[HOME] [DOWNLOAD] [DOCS] [NEWS] [SUPPORT] [TIPS] [ISSUES] [CONTRIBUTE] [DONATE]

Qubes-Whonix version 14 (Debian stretch based) can be upgraded to version 15 (Debian buster based). - Testers Wanted!

Its mostly because of missing package which cant be installed:

user@host:~$ sudo apt install qubes-core-agent-thunar 
Reading package lists... Done
Building dependency tree       
Reading state information... Done
The following NEW packages will be installed:
  qubes-core-agent-thunar
0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded.
Need to get 0 B/26.2 kB of archives.
After this operation, 50.2 kB of additional disk space will be used.
(Reading database ... 52500 files and directories currently installed.)
Preparing to unpack .../qubes-core-agent-thunar_4.0.45-1+deb10u1_amd64.deb ...
Unpacking qubes-core-agent-thunar (4.0.45-1+deb10u1) ...
dpkg: error processing archive /var/cache/apt/archives/qubes-core-agent-thunar_4.0.45-1+deb10u1_amd64.deb (--unpack):
 trying to overwrite '/etc/xdg/xfce4/xfconf/xfce-perchannel-xml/thunar.xml', which is also in package security-misc 3:2.9-1
Errors were encountered while processing:
 /var/cache/apt/archives/qubes-core-agent-thunar_4.0.45-1+deb10u1_amd64.deb
E: Sub-process /usr/bin/dpkg returned an error code (1)
user@host:~$

qubes-core-agent-thunar : This package provides integration with the thunar file manager (without it, items like “copy to VM/open in disposable VM” will not be shown in thunar). Source Link

1 Like
  • Feature Request: Add “Exit” option to sdwdate without effecting its reading/time synchronization: (This is useful to see the graphical icon and then hide it without filling qubes taskbar with it , specially if someone uses multiple gatways)

sdwdate

-Error When opening Whonix 15 GW (gone after restart)

ERROR: Tor Config Check Result: 
Your Tor config file contains at least one error. 
(Tor exit code: 1) 
Tor concise reports (below warns and errors must be fixed before you can use Tor): 
Jun 05 12:36:00.308 [warn] Failed to parse/validate config: If you set UseBridges, you must specify at least one bridge.
Jun 05 12:36:00.308 [err] Reading config failed--see warnings above. 
Tor full reports: 
Jun 05 12:36:00.305 [notice] Tor 0.3.5.8 running on Linux with Libevent 2.1.8-stable, OpenSSL 1.1.1b, Zlib 1.2.11, Liblzma 5.2.4, and Libzstd 1.3.8.
Jun 05 12:36:00.306 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
Jun 05 12:36:00.306 [notice] Read configuration file "/etc/tor/torrc".
Jun 05 12:36:00.308 [notice] Included configuration file or directory at recursion level 2: "/usr/local/etc/torrc.d/40_tor_control_panel.conf".
Jun 05 12:36:00.308 [notice] Included configuration file or directory at recursion level 2: "/usr/local/etc/torrc.d/50_user.conf".
Jun 05 12:36:00.308 [notice] Included configuration file or directory at recursion level 1: "/etc/torrc.d/95_whonix.conf".
Jun 05 12:36:00.308 [warn] Failed to parse/validate config: If you set UseBridges, you must specify at least one bridge.
Jun 05 12:36:00.308 [err] Reading config failed--see warnings above.
Try to look at this report yourself by running. dom0 -> Start Menu -> Domain: Whonix-GW-SocialMedia -> Terminal 
sudo -u debian-tor tor --verify-config 
To try to fix this, please open your Tor config file. 
dom0 -> Start Menu -> Domain: Whonix-GW-SocialMedia -> Torrc 
or in Terminal: sudo nano /usr/local/etc/torrc.d/50_user.conf 
Please restart Tor after fixing this error. 
dom0 -> Start Menu -> Domain: Whonix-GW-SocialMedia -> Restart Tor 
or in Terminal: sudo service tor@default restart 
Restart whonixcheck after fixing this error. 
dom0 -> Start Menu -> Domain: Whonix-GW-SocialMedia -> Whonix Check 
or in Terminal: whonixcheck 
If you know what you are doing, feel free to disable this check. Create a file /etc/whonix.d/50_whonixcheck_user.conf and add: 
whonixcheck_skip_functions+=" check_tor_config "

TNT_BOM_BOM via Whonix Forum:

Its mostly because of missing package which cant be installed:

user@host:~$ sudo apt install qubes-core-agent-thunar 
Reading package lists... Done
Building dependency tree       
Reading state information... Done
The following NEW packages will be installed:
  qubes-core-agent-thunar
0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded.
Need to get 0 B/26.2 kB of archives.
After this operation, 50.2 kB of additional disk space will be used.
(Reading database ... 52500 files and directories currently installed.)
Preparing to unpack .../qubes-core-agent-thunar_4.0.45-1+deb10u1_amd64.deb ...
Unpacking qubes-core-agent-thunar (4.0.45-1+deb10u1) ...
dpkg: error processing archive /var/cache/apt/archives/qubes-core-agent-thunar_4.0.45-1+deb10u1_amd64.deb (--unpack):
 trying to overwrite '/etc/xdg/xfce4/xfconf/xfce-perchannel-xml/thunar.xml', which is also in package security-misc 3:2.9-1
Errors were encountered while processing:
 /var/cache/apt/archives/qubes-core-agent-thunar_4.0.45-1+deb10u1_amd64.deb
E: Sub-process /usr/bin/dpkg returned an error code (1)
user@host:~$

qubes-core-agent-thunar : This package provides integration with the thunar file manager (without it, items like “copy to VM/open in disposable VM” will not be shown in thunar). Source Link

Thanks, this will be solved!

1 Like

TNT_BOM_BOM via Whonix Forum:

  • Feature Request: Add “Exit” option to sdwdate without effecting its reading/time synchronization: (This is useful to see the graphical icon and then hide it without filling qubes taskbar with it , specially if someone uses multiple gatways)

sdwdate

Would be cool but requires a python gui programmer.

