VPN ->TOR WhonixCheck does not work

Hello, when connected to a VPN on Whonix Gateway and connected to Tor, WhonixCheck an error: No network. Tor is disabled.
When checking the IP:

sudo su clearnet curl.anondist-orig --tlsv1 --proto =https -H 'Host: check.torproject.org' -k https://38.229.72.22 | grep IP
It gives the IP of my VPN.
On Whonix Workstation, checked the IP - IP tor exit node and WhonixCheck on WhonixWorkstation works.
Settings DNS I did not touch. Show you how to make that work Whonixcheck.

Are you sure that whonixcheck isn’t already telling you on how to fix this?

Please post the complete whonxicheck output [redact IPs].

Whonix check:

[INFO] [whonixcheck] Pin torproject.org certificate: disabled. [INFO] [whonixcheck] Root Check Result: Ok, not running as root. [INFO] [whonixcheck] Check Initializer Result: /var/lib/whonix-initializer/status-files/first_run_initializer.fail does not exist, ok. [INFO] [whonixcheck] Check Virtualizer Result (debug): systemd_detect_virt_result: oracle [INFO] [whonixcheck] Check Virtualizer Result: Supported Virtualizer VirtualBox detected, continuing. virt-what result: virtualbox [INFO] [whonixcheck] KVMClock Result: /sys/devices/system/clocksource/clocksource0/current_clocksource exist, is tsc, not kvm-clock, ok. [INFO] [whonixcheck] IP Forwarding Result: /proc/sys/net/ipv4/ip_forward is 0, ok. [INFO] [whonixcheck] Check whonixsetup Result: done, ok. [WARNING] [whonixcheck] Tor Check Result: No network. Tor is disabled. Please enable Tor! Start Menu -> Applications -> System -> Connection Wizard (Whonix) or in Terminal: sudo whonixsetup

Whonixsetup says: Tor networking is already enabled.

Openvpn config file:

[code]
client
dev tun
resolv-retry infinite
nobind
persist-key
persist-tun

remote *.*.*.* * tcp

; SSL configuration.
ca …
cert …
key …
crl-verify …
ns-cert-type server
tls-auth … 1[/code]

50_user:

[code]###########################

VPN-Firewall Settings

###########################

Make sure Tor always connects through the VPN.

Enable: 1

Disable: 0

DISABELD BY DEFAULT, because it requires a VPN provider.

VPN_FIREWALL=1

IP address of the VPN server.

Get the IP using: nslookup vpn-example-server.org

Example: seattle.vpn.riseup.net

Some providers provide multiple VPN servers.

You can enter multiple IP addresses, separated by spaces.

VPN_SERVERS=“...

For OpenVPN.

VPN_INTERFACE=tun0

Destinations you don not want routed through the VPN.

10.0.2.2/24: VirtualBox DHCP

LOCAL_NET=“192.168.1.0/24 192.168.0.0/24 127.0.0.0/8 10.152.152.0/24 10.0.2.2/24”[/code]

Please enable Tor! Start Menu -> Applications -> System -> Connection Wizard (Whonix) or in Terminal: sudo whonixsetup
Why not just do this?

I did - the same result. WhonixSetup message:Tor networking is already enabled.
Next autostart whonixcheck: WARNING: Tor Check Result: No network. Tor is disabled

Post your /etc/tor/torrc. [redact IPs if any]

It should include…

Unless you removed it. If you removed it, re-add.

/etc/tor/torrc

[code]# This file is part of Whonix

Copyright © 2012 - 2013 adrelanos

See the file COPYING for copying conditions.

Use this file for your user customizations.

Please see /etc/tor/torrc.examples for help, options, comments etc.

Anything here will override Whonix’s own Tor config customizations in

/usr/share/tor/tor-service-defaults-torrc

Enable Tor through whonixsetup or manually uncomment “DisableNetwork 0” by

removing the # in front of it.

DisableNetwork 0[/code]

Should work.

Please post the output of.

