First off, I love the Qubes / Whonix package, very excited for RC 4 official release. Thank you to any of the developers if you’re reading.
So this setup : sys-net -> sys-firewall -> sys-VPN1 (proxyVM) -> sys-whonix (proxyVM from whonix-gw) -> whonix-ws (appVM from whonix-ws). This works fine.
So this setup : sys-net -> sys-firewall -> sys-VPN1 (proxyVM) -> sys-VPN2 (proxyVM) -> sys-whonix (proxyVM from whonix-gw) -> whonix-ws (appVM from whonix-ws). Also this works fine.
So this setup : sys-net -> sys-firewall -> sys-VPN1 (proxyVM) -> sys-whonix (proxyVM from whonix-gw) -> sys-VPN2 (proxyVM) -> (plan to create here appVMs HVMs whatever). I can’t figure how to get this to work as I want.
The VPN proxyVMs are created using the CLI method from Qubes official Docs (which are great docs also). In the final setup, when I check the public IP of VPN2 proxyVM it is a Tor IP. Not my VPN IP. Yes I know I can setup VPN2 inside whonix-ws appVM, but I prefer the Qubes approach.
So how can I make proxyVM based on whonix-gw through tor work? For if I want to run example Kali HVMs over VPN-Tor-VPN.