-Error When opening Whonix 15 GW (gone after restart)

ERROR: Tor Config Check Result: 
Your Tor config file contains at least one error. 
(Tor exit code: 1) 
Tor concise reports (below warns and errors must be fixed before you can use Tor): 
Jun 05 12:36:00.308 [warn] Failed to parse/validate config: If you set UseBridges, you must specify at least one bridge.
Jun 05 12:36:00.308 [err] Reading config failed--see warnings above. 
Tor full reports: 
Jun 05 12:36:00.305 [notice] Tor 0.3.5.8 running on Linux with Libevent 2.1.8-stable, OpenSSL 1.1.1b, Zlib 1.2.11, Liblzma 5.2.4, and Libzstd 1.3.8.
Jun 05 12:36:00.306 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
Jun 05 12:36:00.306 [notice] Read configuration file "/etc/tor/torrc".
Jun 05 12:36:00.308 [notice] Included configuration file or directory at recursion level 2: "/usr/local/etc/torrc.d/40_tor_control_panel.conf".
Jun 05 12:36:00.308 [notice] Included configuration file or directory at recursion level 2: "/usr/local/etc/torrc.d/50_user.conf".
Jun 05 12:36:00.308 [notice] Included configuration file or directory at recursion level 1: "/etc/torrc.d/95_whonix.conf".
Jun 05 12:36:00.308 [warn] Failed to parse/validate config: If you set UseBridges, you must specify at least one bridge.

Possible this is the actual cause indeed?

Jun 05 12:36:00.308 [err] Reading config failed--see warnings above.

Could you please try the following parts?

Try to look at this report yourself by running. dom0 -> Start Menu -> Domain: Whonix-GW-SocialMedia -> Terminal 
sudo -u debian-tor tor --verify-config 
To try to fix this, please open your Tor config file. 
dom0 -> Start Menu -> Domain: Whonix-GW-SocialMedia -> Torrc 
or in Terminal: sudo nano /usr/local/etc/torrc.d/50_user.conf 
Please restart Tor after fixing this error. 
dom0 -> Start Menu -> Domain: Whonix-GW-SocialMedia -> Restart Tor 
or in Terminal: sudo service tor@default restart 
Restart whonixcheck after fixing this error. 
dom0 -> Start Menu -> Domain: Whonix-GW-SocialMedia -> Whonix Check 
or in Terminal: whonixcheck 

Possible there is really an issue in /usr/local/etc/torrc.d/50_user.conf?

Same firewall error happened in here:

ERROR: whonix_firewall failed to load! 

The whonix_firewall failed to load for some reason. This could be due to the firewall being mis-configured or race-condition. Try restarting the VM to see if this error persists. 

Failure file /var/run/anon-firewall/failed.status does not exist, ok. 

output of sudo systemctl status whonix-firewall: 

######################################## 
● whonix-firewall.service - Whonix firewall loader
Loaded: loaded (/lib/systemd/system/whonix-firewall.service; enabled; vendor preset: enabled)
Active: active (exited) since Mon 2019-06-10 15:55:19 UTC; 31s ago
Docs: https://www.whonix.org/wiki/Whonix_Firewall
Process: 3599 ExecStart=/usr/lib/whonix-firewall/enable-firewall (code=exited, status=0/SUCCESS)
Main PID: 3599 (code=exited, status=0/SUCCESS)

Jun 10 15:55:18 host enable-firewall[3599]: OK: SDWDATE_USER: 110
Jun 10 15:55:18 host enable-firewall[3599]: OK: WHONIXCHECK_USER: 109
Jun 10 15:55:18 host enable-firewall[3599]: OK: NO_NAT_USERS: 106 107 112
Jun 10 15:55:19 host enable-firewall[3599]: OK: The firewall should not show any messages,
Jun 10 15:55:19 host enable-firewall[3599]: OK: besides output beginning with prefix OK:...
Jun 10 15:55:19 host sudo[3857]: root : TTY=unknown ; PWD=/ ; USER=sdwdate ; COMMAND=/usr/bin/tee -a /var/log/sdwdate.log
Jun 10 15:55:19 host sudo[3857]: pam_unix(sudo:session): session opened for user sdwdate by (uid=0)
Jun 10 15:55:19 host enable-firewall[3599]: 2019-06-10 15:55:19 - /usr/bin/whonix-gateway-firewall - OK: Whonix firewall loaded.
Jun 10 15:55:19 host sudo[3857]: pam_unix(sudo:session): session closed for user sdwdate
Jun 10 15:55:19 host systemd[1]: Started Whonix firewall loader. 
######################################## 

output of sudo journalctl -u whonix-firewall: 