[code]~$ bash -x whonixcheck

  • set -e
  • set -o pipefail
  • set -o errtrace
  • NOTIFY_MSG=‘Checking Tor Connection, Tor Browser Version, Operating System Updates, Whonix Version, Whonix News…
    This will happen in background and will take approximately three minutes…’
  • ICON=/usr/share/icons/anon-icon-pack/whonix.ico
    ++ basename /usr/bin/whonixcheck
  • SCRIPTNAME=whonixcheck
  • IDENTIFIER=whonixcheck
  • bash -n /usr/lib/msgcollector/error_handler
  • source /usr/lib/msgcollector/error_handler
  • trap error_handler ERR
  • set +e
  • bash -n /usr/lib/anon-shared-helper-scripts/tor_enabled_check
  • source /usr/lib/anon-shared-helper-scripts/tor_enabled_check
  • bash -n /usr/lib/anon-shared-helper-scripts/pkg_manager_running_check
  • source /usr/lib/anon-shared-helper-scripts/pkg_manager_running_check
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/autostart ‘]’
  • ‘[’ t = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/autostart
  • bash -n /usr/lib/whonixcheck/autostart
  • source /usr/lib/whonixcheck/autostart
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/check_apt_repository ‘]’
  • ‘[’ y = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/check_apt_repository
  • bash -n /usr/lib/whonixcheck/check_apt_repository
  • source /usr/lib/whonixcheck/check_apt_repository
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/check_control_port_filter ‘]’
  • ‘[’ r = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/check_control_port_filter
  • bash -n /usr/lib/whonixcheck/check_control_port_filter
  • source /usr/lib/whonixcheck/check_control_port_filter
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/check_entropy ‘]’
  • ‘[’ y = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/check_entropy
  • bash -n /usr/lib/whonixcheck/check_entropy
  • source /usr/lib/whonixcheck/check_entropy
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/check_hostname ‘]’
  • ‘[’ e = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/check_hostname
  • bash -n /usr/lib/whonixcheck/check_hostname
  • source /usr/lib/whonixcheck/check_hostname
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/check_initializer ‘]’
  • ‘[’ r = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/check_initializer
  • bash -n /usr/lib/whonixcheck/check_initializer
  • source /usr/lib/whonixcheck/check_initializer
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/check_ip_forwarding_disabled ‘]’
  • ‘[’ d = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/check_ip_forwarding_disabled
  • bash -n /usr/lib/whonixcheck/check_ip_forwarding_disabled
  • source /usr/lib/whonixcheck/check_ip_forwarding_disabled
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/check_kvmclock ‘]’
  • ‘[’ k = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/check_kvmclock
  • bash -n /usr/lib/whonixcheck/check_kvmclock
  • source /usr/lib/whonixcheck/check_kvmclock
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/check_lastrun ‘]’
  • ‘[’ n = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/check_lastrun
  • bash -n /usr/lib/whonixcheck/check_lastrun
  • source /usr/lib/whonixcheck/check_lastrun
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/check_logs ‘]’
  • ‘[’ s = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/check_logs
  • bash -n /usr/lib/whonixcheck/check_logs
  • source /usr/lib/whonixcheck/check_logs
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/check_news ‘]’
  • ‘[’ s = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/check_news
  • bash -n /usr/lib/whonixcheck/check_news
  • source /usr/lib/whonixcheck/check_news
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/check_operating_system ‘]’
  • ‘[’ m = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/check_operating_system
  • bash -n /usr/lib/whonixcheck/check_operating_system
  • source /usr/lib/whonixcheck/check_operating_system
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/check_package_manager_running ‘]’
  • ‘[’ g = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/check_package_manager_running
  • bash -n /usr/lib/whonixcheck/check_package_manager_running
  • source /usr/lib/whonixcheck/check_package_manager_running
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/check_packages ‘]’
  • ‘[’ s = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/check_packages
  • bash -n /usr/lib/whonixcheck/check_packages
  • source /usr/lib/whonixcheck/check_packages
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/check_stream_isolation ‘]’
  • ‘[’ n = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/check_stream_isolation
  • bash -n /usr/lib/whonixcheck/check_stream_isolation
  • source /usr/lib/whonixcheck/check_stream_isolation
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/check_tor_bootstrap ‘]’
  • ‘[’ p = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/check_tor_bootstrap
  • bash -n /usr/lib/whonixcheck/check_tor_bootstrap
  • source /usr/lib/whonixcheck/check_tor_bootstrap
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/check_torbrowser ‘]’
  • ‘[’ r = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/check_torbrowser
  • bash -n /usr/lib/whonixcheck/check_torbrowser
  • source /usr/lib/whonixcheck/check_torbrowser
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/check_tor_config ‘]’
  • ‘[’ g = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/check_tor_config
  • bash -n /usr/lib/whonixcheck/check_tor_config
  • source /usr/lib/whonixcheck/check_tor_config
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/check_tor_enabled ‘]’
  • ‘[’ d = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/check_tor_enabled
  • bash -n /usr/lib/whonixcheck/check_tor_enabled
  • source /usr/lib/whonixcheck/check_tor_enabled
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/check_tor_pid ‘]’
  • ‘[’ d = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/check_tor_pid
  • bash -n /usr/lib/whonixcheck/check_tor_pid
  • source /usr/lib/whonixcheck/check_tor_pid
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/check_tor_socks_or_trans_port ‘]’
  • ‘[’ t = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/check_tor_socks_or_trans_port
  • bash -n /usr/lib/whonixcheck/check_tor_socks_or_trans_port
  • source /usr/lib/whonixcheck/check_tor_socks_or_trans_port
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/check_tor_socks_port_reachability ‘]’
  • ‘[’ y = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/check_tor_socks_port_reachability
  • bash -n /usr/lib/whonixcheck/check_tor_socks_port_reachability
  • source /usr/lib/whonixcheck/check_tor_socks_port_reachability
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/check_virtualizer ‘]’
  • ‘[’ r = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/check_virtualizer
  • bash -n /usr/lib/whonixcheck/check_virtualizer
  • source /usr/lib/whonixcheck/check_virtualizer
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/check_whonixsetup_done ‘]’
  • ‘[’ e = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/check_whonixsetup_done
  • bash -n /usr/lib/whonixcheck/check_whonixsetup_done
  • source /usr/lib/whonixcheck/check_whonixsetup_done
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/cleanup ‘]’
  • ‘[’ p = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/cleanup
  • bash -n /usr/lib/whonixcheck/cleanup
  • source /usr/lib/whonixcheck/cleanup
    ++ trap trap_sigterm SIGTERM
    ++ trap trap_sigint SIGINT
    ++ trap trap_sigusr2 SIGUSR2
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/disclaimer ‘]’
  • ‘[’ r = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/disclaimer
  • bash -n /usr/lib/whonixcheck/disclaimer
  • source /usr/lib/whonixcheck/disclaimer
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/donate ‘]’
  • ‘[’ e = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/donate
  • bash -n /usr/lib/whonixcheck/donate
  • source /usr/lib/whonixcheck/donate
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/help_cli ‘]’
  • ‘[’ i = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/help_cli
  • bash -n /usr/lib/whonixcheck/help_cli
  • source /usr/lib/whonixcheck/help_cli
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/parse_cmd ‘]’
  • ‘[’ d = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/parse_cmd
  • bash -n /usr/lib/whonixcheck/parse_cmd
  • source /usr/lib/whonixcheck/parse_cmd
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/pin_ssl_cert ‘]’
  • ‘[’ t = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/pin_ssl_cert
  • bash -n /usr/lib/whonixcheck/pin_ssl_cert
  • source /usr/lib/whonixcheck/pin_ssl_cert
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/preparation ‘]’
  • ‘[’ n = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/preparation
