Qubes-Whonix 14.0.0.6.9 TemplateVMs for R3.2 and R4–Testers Wanted!
(Note: This page is a Draft waiting for review by Patrick)
Qubes-Whonix only!
For this testers wanted task, users should create fresh Whonix VMs.
Installing the R3.2 or R4.0 testers Qubes-Whonix 14 TemplateVMs.
Step 1: Clone existing whonix-gw
and whonix-ws
templates. It is recommended the newly cloned VMs be given names such as whonix-gw-13
and whonix-ws-13
. This is to prevent new templates from being confused with other Whonix templates.
Step 2: Change all VMs based on whonix-ws
and whonix-gw
templates to the newly cloned templates.
Step 3: Remove the current whonix-gw
and whonix-ws
Qubes-Whonix templates.
In dom0, run.
sudo dnf remove qubes-template-whonix-gw
sudo dnf remove qubes-template-whonix-ws
Step 4: Reinstall whonix-gw-14
and whonix-ws-14
Qubes-Whonix templates release candidate versions.
- Warning: Reinstalling Whonix templates while using
sys-whonix
as the updateVM could take hours given the 1.2 GB total to download. It may be preferable to change the Global Setting in Qubes VM manager to temporarily usesys-firewall
. Qubes will then download updates over clearnet and the operation will likely take less than an hour.
In dom0, run.
sudo qubes-dom0-update --enablerepo=qubes-dom0-unstable qubes-template-whonix-gw-14 qubes-template-whonix-ws-14
-
Qubes R3.2 note - users might encounter
tar
errors relating to dom0-updates folder not existing insys-whonix
(if updates are downloaded over Tor) orsys-firewall
. If this is the case, before downloading Whonix templates with the command above, the following command should be run in either thesys-whonix
orsys-firewall
updateVM.In updateVM Konsole, run.
sudo mkdir -m 775 /var/lib/qubes/dom0-updates
sudo chown user:user /var/lib/qubes/dom0-updates
Step 5: After re-installling templates, clone the whonix-gw-14
and whonix-ws-14
template VMs and name them whonix-gw
and whonix-ws
.
- Note: This step is necessary if
salt
is to be used in step 8 to createsys-whonix
andanon-whonix
VMs.
Step 6: (Optional ) Users can remove whonix-gw-14
and whonix-ws-14
templates. However, retaining clean Whonix 14 template VMs for later testing may be desirable.
In dom0, run.
sudo dnf remove qubes-template-whonix-gw-14
sudo dnf remove qubes-template-whonix-ws-14
Step 7: Update[1] whonix-gw
and whonix-ws
template VMs.
The following should be applied in both template VM Konsoles.
sudo apt-get update && sudo apt-get dist-upgrade
Step 8: After updating templates, recreate Whonix VMs from Qubes VM Manager. Optionally, advanced users can create Whonix VMs using salt
[2][3].
Create VMs from Qubes VM Manager.
Qubes R4.0
-
Create
sys-whonix
VM.Qubes VM Manager
→Qube
→create a new qube
.-
Create new VM with these settings.
Name and label:
sys-whonix-14
( purple )
Type:AppVM
Template:whonix-gw
Networking:sys-firewall
Advanced:provides network
(check)
-
* Create `anon-whonix` VM
`Qubes VM Manager` -> `Qube` -> `create a new qube`.
* Create new VM with these settings.
Name and label: `anon-whonix-14` ( purple )
Type: `AppVM`
Template: `whonix-ws`
Networking: `sys-whonix-14`
Advanced: `n/a`
Qubes R3.2
-
Create
sys-whonix
VM.Qubes VM Manager
→Qube
→create a new qube
.-
Create new VM with these settings.
Name and label:
sys-whonix-14
( purple )
Type:ProxyVM
Template:whonix-gw
Networking:sys-firewall
-
* Create `anon-whonix` VM.
`Qubes VM Manager` -> `Qube` -> `create a new qube`.
* Create new VM with these settings.
Name and label: `anon-whonix-14` ( purple )
Type: `AppVM`
Template: `whonix-ws`
Networking: `sys-whonix-14`
( Optional ) Create Whonix VMs using salt
. Advanced users only!
Users have the option of using salt
to recreate sys-whonix
and anon-whonix
VMs. Since no two VMs can have identical names. It would require any current Whonix-13 based sys-whonix
or anon-whonix
VMs to be renamed prior to using salt.
In dom0, run.
sudo qubesctl state.sls qvm.anon-whonix
-
Note: Users should verify
salt
creates VMssys-whonix
andanon-whonix
based on Whonix 14 templates. If problems are encountered such as the newly created VMs are Whonix 13 based.sys-whonix
ProxyVM andanon-whonix
AppVM can be created manually from Qubes VM Manager. -
Users can verify
sys-whonix
andanon-whonix
VMs are based on Whonix 14 by listing the Debian aptsources.list
. Newly created Whonix 14 VMs use Debian stretch (stable) as opposed to Whonix 13 VMs which use Debian jessie (old stable)In both
sys-whonix
andanon-whonix
VM konsoles, run.cat /etc/apt/sources.list.d/debian.list
The first 2 lines of output will show the following for Whonix 14 based VMs.
deb tor+http://sgvtcaew4bxjd7ln.onion stretch/updates main contrib non-free
deb http://security.debian.org stretch/updates main contrib non-free
Step 9: Copy the Whonix 13 Tor State to the newly created Whonix 14 (sys-whonix) VM. Users are encouraged to complete this step to maintain the same Tor entry guard and defend against tracking attempts by advanced adversaries.
Note: Steps to copy Tor state to secondary VM are in testing. Once complete, they will be added to the Whonix wiki. This will be completed shortly. Help welcome!
Please report any bugs in the Whonix forums so they can be addressed before the final Whonix 14 release.
It should be noted that users also have the option of doing an in-place upgrade of Whonix 13 to Whonix 14, rather than using the release candidate TemplateVMs. If this is preferable, follow the Testers-only documentation at the link below.
https://whonix.org/wiki/Upgrading_Whonix_13_to_Whonix_14
Detailed release notes for Whonix 14 can be found here: Changelog - Whonix
[1] https://www.whonix.org/wiki/Qubes/Update
[2] https://www.whonix.org/wiki/Dev/Qubes#salt
[3] https://www.qubes-os.org/doc/salt/