######################################## 
-- Logs begin at Mon 2019-06-10 15:54:56 UTC, end at Mon 2019-06-10 15:57:25 UTC. --
Jun 10 15:54:56 host systemd[1]: Starting Whonix firewall loader...
Jun 10 15:54:56 host enable-firewall[338]: OK: Loading Whonix firewall...
Jun 10 15:54:56 host sudo[360]: root : TTY=unknown ; PWD=/ ; USER=sdwdate ; COMMAND=/usr/bin/tee -a /var/log/sdwdate.log
Jun 10 15:54:56 host sudo[360]: pam_unix(sudo:session): session opened for user sdwdate by (uid=0)
Jun 10 15:54:56 host enable-firewall[338]: 2019-06-10 15:54:56 - /usr/bin/whonix-gateway-firewall - OK: Skipping firewall mode detection since already set to 'full'.
Jun 10 15:54:56 host sudo[360]: pam_unix(sudo:session): session closed for user sdwdate
Jun 10 15:54:56 host sudo[385]: root : TTY=unknown ; PWD=/ ; USER=sdwdate ; COMMAND=/usr/bin/tee -a /var/log/sdwdate.log
Jun 10 15:54:56 host sudo[385]: pam_unix(sudo:session): session opened for user sdwdate by (uid=0)
Jun 10 15:54:56 host enable-firewall[338]: 2019-06-10 15:54:56 - /usr/bin/whonix-gateway-firewall - OK: (Full torified network access allowed.)
Jun 10 15:54:56 host sudo[385]: pam_unix(sudo:session): session closed for user sdwdate
Jun 10 15:54:56 host enable-firewall[338]: OK: TOR_USER: 112
Jun 10 15:54:56 host enable-firewall[338]: OK: CLEARNET_USER: 106
Jun 10 15:54:56 host enable-firewall[338]: OK: USER_USER: 1000
Jun 10 15:54:56 host enable-firewall[338]: OK: ROOT_USER: 0
Jun 10 15:54:56 host enable-firewall[338]: OK: TUNNEL_USER: 107
Jun 10 15:54:56 host enable-firewall[338]: OK: SDWDATE_USER: 110
Jun 10 15:54:56 host enable-firewall[338]: OK: WHONIXCHECK_USER: 109
Jun 10 15:54:56 host enable-firewall[338]: OK: NO_NAT_USERS: 106 107 112
Jun 10 15:57:03 host enable-firewall[338]: OK: The firewall should not show any messages,
Jun 10 15:57:03 host enable-firewall[338]: OK: besides output beginning with prefix OK:...
Jun 10 15:57:03 host sudo[757]: root : TTY=unknown ; PWD=/ ; USER=sdwdate ; COMMAND=/usr/bin/tee -a /var/log/sdwdate.log
Jun 10 15:57:03 host sudo[757]: pam_unix(sudo:session): session opened for user sdwdate by (uid=0)
Jun 10 15:57:03 host enable-firewall[338]: 2019-06-10 15:57:03 - /usr/bin/whonix-gateway-firewall - OK: Whonix firewall loaded.
Jun 10 15:57:03 host sudo[757]: pam_unix(sudo:session): session closed for user sdwdate
Jun 10 15:57:03 host systemd[1]: Started Whonix firewall loader.
Jun 10 15:55:18 host systemd[1]: whonix-firewall.service: Succeeded.
Jun 10 15:55:18 host systemd[1]: Stopped Whonix firewall loader.
Jun 10 15:55:18 host systemd[1]: Stopping Whonix firewall loader...
Jun 10 15:55:18 host systemd[1]: Starting Whonix firewall loader...
Jun 10 15:55:18 host enable-firewall[3599]: OK: Loading Whonix firewall...
Jun 10 15:55:18 host sudo[3617]: root : TTY=unknown ; PWD=/ ; USER=sdwdate ; COMMAND=/usr/bin/tee -a /var/log/sdwdate.log
Jun 10 15:55:18 host sudo[3617]: pam_unix(sudo:session): session opened for user sdwdate by (uid=0)
Jun 10 15:55:18 host enable-firewall[3599]: 2019-06-10 15:55:18 - /usr/bin/whonix-gateway-firewall - OK: Skipping firewall mode detection since already set to 'full'.
Jun 10 15:55:18 host sudo[3617]: pam_unix(sudo:session): session closed for user sdwdate
Jun 10 15:55:18 host sudo[3632]: root : TTY=unknown ; PWD=/ ; USER=sdwdate ; COMMAND=/usr/bin/tee -a /var/log/sdwdate.log
Jun 10 15:55:18 host sudo[3632]: pam_unix(sudo:session): session opened for user sdwdate by (uid=0)
Jun 10 15:55:18 host enable-firewall[3599]: 2019-06-10 15:55:18 - /usr/bin/whonix-gateway-firewall - OK: (Full torified network access allowed.)
Jun 10 15:55:18 host sudo[3632]: pam_unix(sudo:session): session closed for user sdwdate
Jun 10 15:55:18 host enable-firewall[3599]: OK: TOR_USER: 112
Jun 10 15:55:18 host enable-firewall[3599]: OK: CLEARNET_USER: 106
Jun 10 15:55:18 host enable-firewall[3599]: OK: USER_USER: 1000
Jun 10 15:55:18 host enable-firewall[3599]: OK: ROOT_USER: 0
Jun 10 15:55:18 host enable-firewall[3599]: OK: TUNNEL_USER: 107
Jun 10 15:55:18 host enable-firewall[3599]: OK: SDWDATE_USER: 110
Jun 10 15:55:18 host enable-firewall[3599]: OK: WHONIXCHECK_USER: 109
Jun 10 15:55:18 host enable-firewall[3599]: OK: NO_NAT_USERS: 106 107 112
Jun 10 15:55:19 host enable-firewall[3599]: OK: The firewall should not show any messages,
Jun 10 15:55:19 host enable-firewall[3599]: OK: besides output beginning with prefix OK:...
Jun 10 15:55:19 host sudo[3857]: root : TTY=unknown ; PWD=/ ; USER=sdwdate ; COMMAND=/usr/bin/tee -a /var/log/sdwdate.log
Jun 10 15:55:19 host sudo[3857]: pam_unix(sudo:session): session opened for user sdwdate by (uid=0)
Jun 10 15:55:19 host enable-firewall[3599]: 2019-06-10 15:55:19 - /usr/bin/whonix-gateway-firewall - OK: Whonix firewall loaded.
Jun 10 15:55:19 host sudo[3857]: pam_unix(sudo:session): session closed for user sdwdate
Jun 10 15:55:19 host systemd[1]: Started Whonix firewall loader. 
######################################## 

To see this for yourself... 
1. Open a terminal. (dom0 -> Start Menu -> Domain: Whonix-GW-SocialMedia -> Terminal) 
2. Run. 
sudo systemctl status whonix-firewall

2. Also see. 
sudo journalctl -u whonix-firewall | cat

3. Try to manually start Whonix firewall. 
sudo whonix_firewall
If you know what you are doing, feel free to disable this check. Create a file /etc/whonix.d/50_whonixcheck_user.conf and add: 
whonixcheck_skip_functions+=" check_whonix_firewall_systemd_status "

And the output of sudo journalctl | cat

http://bcloud2suoza3ybr.onion/dl/URI:CHK:6yzcajii2sndg5et7i7q4p42vq:uz4oii7f3yek4lbdfot5tlhlwnqyeombkf4malovjr3gpwrf5dba:3:10:505384/journal.txt

answer Whonix VirtualBox 15.0.0.0.7 - Debian buster based - Testers Wanted! applies.