  • bash -n /usr/lib/whonixcheck/preparation
  • source /usr/lib/whonixcheck/preparation
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/process_killer_helper ‘]’
  • ‘[’ r = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/process_killer_helper
  • bash -n /usr/lib/whonixcheck/process_killer_helper
  • source /usr/lib/whonixcheck/process_killer_helper
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/root_check ‘]’
  • ‘[’ k = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/root_check
  • bash -n /usr/lib/whonixcheck/root_check
  • source /usr/lib/whonixcheck/root_check
  • for i in ‘/usr/lib/whonixcheck/*’
  • ‘[’ -f /usr/lib/whonixcheck/uwt_tool ‘]’
  • ‘[’ l = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /usr/lib/whonixcheck/uwt_tool
  • bash -n /usr/lib/whonixcheck/uwt_tool
  • source /usr/lib/whonixcheck/uwt_tool
  • whonixcheck_main
  • trap error_handler ERR
  • parse_cmd_options
  • AUTOSTARTED=0
  • CURL_VERBOSE=–silent
  • :
  • case $1 in
  • break
  • preparation
  • ‘[’ -e /var/run/whonixcheck/whonixcheck_pid ‘]’
  • local oldpid
    ++ cat /var/run/whonixcheck/whonixcheck_pid
  • oldpid=24073
  • ‘[’ ‘!’ 24073 = ‘’ ‘]’
  • lastpid=24073
  • process_killer_helper
    ++ type -t error_handler
  • ‘[’ function = function ‘]’
  • trap error_handler ERR
  • ‘[’ 24073 = ‘’ ‘]’
  • local ps_p_exit_code
  • ps_p_exit_code=0
  • ps -p 24073
  • ps_p_exit_code=1
  • true
  • ‘[’ ‘!’ 1 = 0 ‘]’
  • return 0
  • unset lastpid
  • rm --force /var/run/whonixcheck/whonixcheck_done
  • rm --force /var/run/whonixcheck/whonixcheck_recently_run
  • sudo -u user touch /var/run/whonixcheck/whonixcheck_running
  • sudo -u user tee /var/run/whonixcheck/whonixcheck_pid
  • echo 28767
  • sync
  • ‘[’ ‘’ = ‘’ ‘]’
  • ‘[’ :0 = ‘’ ‘]’
  • display=:0
  • local my_tty
  • local my_tty_exit_code
  • my_tty_exit_code=0
    ++ tty
  • my_tty=/dev/pts/0
  • ‘[’ ‘!’ 0 = 0 ‘]’
  • ‘[’ /dev/pts/0 = ‘’ ‘]’
  • user_name=user
  • WHONIX_HOMEPAGE=https://www.whonix.org
    ++ mktemp --directory
  • TEMP_DIR=/tmp/tmp.UlaxENzPsv
  • export TEMP_DIR
  • get_local_whonix_version
  • ‘[’ -f /usr/share/anon-gw-base-files/gateway ‘]’
  • whonix_deb_package_name=whonix-gateway-packages-dependencies
  • whonix_deb_package_version=‘Could not detect Whonix debian version. (Code: 1) Please report this bug!’
  • local dpkg_query_exit_code
  • dpkg_query_exit_code=0
    ++ dpkg-query --show ‘–showformat=${Version}’ whonix-gateway-packages-dependencies
  • whonix_deb_package_version=3:2.5-1
  • ‘[’ ‘!’ 0 = 0 ‘]’
    ++ awk -F : ‘{ print $2 }’
    ++ echo 3:2.5-1
  • whonix_deb_package_version=2.5-1
  • ‘[’ 2.5-1 = ‘’ ‘]’
  • whonix_build_version=‘Could not read Whonix Build Version File. (Code: 3) Please report this bug!’
  • local build_version_file
  • ‘[’ -f /usr/share/whonix/build_version ‘]’
  • ‘[’ -f /var/lib/anon-dist/build_version ‘]’
  • build_version_file=/var/lib/anon-dist/build_version
  • ‘[’ /var/lib/anon-dist/build_version = ‘’ ‘]’
  • ‘[’ -f /var/lib/anon-dist/build_version ‘]’
    ++ cat /var/lib/anon-dist/build_version
  • whonix_build_version=11.0.0.3.0
  • ‘[’ 11.0.0.3.0 = ‘’ ‘]’
  • chmod 700 /tmp/tmp.UlaxENzPsv
  • ‘[’ -f /usr/share/anon-gw-base-files/gateway ‘]’
  • VM=Whonix-Gateway
  • vm_lower_case_short=gateway
  • GATEWAY_IP=127.0.0.1
  • ‘[’ -f /etc/apt/sources.list.d/whonix.list ‘]’
  • whonix_codename=unknown
  • local i
  • read -r i
  • local first second third fourth
  • read -r first second third fourth _
  • ‘[’ ‘##’ = deb ‘]’
  • read -r i
  • local first second third fourth
  • read -r first second third fourth _
  • ‘[’ ‘##’ = deb ‘]’
  • read -r i
  • local first second third fourth
  • read -r first second third fourth _
  • ‘[’ ‘##’ = deb ‘]’
  • read -r i
  • local first second third fourth
  • read -r first second third fourth _
  • ‘[’ ‘’ = deb ‘]’
  • read -r i
  • local first second third fourth
  • read -r first second third fourth _
  • ‘[’ ‘##’ = deb ‘]’
  • read -r i
  • local first second third fourth
  • read -r first second third fourth _
  • ‘[’ ‘’ = deb ‘]’
  • read -r i
  • local first second third fourth
  • read -r first second third fourth _
  • ‘[’ ‘##’ = deb ‘]’
  • read -r i
  • local first second third fourth
  • read -r first second third fourth _
  • ‘[’ ‘##’ = deb ‘]’
  • read -r i
  • local first second third fourth
  • read -r first second third fourth _
  • ‘[’ ‘##’ = deb ‘]’
  • read -r i
  • local first second third fourth
  • read -r first second third fourth _
  • ‘[’ ‘##’ = deb ‘]’
  • read -r i
  • local first second third fourth
  • read -r first second third fourth _
  • ‘[’ ‘##’ = deb ‘]’
  • read -r i
  • local first second third fourth
  • read -r first second third fourth _
  • ‘[’ ‘##’ = deb ‘]’
  • read -r i
  • local first second third fourth
  • read -r first second third fourth _
  • ‘[’ ‘##’ = deb ‘]’
  • read -r i
  • local first second third fourth
  • read -r first second third fourth _
  • ‘[’ ‘##’ = deb ‘]’
  • read -r i
  • local first second third fourth
  • read -r first second third fourth _
  • ‘[’ ‘’ = deb ‘]’
  • read -r i
  • local first second third fourth
  • read -r first second third fourth _
  • ‘[’ deb = deb ‘]’
  • whonix_codename=jessie
  • break
  • whonix_codename_uppercase=JESSIE
  • ‘[’ ‘’ = 1 ‘]’
  • ‘[’ 0 = 1 ‘]’
  • manualrun=1
    ++ uname --machine
  • ARCH=i686
    ++ date
  • TITLE=‘whonixcheck | Whonix-Gateway | 2.5-1 | Sat Aug 29 16:44:32 UTC 2015’
  • TPO_PIN_CERT_FILE=/usr/share/torbrowser-launcher/torproject.pem
  • CURL_TPO_PIN_CERT=‘–cacert /usr/share/torbrowser-launcher/torproject.pem’
  • output_tool=/usr/lib/msgcollector/msgcollector
  • output=output_func
    ++ whoami
  • who_ami=user
  • output_func --icon /usr/share/icons/anon-icon-pack/whonix.ico
  • ‘[’ ‘’ = true ‘]’
  • /usr/lib/msgcollector/msgcollector --identifier whonixcheck --whoami user --icon /usr/share/icons/anon-icon-pack/whonix.ico
  • return 0
  • output_func --parenttty /dev/pts/0
  • ‘[’ ‘’ = true ‘]’
  • /usr/lib/msgcollector/msgcollector --identifier whonixcheck --whoami user --parenttty /dev/pts/0
  • return 0
  • output_func --whoami user
  • ‘[’ ‘’ = true ‘]’
  • /usr/lib/msgcollector/msgcollector --identifier whonixcheck --whoami user --whoami user
  • return 0
  • output_func --titlex ‘whonixcheck | Whonix-Gateway | 2.5-1 | Sat Aug 29 16:44:32 UTC 2015’
  • ‘[’ ‘’ = true ‘]’
  • /usr/lib/msgcollector/msgcollector --identifier whonixcheck --whoami user --titlex ‘whonixcheck | Whonix-Gateway | 2.5-1 | Sat Aug 29 16:44:32 UTC 2015’
  • return 0
  • output_func --titlecli ‘whonixcheck | Whonix-Gateway | 2.5-1 | Sat Aug 29 16:44:32 UTC 2015’
  • ‘[’ ‘’ = true ‘]’
  • /usr/lib/msgcollector/msgcollector --identifier whonixcheck --whoami user --titlecli ‘whonixcheck | Whonix-Gateway | 2.5-1 | Sat Aug 29 16:44:32 UTC 2015’
  • return 0
  • output_func --lefttop
  • ‘[’ ‘’ = true ‘]’
  • /usr/lib/msgcollector/msgcollector --identifier whonixcheck --whoami user --lefttop
  • return 0
  • for i in ‘/etc/whonix.d/*’
  • ‘[’ -f /etc/whonix.d/30_aptrepository_default ‘]’
  • ‘[’ t = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /etc/whonix.d/30_aptrepository_default
  • bash -n /etc/whonix.d/30_aptrepository_default
  • source /etc/whonix.d/30_aptrepository_default
  • for i in ‘/etc/whonix.d/*’
  • ‘[’ -f /etc/whonix.d/30_whonixcheck_default ‘]’
  • ‘[’ t = ‘~’ ‘]’
  • grep -q .dpkg-
  • echo /etc/whonix.d/30_whonixcheck_default
  • bash -n /etc/whonix.d/30_whonixcheck_default
  • source /etc/whonix.d/30_whonixcheck_default
    ++ NOSLEEP=1
    ++ WHONIXCHECK_NO_EXIT_ON_UNSUPPORTED_VIRTUALIZER=0
    ++ WHONIXCHECK_NO_EXIT_ON_KVMCLOCK_DETECTION=0
    ++ WHONIXCHECK_DISABLE_SOCKS_PORT_TEST=0
    ++ WHONIXCHECK_NO_EXIT_ON_TRANS_PORT_DETECTION_FAILURE=0
    ++ WHONIXCHECK_DISABLE_TRANS_PORT_TEST=0
    ++ WHONIXCHECK_NO_EXIT_ON_IP_FORWARDING_DETECTION=0
    ++ date +%s
  • TIME_START=1440866672
  • local progressbaridx
    ++ cat /proc/sys/kernel/random/uuid
  • progressbaridx=a0ee12ef-1b82-4952-bcf0-62e533646834
  • whonixcheck_run_function uwt_tool
  • case $whonixcheck_skip_functions in
  • true ‘INFO: Running uwt_tool, because whonixcheck_skip_functions does not include it.’
  • eval uwt_tool
    ++ uwt_tool
    ++ ret=0
    ++ command -v curl.anondist-orig
    ++ ‘[’ 0 = 0 ‘]’
    ++ CURL=curl.anondist-orig
    ++ ret=0
    ++ command -v apt-get.anondist-orig
    ++ ‘[’ 0 = 0 ‘]’
    ++ APT_GET=apt-get.anondist-orig
  • whonixcheck_run_function pin_tpo_ssl_cert
  • case $whonixcheck_skip_functions in
  • true ‘INFO: Running pin_tpo_ssl_cert, because whonixcheck_skip_functions does not include it.’
  • eval pin_tpo_ssl_cert
    ++ pin_tpo_ssl_cert
    ++ ‘[’ ‘’ = true ‘]’
    ++ local ‘MSG=

