[quote=“chadsec, post:4, topic:22017”]
Workstation has no access to your LAN.[/quote]
Of course, I understood this from the very beginning.
[quote=“chadsec, post:4, topic:22017”]
You will have to expose your local VM SSH port to the internet[/quote]
Sorry, but I am not allowed to connect my VM to the Internet.
I need to configure my VM to connect only to Workstation.
To do this, I will probably need to make some changes to my Workstation settings.
But unfortunately, I don’t know what these settings are.
– this method of yours is even more risky, because the data from my confidential VM is will sent to the aggressive Internet.
But my local network is not aggressive, but safe for my data.
This isn’t a discussion about the safest way, I am telling you, you cannot access your LAN through Whonix workstation, this is by design.
You could make Whonix workstation access your LAN but it will require major modifications both in VM and in the VM settings and network configuration.
All of which is unsupported by Whonix. We cannot help you with this.
Hence, the only feasible (and supported) way is if the endpoint you wish to SSH into, is accessible through the internet.
May I ask , why do you even want to SSH into another VM, within Whonix ? Why can’t you just SSH on your host ?
I understand you. Well, then I simply ask you to consider this issue for a possible change in Whonix policy to improve its capabilities in the future.
Please familiarize yourself with this typical situation.
There works a VM Windows on the local network, which processes confidential data using unique applications that which are missing for Linux OS.
Windows is a weakly protected OS, so it cannot be given access to the Internet even through a Whonix.Gateway.
The only way to protect Windows from confidential data leakage is to transfer its data to the Internet through an intermediate protective link: Whonix.Workstation + Whonix.Gateway, by first putting this data in Whonix.Workstation.
However, Windows cannot connect to Whonix.Workstation and also vice versa due to Whonix strict policy.
This is a typical situation that is often encountered by users who work on the Internet and want to have reliable protection for their confidential data.
Please consider this petition to solve this problem in the future, and then Whonix will become even better
From what I understand, you have a local VM, you want to SSH into, while being inside Whonix-Workstation.
Currently, this is impossible to do unless you do major configuration edit in how Whonix is networked… But assuming you do this , then there’s no point in using Whonix. You could just install any Linux distro in a VM, torify everything and still be able to access your LAN.
is equally good as in theory:
B) Windows → Whonix-Workstation → Whonix-Gateway.
[1] I am not sure such a feature would be even possible, secure.
It’s not a policy. I am not against that. It’s just complicated to configure that, because (Linux) networking is complicated. (If it was easy, there would be no reason to ask.)
To add to this: if OP decided to do this. He would need to break the link between Whonix-workstation and Whonix-gateway… which means he would have to both configure stuff inside of the workstation’s VM to work again somehow, and also configure the VM’s (virtualbox) settings to make Whonix-workstation use NAT.
Essentially making Whonix, … not Whonix lol
Was I wrong in saying this is unsupported by Whonix ?
Before turning to you for help on the forum, I tried two solutions to this problem:
I added an additional eth1 interface to the Whonix.Workstation and tried to connect their Fedora VM to it. Unfortunately, this was unsuccessful.
I used a bridge connection. Unfortunately, this also did not produce the desired result.
Maybe I made a mistake in their settings?
You have added even more doubts about solving this problem using SSH.
Well, that leaves us with using KVM’s capabilities for data exchange: the 9p and virtiofs drivers. I tested them as well.
Unfortunately, the 9p driver is outdated and unreliable.
The virtiofs driver has another drawback: it is impossible to connect to the shared directory from two VMs at the same time.
In addition, these drivers have a common drawback: they do not encrypt own connections that transit through the host. Therefore, additional encryption tools must be used, which significantly complicates the system.
Therefore, the best, simplest, and most reliable solution is SSH, which does not work here.