Generally - if I don’t say upgraded packages in repository XYZ - chances are there’s not yet an upgraded package available in the repository.

(Git commits are posted beforehand for reference and review by others (and reminder to myself).)

Thanks, I don’t see anything too bad in that log. Probably just be Whonix VirtualBox 15.0.0.0.7 - Debian buster based - Testers Wanted! indeed.

1 Like

/usr/local/etc is an empty directory

1 Like

That is strange.

Output of…?

sudo systemctl status anon-gw-anonymizer-config
1 Like

Also it would be good if you could read, understand and compare with git each of these files:

/etc/tor/torrc
/etc/torrc.d/95_whonix.conf
/usr/local/etc/torrc.d/40_tor_control_panel.conf
/usr/local/etc/torrc.d/50_user.conf

I guess you used ACW?

By looking at all of these files, that error should be explainable or at least point to some bug.

1 Like

sorry my mistake the directory working but the 50_user.conf is empty

by empty i mean like this reading:

meaning all good readings.

yes correct

1 Like

But…

/usr/local/etc/torrc.d/40_tor_control_panel.conf

has contents?

Could you please check all of these 4 files? Any of these files mentioning UseBridges? Should really be /usr/local/etc/torrc.d/40_tor_control_panel.conf anyhow if ACW was used.

In theory if only ACW was used and no manual use then /usr/local/etc/torrc.d/40_tor_control_panel.conf might show a bug and that file might be incomplete / no longer compatible with Tor so it might be an ACW bug.

1 Like

Another useful tool to run in case you’re still having issues. Please try. And please post the output here in case you think this could be a Whonix issue still.

anon-verify
1 Like

Also…

anon-verify -v
1 Like

I see all files are matches and here is the output: (This is with obfs4 enabled through ACW)