    Pin torproject.org certificate: disabled.


    ++ ‘[’ ‘’ = 1 ‘]’
    ++ CURL_TPO_PIN_CERT=
    ++ true 'CURL_TPO_PIN_CERT: ’
  • ‘[’ ‘’ = ‘’ ‘]’
  • true
  • whonixcheck_run_function root_check
  • case $whonixcheck_skip_functions in
  • true ‘INFO: Running root_check, because whonixcheck_skip_functions does not include it.’
  • eval root_check
    ++ root_check
    ++ ‘[’ ‘!’ ‘’ = 0 ‘]’
    +++ id -u
    ++ ‘[’ 1000 ‘!=’ 0 ‘]’
    ++ local ‘MSG=

    Root Check Result: Ok, not running as root.


    ++ ‘[’ ‘’ = 1 ‘]’
  • whonixcheck_run_function check_initializer
  • case $whonixcheck_skip_functions in
  • true ‘INFO: Running check_initializer, because whonixcheck_skip_functions does not include it.’
  • eval check_initializer
    ++ check_initializer
    ++ local log_file start_file done_file done_file_compatiblity skip_file todo_file fail_file
    ++ log_file=/var/lib/whonix-initializer/status-files/first_run_initializer.log
    ++ start_file=/var/lib/whonix-initializer/status-files/first_run_initializer.start
    ++ done_file=/var/lib/whonix-initializer/status-files/first_run_initializer.done
    ++ done_file_compatiblity=/root/.whonix/first_run_initializer.done
    ++ skip_file=/var/lib/whonix-initializer/status-files/first_run_initializer.skip
    ++ todo_file=/var/lib/whonix-initializer/status-files/first_run_initializer.todo
    ++ fail_file=/var/lib/whonix-initializer/status-files/first_run_initializer.fail
    ++ ‘[’ -f /var/lib/whonix-initializer/status-files/first_run_initializer.fail ‘]’
    ++ ‘[’ ‘’ = 1 ‘]’
  • whonixcheck_run_function check_virtualizer
  • case $whonixcheck_skip_functions in
  • true ‘INFO: Running check_virtualizer, because whonixcheck_skip_functions does not include it.’
  • eval check_virtualizer
    ++ check_virtualizer
    ++ local result
    +++ sudo virt-what
    ++ result=virtualbox
    ++ command -v systemd-detect-virt
    +++ systemd-detect-virt
    ++ systemd_detect_virt_result=oracle
    ++ local ‘MSG=

    Check Virtualizer Result (debug): systemd_detect_virt_result: oracle


    ++ ‘[’ ‘’ = 1 ‘]’
    ++ ‘[’ virtualbox = ‘’ ‘]’
    ++ ‘[’ virtualbox = virtualbox ‘]’
    ++ local ‘MSG=

    Check Virtualizer Result: Supported Virtualizer VirtualBox detected, continuing.


    virt-what result: virtualbox


    ++ ‘[’ ‘’ = 1 ‘]’
    ++ return 0
  • whonixcheck_run_function check_kvmclock
  • case $whonixcheck_skip_functions in
  • true ‘INFO: Running check_kvmclock, because whonixcheck_skip_functions does not include it.’
  • eval check_kvmclock
    ++ check_kvmclock
    ++ ‘[’ ‘!’ -f /sys/devices/system/clocksource/clocksource0/current_clocksource ‘]’
    ++ local current_clocksource
    +++ cat /sys/devices/system/clocksource/clocksource0/current_clocksource
    ++ current_clocksource=tsc
    ++ ‘[’ ‘!’ tsc = kvm-clock ‘]’
    ++ local ‘MSG=

    KVMClock Result: /sys/devices/system/clocksource/clocksource0/current_clocksource exist, is tsc, not kvm-clock, ok.


