Also sorry about not using the correct terminology, I edited my question.
So should I use the Tor Browser from within the Workstation, but prevent the Tor Browser from connecting to Tor (to avoid Tor over Tor)? Or should I let the Tor Browser use SocksPort?
If you use Tor Browser in Whonix-Workstation, there won’t be Tor over Tor. No configuration needed. All pre-configured for you by Whonix already. Just connect to onions.
I’m doing this mostly to learn. So I’m really curious how I can use .onion services safely from a custom Whonix workstation, say Gentoo or Arch. I also prefer Arch and Gentoo, probably no surprise.
Is it possible to install the Whonix Tor Browser, i.e. the special version of Tor Browser that comes bundled with Whonix Workstation, in a different distro (custom Whonix Workstation)?
Ignore grep / unrelated. Compare with output on gateway to figure out how it would look if Tor was running.
This works only for Tor Browser and is not a general way to check for Tor over Tor. (Because Tor Browser uses the tor binary. Other applications may be implementing Tor in other ways such as bisq if I remember right.)
arm wouldn’t show it. It only shows information on Tor but not monitor outgoing connection to any servers (Tor or not).
Created a Tor Browser without Tor “VM” and Tor daemon returns the same result as the above post. Meaning that test was invalid.
Edit: The VM that I used was created some time ago with a mix of Tor Browser (GUI) and CLI instructions from the previous wiki page. (meaning instructions are a little different now). IIRC the $HOME/.tb/path/to/user.js edits were not sufficient.
Note: will be referring to this VM as “tor-browser-test”
user@tor-browser-test:~$ sudo systemctl status tor@default
● tor@default.service - Anonymizing overlay network for TCP
Loaded: loaded (/lib/systemd/system/tor@default.service; static; vendor prese
Drop-In: /lib/systemd/system/tor@default.service.d
└─30_qubes.conf
Active: active (running) since Sat 2018-12-29 21:15:39 EST; 35s ago
Process: 633 ExecStartPre=/usr/bin/tor --defaults-torrc /usr/share/tor/tor-ser
Process: 609 ExecStartPre=/usr/bin/install -Z -m 02755 -o debian-tor -g debian
Main PID: 707 (tor)
Tasks: 1 (limit: 4915)
CGroup: /system.slice/system-tor.slice/tor@default.service
└─707 /usr/bin/tor --defaults-torrc /usr/share/tor/tor-service-defaul
Dec 29 21:15:45 tor-browser-test Tor[707]: Bootstrapped 50%: Loading relay descr
Dec 29 21:15:45 tor-browser-test Tor[707]: The current consensus contains exit n
Dec 29 21:15:46 tor-browser-test Tor[707]: Bootstrapped 55%: Loading relay descr
Dec 29 21:15:46 tor-browser-test Tor[707]: Bootstrapped 62%: Loading relay descr
Dec 29 21:15:46 tor-browser-test Tor[707]: Bootstrapped 68%: Loading relay descr
Dec 29 21:15:47 tor-browser-test Tor[707]: Bootstrapped 78%: Loading relay descr
Dec 29 21:15:47 tor-browser-test Tor[707]: Bootstrapped 80%: Connecting to the T
Dec 29 21:15:47 tor-browser-test Tor[707]: Bootstrapped 90%: Establishing a Tor
Dec 29 21:15:48 tor-browser-test Tor[707]: Tor has successfully opened a circuit
Dec 29 21:15:48 tor-browser-test Tor[707]: Bootstrapped 100%: Done
When sys-firewall was set as NetVM for tor-browser-test , there were no issues with clearnet connectivity. However, even after setting network.dns.blockDotOnion in about:config , I was not able to connect to any .onion sites (whonix, qubes, torproject).
Also of note, I received the warning:
Something Went Wrong! Tor is not working in this browser.
When sys-whonix was set to NetVM I was able to connect to onion sites. However, I did not receive the warning “Something Went Wrong! Tor is not working in this browser.”
For clarity, for now this is just for testing to use for comparson. If anyone would like to use these instructions this should be kept that in mind.
Qubes-Whonix
Debian 9 StandaloneVM (NetVM sys-whonix)
Tor Browser 8.0.4
1. I went ahead an installed anon-ws-disable-stacked-tor in the StandaloneVM using apt-get as per the instructions on that page. 2. Created /home/user/.tb and installed Tor Browser using the instructions found in Manually Download Tor Browser. 3. Extracted Tor Browser in ~/.tb
4. When first starting Tor Browser it will fail. Rebooting the VM was necessary for Tor Browser to start but this only needed to be done once. This happened with both VMs tested. 5. After reboot, Tor Browser starts and connects with no issues and as expected the Tor daemon was not started.
Prevent Tor over Tor for Tor Browser by Tor Browser only by settings. Only for Tor Browser’s internal Tor.
This is not a stronger (but still non-perfect) prevention like anon-ws-disable-stacked-tor. So installing torbrowser-launcher (Tor Browser Advanced Topics) will lead to Tor over Tor since this is using system-tor i.e. the debian tor package.
Wiki enhancements welcome. If worse comes to worse just a link to the most related/first post in this thread.
Means Tor is running in both so Tor over Tor.
One reason could be that anon-ws-disable-stacked-tor env vars are not applied right after installation. Reboot required for now. I wouldn’t know how to technically change env vars for already running sessions. Not thinking much about it either. [Patches welcome.](https://www.whonix.org/wiki/FAQ#Patches_are_Welcome)