user@host:~$ anon-verify 
/===================================================================\
|                      Report Summary                               |
\===================================================================/
No error detected in your Tor configuration.
Tor verify exit code: 0
/===================================================================\
|                      Tor Full Report                              |
\===================================================================/
Jun 10 17:55:48.062 [notice] Tor 0.3.5.8 running on Linux with Libevent 2.1.8-stable, OpenSSL 1.1.1b, Zlib 1.2.11, Liblzma 5.2.4, and Libzstd 1.3.8.
Jun 10 17:55:48.062 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
Jun 10 17:55:48.062 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jun 10 17:55:48.062 [notice] Read configuration file "/etc/tor/torrc".
Jun 10 17:55:48.065 [notice] Included configuration file or directory at recursion level 2: "/usr/local/etc/torrc.d/40_tor_control_panel.conf".
Jun 10 17:55:48.065 [notice] Included configuration file or directory at recursion level 2: "/usr/local/etc/torrc.d/50_user.conf".
Jun 10 17:55:48.065 [notice] Included configuration file or directory at recursion level 1: "/etc/torrc.d/95_whonix.conf".
Jun 10 17:55:48.065 [notice] You configured a non-loopback address '10.137.0.7:5300' for DNSPort. This allows everybody on your local network to use your machine as a proxy. Make sure this is what you wanted.
Jun 10 17:55:48.065 [notice] You configured a non-loopback address '10.137.0.7:9040' for TransPort. This allows everybody on your local network to use your machine as a proxy. Make sure this is what you wanted.
Configuration was valid
/===================================================================\
|                 Used Tor Configuration Files                      |
\===================================================================/
5 files are used as Tor configuration files: 
/usr/share/tor/tor-service-defaults-torrc /etc/tor/torrc /etc/torrc.d/95_whonix.conf /usr/local/etc/torrc.d/40_tor_control_panel.conf /usr/local/etc/torrc.d/50_user.conf
=====================================================================
user@host:~$ anon-verify -v
anon-verify verbose output...
/===================================================================\
|                      Report Summary                               |
\===================================================================/
No error detected in your Tor configuration.
Tor verify exit code: 0
/===================================================================\
|                      Tor Full Report                              |
\===================================================================/
Jun 10 17:55:51.142 [notice] Tor 0.3.5.8 running on Linux with Libevent 2.1.8-stable, OpenSSL 1.1.1b, Zlib 1.2.11, Liblzma 5.2.4, and Libzstd 1.3.8.
Jun 10 17:55:51.142 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
Jun 10 17:55:51.142 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jun 10 17:55:51.142 [notice] Read configuration file "/etc/tor/torrc".
Jun 10 17:55:51.145 [notice] Included configuration file or directory at recursion level 2: "/usr/local/etc/torrc.d/40_tor_control_panel.conf".
Jun 10 17:55:51.145 [notice] Included configuration file or directory at recursion level 2: "/usr/local/etc/torrc.d/50_user.conf".
Jun 10 17:55:51.145 [notice] Included configuration file or directory at recursion level 1: "/etc/torrc.d/95_whonix.conf".
Jun 10 17:55:51.145 [notice] You configured a non-loopback address '10.137.0.7:5300' for DNSPort. This allows everybody on your local network to use your machine as a proxy. Make sure this is what you wanted.
Jun 10 17:55:51.145 [notice] You configured a non-loopback address '10.137.0.7:9040' for TransPort. This allows everybody on your local network to use your machine as a proxy. Make sure this is what you wanted.
Configuration was valid
/===================================================================\
|                 Used Tor Configuration Files                      |
\===================================================================/
5 files are used as Tor configuration files: 
/usr/share/tor/tor-service-defaults-torrc /etc/tor/torrc /etc/torrc.d/95_whonix.conf /usr/local/etc/torrc.d/40_tor_control_panel.conf /usr/local/etc/torrc.d/50_user.conf
/===================================================================\
|                Verbose Tor Configuration Parsing                  |
\===================================================================/
The Tor configuration files are parsed in such order: 
===> Parsing /usr/share/tor/tor-service-defaults-torrc
DataDirectory /var/lib/tor
PidFile /var/run/tor/tor.pid
RunAsDaemon 1
User debian-tor
ControlSocket /var/run/tor/control GroupWritable RelaxDirModeCheck
ControlSocketsGroupWritable 1
SocksPort unix:/var/run/tor/socks WorldWritable
SocksPort 9050
CookieAuthentication 1
CookieAuthFileGroupReadable 1
CookieAuthFile /var/run/tor/control.authcookie
Log notice file /var/log/tor/log
DisableNetwork 1
Log notice syslog
Log notice file /run/tor/log
VirtualAddrNetwork 10.192.0.0/10
AutomapHostsOnResolve 1
TransPort 10.137.0.7:9040
DnsPort 10.137.0.7:5300 IsolateDestPort
SocksPort 10.137.0.7:9050
SocksPort 10.137.0.7:9100
SocksPort 10.137.0.7:9101 IsolateDestAddr IsolateDestPort
SocksPort 10.137.0.7:9102 IsolateDestAddr IsolateDestPort
SocksPort 10.137.0.7:9103 IsolateDestAddr IsolateDestPort
SocksPort 10.137.0.7:9104
SocksPort 10.137.0.7:9105 IsolateDestAddr IsolateDestPort
SocksPort 10.137.0.7:9106 IsolateDestAddr IsolateDestPort
SocksPort 10.137.0.7:9107 IsolateDestAddr IsolateDestPort
SocksPort 10.137.0.7:9108 IsolateDestAddr IsolateDestPort
SocksPort 10.137.0.7:9109 IsolateDestAddr IsolateDestPort
SocksPort 10.137.0.7:9110 IsolateDestAddr IsolateDestPort
SocksPort 10.137.0.7:9111
SocksPort 10.137.0.7:9112