    ++ ‘[’ ‘’ = 1 ‘]’
    ++ return 0
  • whonixcheck_run_function check_ip_forwarding_disabled
  • case $whonixcheck_skip_functions in
  • true ‘INFO: Running check_ip_forwarding_disabled, because whonixcheck_skip_functions does not include it.’
  • eval check_ip_forwarding_disabled
    ++ check_ip_forwarding_disabled
    ++ ‘[’ ‘!’ -f /usr/share/anon-gw-base-files/gateway ‘]’
    ++ local file_list file_name
    ++ file_list=‘/proc/sys/net/ipv4/ip_forward /proc/sys/net/ipv6/ip_forward’
    ++ for file_name in ‘$file_list’
    ++ local ip_forwarding=
    ++ local temp=
    ++ local MSG=
    ++ ‘[’ ‘!’ -f /proc/sys/net/ipv4/ip_forward ‘]’
    +++ cat /proc/sys/net/ipv4/ip_forward
    ++ ip_forwarding=0
    ++ ‘[’ 0 = 0 ‘]’
    ++ local ‘MSG=

    IP Forwarding Result: /proc/sys/net/ipv4/ip_forward is 0, ok.


    ++ ‘[’ ‘’ = 1 ‘]’
    ++ continue
    ++ for file_name in ‘$file_list’
    ++ local ip_forwarding=
    ++ local temp=
    ++ local MSG=
    ++ ‘[’ ‘!’ -f /proc/sys/net/ipv6/ip_forward ‘]’
    ++ local ‘temp=/proc/sys/net/ipv6/ip_forward does not exist.’
    ++ ‘[’ /proc/sys/net/ipv6/ip_forward = /proc/sys/net/ipv6/ip_forward ‘]’
    ++ continue
  • whonixcheck_run_function check_whonixsetup_done
  • case $whonixcheck_skip_functions in
  • true ‘INFO: Running check_whonixsetup_done, because whonixcheck_skip_functions does not include it.’
  • eval check_whonixsetup_done
    ++ check_whonixsetup_done
    ++ check_whonixsetup_done_do
    ++ ‘[’ -f /var/cache/whonix-setup-wizard/status-files/whonixsetup.done ‘]’
    ++ whonixsetup_done=1
    ++ return 0
    ++ ‘[’ 1 = 0 ‘]’
    ++ local ‘MSG=

    Check whonixsetup Result: done, ok.


