring named disposables from 4.2. A dom0 update will be rquired first. But will that be available in an in-place upgrade without additional dom0 update?
Iâm not quite sure what you mean by âadditional dom0 updateâ in this context. dom0 will need to be updated in order for the fix to be installed, yes, but you should (indeed, must if you want to remain secure) be updating dom0 regularly along with the rest of your VMs, which should pull the fix in automatically. Once the fix is installed, rebooting should automatically tag the VMs.
Ofcourse I know Weâve to regularly install updates especially of dom0.
What I mean is that when a person freshly install QubesOS, this fix will not be there until the person update dom0. So on fresh install if a person restore previous named disposable of kicksecure, he will face the same issue.