SocksPort 10.137.0.7:9113
SocksPort 10.137.0.7:9114 IsolateDestAddr IsolateDestPort
SocksPort 10.137.0.7:9115 IsolateDestAddr IsolateDestPort
SocksPort 10.137.0.7:9116 IsolateDestAddr IsolateDestPort
SocksPort 10.137.0.7:9117 IsolateDestAddr IsolateDestPort
SocksPort 10.137.0.7:9118 IsolateDestAddr IsolateDestPort
SocksPort 10.137.0.7:9119
SocksPort 10.137.0.7:9120 IsolateDestAddr IsolateDestPort
SocksPort 10.137.0.7:9121 IsolateDestAddr IsolateDestPort
SocksPort 10.137.0.7:9122
SocksPort 10.137.0.7:9123
SocksPort 10.137.0.7:9124
SocksPort 10.137.0.7:9125
SocksPort 10.137.0.7:9150 IPv6Traffic PreferIPv6 KeepAliveIsolateSOCKSAuth
SocksPort 10.137.0.7:9152 IsolateDestAddr IsolateDestPort
SocksPort 10.137.0.7:9153
SocksPort 10.137.0.7:9154
SocksPort 10.137.0.7:9155
SocksPort 10.137.0.7:9156
SocksPort 10.137.0.7:9157
SocksPort 10.137.0.7:9158
SocksPort 10.137.0.7:9159
SocksPort 10.137.0.7:9160 IsolateDestAddr
SocksPort 10.137.0.7:9161 IsolateDestAddr
SocksPort 10.137.0.7:9162 IsolateDestAddr
SocksPort 10.137.0.7:9163 IsolateDestAddr
SocksPort 10.137.0.7:9164 IsolateDestAddr
SocksPort 10.137.0.7:9165 IsolateDestAddr
SocksPort 10.137.0.7:9166 IsolateDestAddr
SocksPort 10.137.0.7:9167 IsolateDestAddr
SocksPort 10.137.0.7:9168 IsolateDestAddr
SocksPort 10.137.0.7:9169 IsolateDestAddr
SocksPort 10.137.0.7:9170 IsolateDestPort
SocksPort 10.137.0.7:9171 IsolateDestPort
SocksPort 10.137.0.7:9172 IsolateDestPort
SocksPort 10.137.0.7:9173 IsolateDestPort
SocksPort 10.137.0.7:9174 IsolateDestPort
SocksPort 10.137.0.7:9175 IsolateDestPort
SocksPort 10.137.0.7:9176 IsolateDestPort
SocksPort 10.137.0.7:9177 IsolateDestPort
SocksPort 10.137.0.7:9178 IsolateDestPort
SocksPort 10.137.0.7:9179 IsolateDestPort
SocksPort 10.137.0.7:9180 IsolateDestAddr IsolateDestPort
SocksPort 10.137.0.7:9181 IsolateDestAddr IsolateDestPort
SocksPort 10.137.0.7:9182 IsolateDestAddr IsolateDestPort
SocksPort 10.137.0.7:9183 IsolateDestAddr IsolateDestPort
SocksPort 10.137.0.7:9184 IsolateDestAddr IsolateDestPort
SocksPort 10.137.0.7:9185 IsolateDestAddr IsolateDestPort
SocksPort 10.137.0.7:9186 IsolateDestAddr IsolateDestPort
SocksPort 10.137.0.7:9187 IsolateDestAddr IsolateDestPort
SocksPort 10.137.0.7:9188 IsolateDestAddr IsolateDestPort
SocksPort 10.137.0.7:9189 IsolateDestAddr IsolateDestPort
HTTPTunnelPort 10.137.0.7:9190
HTTPTunnelPort 10.137.0.7:9191
HTTPTunnelPort 10.137.0.7:9192
HTTPTunnelPort 10.137.0.7:9193
HTTPTunnelPort 10.137.0.7:9194
HTTPTunnelPort 10.137.0.7:9195
HTTPTunnelPort 10.137.0.7:9196
HTTPTunnelPort 10.137.0.7:9197
HTTPTunnelPort 10.137.0.7:9198
HTTPTunnelPort 10.137.0.7:9199
HTTPTunnelPort 10.137.0.7:9200 IsolateDestAddr
HTTPTunnelPort 10.137.0.7:9201 IsolateDestAddr
HTTPTunnelPort 10.137.0.7:9202 IsolateDestAddr
HTTPTunnelPort 10.137.0.7:9203 IsolateDestAddr
HTTPTunnelPort 10.137.0.7:9204 IsolateDestAddr
HTTPTunnelPort 10.137.0.7:9205 IsolateDestAddr
HTTPTunnelPort 10.137.0.7:9206 IsolateDestAddr
HTTPTunnelPort 10.137.0.7:9207 IsolateDestAddr
HTTPTunnelPort 10.137.0.7:9208 IsolateDestAddr
HTTPTunnelPort 10.137.0.7:9209 IsolateDestAddr
HTTPTunnelPort 10.137.0.7:9210 IsolateDestPort
HTTPTunnelPort 10.137.0.7:9211 IsolateDestPort
HTTPTunnelPort 10.137.0.7:9212 IsolateDestPort
HTTPTunnelPort 10.137.0.7:9213 IsolateDestPort
HTTPTunnelPort 10.137.0.7:9214 IsolateDestPort
HTTPTunnelPort 10.137.0.7:9215 IsolateDestPort
HTTPTunnelPort 10.137.0.7:9216 IsolateDestPort
HTTPTunnelPort 10.137.0.7:9217 IsolateDestPort
HTTPTunnelPort 10.137.0.7:9218 IsolateDestPort
HTTPTunnelPort 10.137.0.7:9219 IsolateDestPort
HTTPTunnelPort 10.137.0.7:9220 IsolateDestAddr IsolateDestPort
HTTPTunnelPort 10.137.0.7:9221 IsolateDestAddr IsolateDestPort
HTTPTunnelPort 10.137.0.7:9222 IsolateDestAddr IsolateDestPort
HTTPTunnelPort 10.137.0.7:9223 IsolateDestAddr IsolateDestPort
HTTPTunnelPort 10.137.0.7:9224 IsolateDestAddr IsolateDestPort
HTTPTunnelPort 10.137.0.7:9225 IsolateDestAddr IsolateDestPort
HTTPTunnelPort 10.137.0.7:9226 IsolateDestAddr IsolateDestPort
HTTPTunnelPort 10.137.0.7:9227 IsolateDestAddr IsolateDestPort
HTTPTunnelPort 10.137.0.7:9228 IsolateDestAddr IsolateDestPort
HTTPTunnelPort 10.137.0.7:9229 IsolateDestAddr IsolateDestPort
TransPort 127.0.0.1:9041
DnsPort 127.0.0.1:5400
SocksPort 127.0.0.1:9100
SocksPort 127.0.0.1:9101 IsolateDestAddr IsolateDestPort
SocksPort 127.0.0.1:9102 IsolateDestAddr IsolateDestPort
SocksPort 127.0.0.1:9103 IsolateDestAddr IsolateDestPort
SocksPort 127.0.0.1:9104
SocksPort 127.0.0.1:9105 IsolateDestAddr IsolateDestPort
SocksPort 127.0.0.1:9106 IsolateDestAddr IsolateDestPort
SocksPort 127.0.0.1:9107 IsolateDestAddr IsolateDestPort
SocksPort 127.0.0.1:9108 IsolateDestAddr IsolateDestPort
SocksPort 127.0.0.1:9109 IsolateDestAddr IsolateDestPort
SocksPort 127.0.0.1:9110 IsolateDestAddr IsolateDestPort
SocksPort 127.0.0.1:9111
SocksPort 127.0.0.1:9112
SocksPort 127.0.0.1:9113
SocksPort 127.0.0.1:9114 IsolateDestAddr IsolateDestPort
SocksPort 127.0.0.1:9115 IsolateDestAddr IsolateDestPort
SocksPort 127.0.0.1:9116 IsolateDestAddr IsolateDestPort
SocksPort 127.0.0.1:9117 IsolateDestAddr IsolateDestPort
SocksPort 127.0.0.1:9118 IsolateDestAddr IsolateDestPort
SocksPort 127.0.0.1:9119
SocksPort 127.0.0.1:9120 IsolateDestAddr IsolateDestPort
SocksPort 127.0.0.1:9121 IsolateDestAddr IsolateDestPort
SocksPort 127.0.0.1:9122
SocksPort 127.0.0.1:9123
SocksPort 127.0.0.1:9124
SocksPort 127.0.0.1:9125
SocksPort 127.0.0.1:9150 IPv6Traffic PreferIPv6 KeepAliveIsolateSOCKSAuth
HTTPTunnelPort 127.0.0.1:9190
HTTPTunnelPort 127.0.0.1:9191
HTTPTunnelPort 127.0.0.1:9192
HTTPTunnelPort 127.0.0.1:9193
HTTPTunnelPort 127.0.0.1:9194
HTTPTunnelPort 127.0.0.1:9195
HTTPTunnelPort 127.0.0.1:9196
HTTPTunnelPort 127.0.0.1:9197
HTTPTunnelPort 127.0.0.1:9198
HTTPTunnelPort 127.0.0.1:9199
HTTPTunnelPort 127.0.0.1:9200 IsolateDestAddr
HTTPTunnelPort 127.0.0.1:9201 IsolateDestAddr
HTTPTunnelPort 127.0.0.1:9202 IsolateDestAddr
HTTPTunnelPort 127.0.0.1:9203 IsolateDestAddr