    ++ ‘[’ ‘’ = 1 ‘]’
  • whonixcheck_run_function check_tor_enabled
  • case $whonixcheck_skip_functions in
  • true ‘INFO: Running check_tor_enabled, because whonixcheck_skip_functions does not include it.’
  • eval check_tor_enabled
    ++ check_tor_enabled
    ++ check_tor_enabled_do
    ++ ‘[’ ‘!’ -e /usr/share/anon-gw-base-files/gateway ‘]’
    ++ ‘[’ ‘!’ -e /etc/tor/torrc ‘]’
    ++ local line
    ++ read -r line
    ++ ‘[’ ‘# This file is part of Whonix’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘# Copyright (C) 2012 - 2013 adrelanos ’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘# See the file COPYING for copying conditions.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘# Use this file for your user customizations.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘# Please see /etc/tor/torrc.examples for help, options, comments etc.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘# Anything here will override Whonix’'‘s own Tor config customizations in’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘# /usr/share/tor/tor-service-defaults-torrc’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘# Enable Tor through whonixsetup or manually uncomment “DisableNetwork 0” by’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘# removing the # in front of it.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ unset line
    ++ read -r line
    ++ ‘[’ ‘## This file is part of Whonix.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Copyright (C) 2012 - 2014 Patrick Schleizer adrelanos@riseup.net’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## See the file COPYING for copying conditions.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘# Please use “/etc/tor/torrc” for your custom configuration,’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘# which will override the defaults found here. When this package is updated,’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘# this file may be overwritten.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## You can find the original upstream tor-service-defaults-torrc under’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## /usr/share/tor/tor-service-defaults-torrc.anondist-orig’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘######################################################################’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## DO NOT CHANGE ANYTHING BELOW, UNLESS YOU KNOW WHAT YOU ARE DOING! #’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## DO NOT CHANGE ANYTHING BELOW, UNLESS YOU KNOW WHAT YOU ARE DOING! #’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## DO NOT CHANGE ANYTHING BELOW, UNLESS YOU KNOW WHAT YOU ARE DOING! #’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## DO NOT CHANGE ANYTHING BELOW, UNLESS YOU KNOW WHAT YOU ARE DOING! #’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## DO NOT CHANGE ANYTHING BELOW, UNLESS YOU KNOW WHAT YOU ARE DOING! #’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘######################################################################’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘###################’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#### Internals torrc #’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘######################################’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘# Upstream Defaults File #’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘# Enable / Disable Tor #’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘# Leak Tests #’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘# General Settings #’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘# Workstation Trans/Dns-Port #’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘# Workstation SocksPorts #’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘# Gateway Trans/Dns-Port #’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘# Gateway SocksPorts #’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#####################################’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#########################################’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Upstream Defaults File #’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#########################################’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## These defaults are taken from /usr/share/tor/tor-service-defaults-torrc’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## on Aug 2013 on Debian Jessi.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘DataDirectory /var/lib/tor’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘PidFile /var/run/tor/tor.pid’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘RunAsDaemon 1’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘User debian-tor’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘ControlSocket /var/run/tor/control’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘ControlSocketsGroupWritable 1’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘CookieAuthentication 1’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘CookieAuthFileGroupReadable 1’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘CookieAuthFile /var/run/tor/control.authcookie’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘Log notice file /var/log/tor/log’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#########################’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Enable / Disable Tor #’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#########################’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Tor is disabled by default.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Users are supposed to enable Tor through whonixsetup or manually’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## removing the # in front of “DisableNetwork 0” in /etc/tor/torrc.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘DisableNetwork 1’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#########################################’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Leak Tests #’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#########################################’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘##+# #OptionalFeatureNr.6# Leak Testing.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘##+#’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘##+# Manual Leak Testing:’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘##+# See Whonix/LeakTests. Activate this while testing for leaks. (Step 0)’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘##+# Deactivate after you are done! (Important!) (Step 9)’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘##+#’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘##+# Scripted Leak Testing:’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘##+# If you change the following two lines, beside removing the hash (#),’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘##+# beside commenting them in, you break the integrated leaktest script.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘##+# See leaktest_whonix_gateway() ed.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘##+# See Leak Tests’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘##+# on information, how to use the integrated leaktest script.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#ReachableDirAddresses *:80’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#ReachableORAddresses *:443’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#FascistFirewall 1’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#########################################’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## General Settings #’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#########################################’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## ControlPort is necessary for tor-arm and Vidalia.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## - Vidalia has to set /var/run/tor/control (default) as’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Control Cookie. (Not installed by default)’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## - Arm autodetects the Control Cookie. (Useful terminal Tor controller.)’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## - Tor Control Port Filter Proxy’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## - Not using HashedControlPassword or CookieAuthentication.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Gateway is no multi purpose machine. It is solely a’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Tor Gateway. As soon as an adversary has physical access’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## or compromised Gateway, it’'‘s Game Over anyway.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘ControlPort 9051’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘ControlListenAddress 127.0.0.1’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘Log notice syslog’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘Log notice file /run/tor/log’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#Log notice file /var/log/tor/log’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Not required:’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#DataDirectory /…’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#PidFile /…’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#ControlSocket /…’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#ControlSocketsGroupWritable 1’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#CookieAuthentication 1’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#CookieAuthFileGroupReadable 1’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#CookieAuthFile /…’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#########################################’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## mixmaster remailer #’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#########################################’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## REVIEW: Are the virtual IP addresses 1.1.1.1 and 2.2.2.2 appropriate or are different values better?’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘mapaddress 1.1.1.1 k54ids7luh523dbi.onion’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘mapaddress 2.2.2.2 gbhpq7eihle4btsn.onion’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#########################################’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Misc Settings #’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#########################################’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘VirtualAddrNetwork 10.192.0.0/10’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘AutomapHostsOnResolve 1’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘###############################’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Workstation Trans/Dns-Port #’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘###############################’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## (comment mirrored from /usr/bin/whonix_firewall)’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Transparent Proxy Port for Workstation’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## TRANS_PORT_WORKSTATION=“9040”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘##+# #OptionalFeatureNr.5# Best possible protection against Identity correlation through circuit sharing. ^5^’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘##’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## TransPort is not used for anything preinstalled by default.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Only as a catch all for user installed applications,’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## which is documented.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘##’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## IsolateDestAddr should not be activated by default,’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## if people install filesharing software it would be a nightmare if all connections to the massive amount’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## of destination IP’'‘s would go through separate circuits.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘##’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## For the same reason IsolateDestPort should not be activated by default, since BitTorrent (in some cases)’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## uses random ports.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘TransPort 10.152.152.10:9040’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## (comment mirrored from /usr/bin/whonix_firewall)’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## DNS_PORT_WORKSTATION=“53”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘##+# #OptionalFeatureNr.5# Best possible protection against Identity correlation through circuit sharing. ^5^’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘##’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## DnsPort is not used for anything preinstalled by default.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Only as a catch all for user installed applications,’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## which is documented.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘##’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Not sure about IsolateDestAddr.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## IsolateDestPort has probably very little effect, since most DNS servers listen on port 53.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘DnsPort 10.152.152.10:53 IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘###########################’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Workstation SocksPorts #’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘###########################’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## (comment mirrored from /usr/bin/whonix_firewall)’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Socks Ports for per application circuits.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## SOCKS_PORT_TOR_DEFAULT=“9050”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## SOCKS_PORT_TB=“9100”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## SOCKS_PORT_IRC=“9101”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## SOCKS_PORT_TORBIRDY=“9102”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## SOCKS_PORT_IM=“9103”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## SOCKS_PORT_APT_GET=“9104”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## SOCKS_PORT_GPG=“9105”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## SOCKS_PORT_SSH=“9106”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## SOCKS_PORT_GIT=“9107”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## SOCKS_PORT_SDWDATE=“9108”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## SOCKS_PORT_WGET=“9109”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## SOCKS_PORT_WHONIXCHECK=“9110”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## SOCKS_PORT_BITCOIN=“9111”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## SOCKS_PORT_PRIVOXY=“9112”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## SOCKS_PORT_POLIPO=“9113”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## SOCKS_PORT_WHONIX_NEWS=“9114”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## SOCKS_PORT_TBB_DOWNLOAD=“9115”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## SOCKS_PORT_TBB_GPG=“9116”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## SOCKS_PORT_CURL=“9117”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## SOCKS_PORT_RSS=“9118”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## SOCKS_PORT_TORCHAT=“9119”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## SOCKS_PORT_MIXMASTERUPDATE=“9120”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## SOCKS_PORT_MIXMASTER=“9121”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## SOCKS_PORT_KDE=“9122”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## SOCKS_PORT_GNOME=“9123”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## SOCKS_PORT_APTITUDE=“9124”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## SOCKS_PORT_TBB_DEFAULT=“9150”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Tor Default Port’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Only for applications, which expect Tor to be running on port 9050.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9050’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Web: Tor Browser’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Not using IsolateDestAddr IsolateDestPort, because too much’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## performance loss, too much load on Tor network and not secure.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Ticket Tor Browser should set SOCKS username for a request based on first party domain (#3455) · Issues · Legacy / Trac · GitLab’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## is the right way to solve this issue. Waiting for upstream.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9100’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#SocksPort 10.152.152.10:9100 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## IRC: XChat’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## People are normally not connected to too many IRC servers,’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## so they can use one circuit per server.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9101 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Mail: Thunderbird with TorBirdy’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Not preinstalled.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Not used by too many people. Most users do not connect to’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## too many servers.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9102 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Instant Messenger’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## People are normally not connected to too many IM servers,’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## so they can use one circuit per server.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9103 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Operating system updates: apt-get’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Not using IsolateDestAddr IsolateDestPort, because too much’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## performance loss, too much load on Tor network and no gain’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## in security.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9104’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## gpg’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Not used by too many people. Most users do not connect to’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## too many servers.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9105 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## ssh’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Not used by too many people. Most users do not connect to’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## too many servers.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9106 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## git’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Not preinstalled.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Not used by too many people. Most users do not connect to’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## too many servers.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9107 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Network Time Synchronization’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## There are only three different connections.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9108 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## command line downloader: wget’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Only manually and by very few applications used. Should not’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## hurt performance or Tor network. Very few connections are’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## expected.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9109 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## whonixcheck’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Only connects to https://check.torproject.org and checks IP’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## and Tor Browser version.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Only one server and only one port.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Would be fine without IsolateDestAddr IsolateDestPort,’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## but add it anyway to have less exceptions.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9110 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## BitCoin’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Not using IsolateDestAddr IsolateDestPort.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Makes too many connections to different servers. Should not’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## hurt if they get through the same circuit.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9111’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## http to socks converter: privoxy’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Not in use for anything preinstalled.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Not using IsolateDestAddr IsolateDestPort for the same reasons’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## as mentioned under Web: Tor Browser.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Only used for Thunderbird with TorBirdy, which is not’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## preinstalled.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9112’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## http to socks converter: polipo’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Not in use for anything preinstalled.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Not using IsolateDestAddr IsolateDestPort for the same reasons’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## as mentioned under Web: Tor Browser.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9113’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Whonix news download’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Only connects to the Whonix homepage and downloads a small file with’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## latest important Whonix news.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Only one server and only one port.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Would be fine without IsolateDestAddr IsolateDestPort,’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## but add it anyway to have less exceptions.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9114 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Tor Browser bundle download’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Rarely used.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Only one server and only one port.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Would be fine without IsolateDestAddr IsolateDestPort,’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## but add it anyway to have less exceptions.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9115 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Tor Browser gpg public key download’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Rarely used.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Only one server and only one port.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Would be fine without IsolateDestAddr IsolateDestPort,’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## but add it anyway to have less exceptions.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9116 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Curl’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Only manually and by very few applications used. Should not’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## hurt performance or Tor network. Very few connections are’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## expected.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9117 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## RSS’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## By default only for the Whonix Blog and for the torproject.org blog.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Few users expected to add their own feeds.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9118 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## TorChat’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Not using IsolateDestAddr or IsolateDestPort, because upstream’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## TorChat also does not do it. Since it only connects to’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## hidden services it would perhaps not make a difference anyway.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9119’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## mixmaster-update’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Few users expected to use it.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Since it only connects to one or very few servers using’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## IsolateDestAddr IsolateDestPort.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9120 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## mixmaster’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## This port is currently not in use. See Whonix mixmaster integration.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Mixmaster: Tor Remailer’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Few users expected to use it.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Since it only connects to one or very few servers using’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## IsolateDestAddr IsolateDestPort.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9121 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## KDE application wide proxy.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Not using IsolateDestAddr or IsolateDestPort, because also browsers’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## could use this port.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9122’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## GNOME application wide proxy.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## This port is currently not in use.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Not using IsolateDestAddr or IsolateDestPort, because also browsers’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## could use this port.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9123’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Operating system updates: aptitude’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Not using IsolateDestAddr IsolateDestPort, because too much’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## performance loss, too much load on Tor network and no gain’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## in security.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9124’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Tor Browser Bundle Default Port’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## This port gets used if someone uses the default Tor Browser Bundle.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## (rinetd runs on Workstation and forwards connections from’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## 127.0.0.1:9150 to 10.152.152.10:9150 [as part of the’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## anon-ws-disable-stacked-tor package].)’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Not using IsolateDestAddr IsolateDestPort, because too much’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## performance loss, too much load on Tor network and not secure.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Ticket Tor Browser should set SOCKS username for a request based on first party domain (#3455) · Issues · Legacy / Trac · GitLab’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## is the right way to solve this issue. Waiting for upstream.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9150’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Tor Messenger’'‘s default port’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## This port gets used if someone uses the default Tor Messenger.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## (rinetd runs on Workstation and forwards connections from’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## 127.0.0.1:9152 to 10.152.152.10:9152 [as part of the’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## anon-ws-disable-stacked-tor package].)’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9152’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘##+# #OptionalFeatureNr.4# More Socks Ports.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Custom Ports #1:’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## without IsolateDestAddr’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## without IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9153’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9154’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9155’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9156’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9157’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9158’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9159’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘##+# #OptionalFeatureNr.4# More Socks Ports.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Custom Ports #2:’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## with IsolateDestAddr’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## without IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9160 IsolateDestAddr’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9161 IsolateDestAddr’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9162 IsolateDestAddr’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9163 IsolateDestAddr’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9164 IsolateDestAddr’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9165 IsolateDestAddr’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9166 IsolateDestAddr’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9167 IsolateDestAddr’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9168 IsolateDestAddr’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9169 IsolateDestAddr’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘##+# #OptionalFeatureNr.4# More Socks Ports.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Custom Ports #3:’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## without IsolateDestAddr’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## with IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9170 IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9171 IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9172 IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9173 IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9174 IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9175 IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9176 IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9177 IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9178 IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9179 IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘##+# #OptionalFeatureNr.4# More Socks Ports.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Custom Ports #4:’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## with IsolateDestAddr’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## with IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9180 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9181 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9182 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9183 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9184 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9185 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9186 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9187 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9188 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 10.152.152.10:9189 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘###########################’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Gateway Trans/Dns-Port #’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘###########################’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## TransPort and DnsPort are no longer used on Gateway by default.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘##’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## (comment mirrored from /usr/bin/whonix_firewall)’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Transparent Proxy Ports for Gateway’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## TRANS_PORT_GATEWAY=“9041”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## DNS_PORT_GATEWAY=“54”’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘##TransPort 127.0.0.1:9041’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘##DnsPort 127.0.0.1:54’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#######################’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Gateway SocksPorts #’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#######################’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Developer comment:’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘##’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## We actually do not need all of them,’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## but they do not hurt anyway and’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## it keeps the setup more generic,’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## with less exceptions.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘##’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## Comments why we (not) use IsolateDestAddr and/or IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## are the same as in section Workstation SocksPorts.’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 127.0.0.1:9050’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 127.0.0.1:9100’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 127.0.0.1:9101 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 127.0.0.1:9102 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 127.0.0.1:9103 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 127.0.0.1:9104’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 127.0.0.1:9105 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 127.0.0.1:9106 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 127.0.0.1:9107 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 127.0.0.1:9108 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 127.0.0.1:9109 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 127.0.0.1:9110 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 127.0.0.1:9111’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 127.0.0.1:9112’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 127.0.0.1:9113’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 127.0.0.1:9114 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 127.0.0.1:9115 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 127.0.0.1:9116 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 127.0.0.1:9117 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 127.0.0.1:9118 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 127.0.0.1:9119’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 127.0.0.1:9120 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 127.0.0.1:9121 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 127.0.0.1:9122’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 127.0.0.1:9123’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 127.0.0.1:9124’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘SocksPort 127.0.0.1:9150’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#####################################################’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘## End of /usr/share/tor/tor-service-defaults-torrc #’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ ‘[’ ‘#####################################################’ = ‘DisableNetwork 0’ ‘]’
    ++ read -r line
    ++ unset line
    ++ TOR_ENABLED=0
    ++ return 0
    ++ ‘[’ 0 = 0 ‘]’
    ++ local ‘MSG=Tor Check Result:
    No network. Tor is disabled.
    Please enable Tor!
    Start Menu → Applications → System → Connection Wizard (Whonix)
    or in Terminal: sudo whonixsetup’
    ++ ‘[’ 1 = 1 ‘]’
    ++ output_func --messagecli --typecli warning --message ‘Tor Check Result:
    No network. Tor is disabled.
    Please enable Tor!
    Start Menu → Applications → System → Connection Wizard (Whonix)
    or in Terminal: sudo whonixsetup’
    ++ ‘[’ ‘’ = true ‘]’
    ++ /usr/lib/msgcollector/msgcollector --identifier whonixcheck --whoami user --messagecli --typecli warning --message ‘Tor Check Result:
    No network. Tor is disabled.
    Please enable Tor!
    Start Menu → Applications → System → Connection Wizard (Whonix)
    or in Terminal: sudo whonixsetup’
    [WARNING] [whonixcheck] Tor Check Result:
    No network. Tor is disabled.
    Please enable Tor!
    Start Menu → Applications → System → Connection Wizard (Whonix)
    or in Terminal: sudo whonixsetup
    ++ return 0
    ++ local 'MSG=