HTTPTunnelPort 127.0.0.1:9204 IsolateDestAddr
HTTPTunnelPort 127.0.0.1:9205 IsolateDestAddr
HTTPTunnelPort 127.0.0.1:9206 IsolateDestAddr
HTTPTunnelPort 127.0.0.1:9207 IsolateDestAddr
HTTPTunnelPort 127.0.0.1:9208 IsolateDestAddr
HTTPTunnelPort 127.0.0.1:9209 IsolateDestAddr
HTTPTunnelPort 127.0.0.1:9210 IsolateDestPort
HTTPTunnelPort 127.0.0.1:9211 IsolateDestPort
HTTPTunnelPort 127.0.0.1:9212 IsolateDestPort
HTTPTunnelPort 127.0.0.1:9213 IsolateDestPort
HTTPTunnelPort 127.0.0.1:9214 IsolateDestPort
HTTPTunnelPort 127.0.0.1:9215 IsolateDestPort
HTTPTunnelPort 127.0.0.1:9216 IsolateDestPort
HTTPTunnelPort 127.0.0.1:9217 IsolateDestPort
HTTPTunnelPort 127.0.0.1:9218 IsolateDestPort
HTTPTunnelPort 127.0.0.1:9219 IsolateDestPort
HTTPTunnelPort 127.0.0.1:9220 IsolateDestAddr IsolateDestPort
HTTPTunnelPort 127.0.0.1:9221 IsolateDestAddr IsolateDestPort
HTTPTunnelPort 127.0.0.1:9222 IsolateDestAddr IsolateDestPort
HTTPTunnelPort 127.0.0.1:9223 IsolateDestAddr IsolateDestPort
HTTPTunnelPort 127.0.0.1:9224 IsolateDestAddr IsolateDestPort
HTTPTunnelPort 127.0.0.1:9225 IsolateDestAddr IsolateDestPort
HTTPTunnelPort 127.0.0.1:9226 IsolateDestAddr IsolateDestPort
HTTPTunnelPort 127.0.0.1:9227 IsolateDestAddr IsolateDestPort
HTTPTunnelPort 127.0.0.1:9228 IsolateDestAddr IsolateDestPort
HTTPTunnelPort 127.0.0.1:9229 IsolateDestAddr IsolateDestPort
===> Done parsing /usr/share/tor/tor-service-defaults-torrc
===> Parsing /etc/tor/torrc
%include /etc/torrc.d/95_whonix.conf
===> Parsing /etc/torrc.d/95_whonix.conf
%include /usr/local/etc/torrc.d/40_tor_control_panel.conf
===> Parsing /usr/local/etc/torrc.d/40_tor_control_panel.conf
UseBridges 1
ClientTransportPlugin obfs4 exec /usr/bin/obfs4proxy
bridge obfs4 154.35.22.10:15937 8FB9F4319E89E5C6223052AA525A192AFBC85D55 cert=GGGS1TX4R81m3r0HBl79wKy1OtPPNR2CZUIrHjkRg65Vc2VR8fOyo64f9kmT1UAFG7j0HQ iat-mode=0
bridge obfs4 198.245.60.50:443 752CF7825B3B9EA6A98C83AC41F7099D67007EA5 cert=xpmQtKUqQ/6v5X7ijgYE/f03+l2/EuQ1dexjyUhh16wQlu/cpXUGalmhDIlhuiQPNEKmKw iat-mode=0
bridge obfs4 192.99.11.54:443 7B126FAB960E5AC6A629C729434FF84FB5074EC2 cert=VW5f8+IBUWpPFxF+rsiVy2wXkyTQG7vEd+rHeN2jV5LIDNu8wMNEOqZXPwHdwMVEBdqXEw iat-mode=0
bridge obfs4 109.105.109.165:10527 8DFCD8FB3285E855F5A55EDDA35696C743ABFC4E cert=Bvg/itxeL4TWKLP6N1MaQzSOC6tcRIBv6q57DYAZc3b2AzuM+/TfB7mqTFEfXILCjEwzVA iat-mode=1
bridge obfs4 83.212.101.3:50002 A09D536DD1752D542E1FBB3C9CE4449D51298239 cert=lPRQ/MXdD1t5SRZ9MquYQNT9m5DV757jtdXdlePmRCudUU9CFUOX1Tm7/meFSyPOsud7Cw iat-mode=0
bridge obfs4 109.105.109.147:13764 BBB28DF0F201E706BE564EFE690FE9577DD8386D cert=KfMQN/tNMFdda61hMgpiMI7pbwU1T+wxjTulYnfw+4sgvG0zSH7N7fwT10BI8MUdAD7iJA iat-mode=2
bridge obfs4 154.35.22.11:16488 A832D176ECD5C7C6B58825AE22FC4C90FA249637 cert=YPbQqXPiqTUBfjGFLpm9JYEFTBvnzEJDKJxXG5Sxzrr/v2qrhGU4Jls9lHjLAhqpXaEfZw iat-mode=0
bridge obfs4 154.35.22.12:80 00DC6C4FA49A65BD1472993CF6730D54F11E0DBB cert=N86E9hKXXXVz6G7w2z8wFfhIDztDAzZ/3poxVePHEYjbKDWzjkRDccFMAnhK75fc65pYSg iat-mode=0
bridge obfs4 154.35.22.13:443 FE7840FE1E21FE0A0639ED176EDA00A3ECA1E34D cert=fKnzxr+m+jWXXQGCaXe4f2gGoPXMzbL+bTBbXMYXuK0tMotd+nXyS33y2mONZWU29l81CA iat-mode=0
bridge obfs4 154.35.22.10:80 8FB9F4319E89E5C6223052AA525A192AFBC85D55 cert=GGGS1TX4R81m3r0HBl79wKy1OtPPNR2CZUIrHjkRg65Vc2VR8fOyo64f9kmT1UAFG7j0HQ iat-mode=0
bridge obfs4 154.35.22.10:443 8FB9F4319E89E5C6223052AA525A192AFBC85D55 cert=GGGS1TX4R81m3r0HBl79wKy1OtPPNR2CZUIrHjkRg65Vc2VR8fOyo64f9kmT1UAFG7j0HQ iat-mode=0
bridge obfs4 154.35.22.11:443 A832D176ECD5C7C6B58825AE22FC4C90FA249637 cert=YPbQqXPiqTUBfjGFLpm9JYEFTBvnzEJDKJxXG5Sxzrr/v2qrhGU4Jls9lHjLAhqpXaEfZw iat-mode=0
bridge obfs4 154.35.22.11:80 A832D176ECD5C7C6B58825AE22FC4C90FA249637 cert=YPbQqXPiqTUBfjGFLpm9JYEFTBvnzEJDKJxXG5Sxzrr/v2qrhGU4Jls9lHjLAhqpXaEfZw iat-mode=0
bridge obfs4 154.35.22.9:12166 C73ADBAC8ADFDBF0FC0F3F4E8091C0107D093716 cert=gEGKc5WN/bSjFa6UkG9hOcft1tuK+cV8hbZ0H6cqXiMPLqSbCh2Q3PHe5OOr6oMVORhoJA iat-mode=0
bridge obfs4 154.35.22.9:80 C73ADBAC8ADFDBF0FC0F3F4E8091C0107D093716 cert=gEGKc5WN/bSjFa6UkG9hOcft1tuK+cV8hbZ0H6cqXiMPLqSbCh2Q3PHe5OOr6oMVORhoJA iat-mode=0
bridge obfs4 154.35.22.9:443 C73ADBAC8ADFDBF0FC0F3F4E8091C0107D093716 cert=gEGKc5WN/bSjFa6UkG9hOcft1tuK+cV8hbZ0H6cqXiMPLqSbCh2Q3PHe5OOr6oMVORhoJA iat-mode=0
bridge obfs4 154.35.22.12:4304 00DC6C4FA49A65BD1472993CF6730D54F11E0DBB cert=N86E9hKXXXVz6G7w2z8wFfhIDztDAzZ/3poxVePHEYjbKDWzjkRDccFMAnhK75fc65pYSg iat-mode=0
bridge obfs4 154.35.22.13:16815 FE7840FE1E21FE0A0639ED176EDA00A3ECA1E34D cert=fKnzxr+m+jWXXQGCaXe4f2gGoPXMzbL+bTBbXMYXuK0tMotd+nXyS33y2mONZWU29l81CA iat-mode=0
bridge obfs4 192.95.36.142:443 CDF2E852BF539B82BD10E27E9115A31734E378C2 cert=qUVQ0srL1JI/vO6V6m/24anYXiJD3QP2HgzUKQtQ7GRqqUvs7P+tG43RtAqdhLOALP7DJQ iat-mode=1
bridge obfs4 85.17.30.79:443 FC259A04A328A07FED1413E9FC6526530D9FD87A cert=RutxZlu8BtyP+y0NX7bAVD41+J/qXNhHUrKjFkRSdiBAhIHIQLhKQ2HxESAKZprn/lR3KA iat-mode=0
bridge obfs4 38.229.1.78:80 C8CBDB2464FC9804A69531437BCF2BE31FDD2EE4 cert=Hmyfd2ev46gGY7NoVxA9ngrPF2zCZtzskRTzoWXbxNkzeVnGFPWmrTtILRyqCTjHR+s9dg iat-mode=1
bridge obfs4 38.229.33.83:80 0BAC39417268B96B9F514E7F63FA6FBA1A788955 cert=VwEFpk9F/UN9JED7XpG1XOjm/O8ZCXK80oPecgWnNDZDv5pdkhq1OpbAH0wNqOT6H6BmRQ iat-mode=1
bridge obfs4 37.218.240.34:40035 88CD36D45A35271963EF82E511C8827A24730913 cert=eGXYfWODcgqIdPJ+rRupg4GGvVGfh25FWaIXZkit206OSngsp7GAIiGIXOJJROMxEqFKJg iat-mode=1
bridge obfs4 37.218.245.14:38224 D9A82D2F9C2F65A18407B1D2B764F130847F8B5D cert=bjRaMrr1BRiAW8IE9U5z27fQaYgOhX1UCmOpg2pFpoMvo6ZgQMzLsaTzzQNTlm7hNcb+Sg iat-mode=0
DisableNetwork 0
===> Done parsing /usr/local/etc/torrc.d/40_tor_control_panel.conf
%include /usr/local/etc/torrc.d/50_user.conf
===> Parsing /usr/local/etc/torrc.d/50_user.conf
===> Done parsing /usr/local/etc/torrc.d/50_user.conf
===> Done parsing /etc/torrc.d/95_whonix.conf
===> Done parsing /etc/tor/torrc
=====================================================================
user@host:~$
1 Like