    Tor Check Result:
    No network. Tor is disabled.

Please close this window and enable Tor!

Start Menu -> Applications -> System -> Connection Wizard (Whonix)
or in Terminal: <code>sudo whonixsetup</code></p>'

++ ‘[’ 1 = 1 ‘]’
++ output_func --messagex --typex warning --message '

Tor Check Result:
No network. Tor is disabled.

Please close this window and enable Tor!

Start Menu -> Applications -> System -> Connection Wizard (Whonix)
or in Terminal: <code>sudo whonixsetup</code></p>'

++ ‘[’ ‘’ = true ‘]’
++ /usr/lib/msgcollector/msgcollector --identifier whonixcheck --whoami user --messagex --typex warning --message '

Tor Check Result:
No network. Tor is disabled.

Please close this window and enable Tor!

Start Menu -> Applications -> System -> Connection Wizard (Whonix)
or in Terminal: <code>sudo whonixsetup</code></p>'

++ return 0
++ EXIT_CODE=1
++ cleanup 1
++ true cleanup…
++ touch /var/run/whonixcheck/whonixcheck_done
++ sync
++ SIGNAL_TYPE=NONE
++ cd …
++ ‘[’ 1 = ‘’ ‘]’
++ ex_funct
++ ‘[’ ‘!’ NONE = NONE ‘]’
++ trap - SIGTERM
++ trap - SIGINT
++ trap - SIGUSR2
++ maybe_kill_apt_get_update
++ ‘[’ ‘’ = ‘’ ‘]’
++ return 0
++ process_killer_helper
+++ type -t error_handler
++ ‘[’ function = function ‘]’
++ trap error_handler ERR
++ ‘[’ ‘’ = ‘’ ‘]’
++ return 0
++ lastpid=
++ process_killer_helper
+++ type -t error_handler
++ ‘[’ function = function ‘]’
++ trap error_handler ERR
++ ‘[’ ‘’ = ‘’ ‘]’
++ return 0
++ cleanup_files
++ ‘[’ ‘’ = false ‘]’
++ ‘[’ -d /tmp/tmp.UlaxENzPsv ‘]’
++ rm --recursive /tmp/tmp.UlaxENzPsv
++ rm --force /var/run/whonixcheck/whonixcheck_running
++ rm --force /var/run/whonixcheck/whonixcheck_waiting
++ local command_v_output_exit_code
++ command_v_output_exit_code=0
++ command -v output_func
++ ‘[’ 0 = 0 ‘]’
++ local output_status_exit_code
++ output_status_exit_code=0
++ output_func --identifier whonixcheck --status --messagecli
++ ‘[’ ‘’ = true ‘]’
++ /usr/lib/msgcollector/msgcollector --identifier whonixcheck --whoami user --identifier whonixcheck --status --messagecli
++ return 0
++ ‘[’ ‘!’ 1 = 1 ‘]’
++ ‘[’ ‘!’ a0ee12ef-1b82-4952-bcf0-62e533646834 = ‘’ ‘]’
++ local progress_bar_open
++ progress_bar_open=0
++ output_func --identifier whonixcheck --status --progressbaridx a0ee12ef-1b82-4952-bcf0-62e533646834 --progressbarxprogresstxtexisting
++ ‘[’ ‘’ = true ‘]’
++ /usr/lib/msgcollector/msgcollector --identifier whonixcheck --whoami user --identifier whonixcheck --status --progressbaridx a0ee12ef-1b82-4952-bcf0-62e533646834 --progressbarxprogresstxtexisting
++ return 1
++ progress_bar_open=1
++ true
++ ‘[’ NONE = SIGUSR2 ‘]’
++ ‘[’ 1 = 0 ‘]’
++ true ‘No progress bar open. No need to send progress 100 to close progress bar.’
++ ‘[’ ‘!’ NONE = NONE ‘]’
++ output_func --messagex --done
++ ‘[’ ‘’ = true ‘]’
++ /usr/lib/msgcollector/msgcollector --identifier whonixcheck --whoami user --messagex --done
++ return 0
++ output_func --messagecli --done
++ ‘[’ ‘’ = true ‘]’
++ /usr/lib/msgcollector/msgcollector --identifier whonixcheck --whoami user --messagecli --done
++ return 0
++ ‘[’ 1 = ‘’ ‘]’
++ exit 1
[/code]

Very strange. So you tell me /etc/tor/torrc includes “DisableNetwork 0” just as expected, but whonixcheck’s code that works for ages can’t see it. I can’t come up with any other natural explanation other than hdd failure and/or a file system bug.

Options:
a) Import a fresh Whonix-Gateway. Should be gone then. Given the strangeness of this issue, this may be useful.
b)

Make that…

# This file is part of Whonix
# Copyright (C) 2012 - 2013 adrelanos <adrelanos at riseup dot net>
# See the file COPYING for copying conditions.

# Use this file for your user customizations.
# Please see /etc/tor/torrc.examples for help, options, comments etc.

# Anything here will override Whonix's own Tor config customizations in
# /usr/share/tor/tor-service-defaults-torrc

# Enable Tor through whonixsetup or manually uncomment "DisableNetwork 0" by
# removing the # in front of it.

DisableNetwork 0

Or.

# This file is part of Whonix
# Copyright (C) 2012 - 2013 adrelanos <adrelanos at riseup dot net>
# See the file COPYING for copying conditions.

# Use this file for your user customizations.
# Please see /etc/tor/torrc.examples for help, options, comments etc.

# Anything here will override Whonix's own Tor config customizations in
# /usr/share/tor/tor-service-defaults-torrc

# Enable Tor through whonixsetup or manually uncomment "DisableNetwork 0" by
# removing the # in front of it.

DisableNetwork 0

DisableNetwork 0

c) Create a file:

Content:

Variant b) operates. I wonder why so?

Likely it’s this: If the file does not end with a newline at the end, the last line is disregarded. That’s a bug.

Tested after line DisableNetwork 0, must necessarily be a string (empty or not), or WhonixCheck not see her. Thanks for the help.
It would be nice to add a statement in the file torcc, it is necessary to leave a blank line at the end. Or fix this bug)

Will be fixed in Whonix 12:

Great job, thanks again)