Looks really good. No issues as far as I can see.

Can you still reproduce that whonixcheck error?

1 Like

Nope not anymore atm.

1 Like
  • This issue mostly needs graphical fixation but just reporting it to be notified:

Tor-Control-Panel has extra bridge (snowflake) feature which are missed in ACW & normal TBB: (it seems doesnt has any effect)

torcontrol

torcontrol2


  • Whonix-WS-15 Only issue when its connected to GW it shows yellow sign. (no other templates showing that like e.g whonix 14 or debian …etc)

1 Like

installing git-all package will results into damaging Whonix-ws-15:

https://privatebin.net/?3e85d10070c10735#9Q8yy+JMmmSYyelnUPtmbN4belioCLQ4PNITf2ZZ0GU=

This issue only in Whonix not in Debian template.

Command used:

sudo apt install git-all

1 Like

Hello,
I have been testing Whonix 15 for a couple of days. So far, so god. However, the above mentioned problem with Thunar remains.

apt-get install qubes-core-agent-thunar

does not fix it.

Cheers.

1 Like

Debian buster template now available? See:

https://github.com/QubesOS/updates-status/issues/1161

https://github.com/QubesOS/qubes-issues/issues/4970#issuecomment-504000252

[Imprint] [Privacy Policy] [Cookie Policy] [Terms of Use] [E-Sign Consent] [DMCA] [Contributors] [Investors] [Priority Support] [Professional Support]