hectar
August 29, 2015, 6:14am
#1
Hello, when connected to a VPN on Whonix Gateway and connected to Tor, WhonixCheck an error: No network. Tor is disabled.
When checking the IP:
sudo su clearnet
curl.anondist-orig --tlsv1 --proto =https -H 'Host: check.torproject.org' -k https://38.229.72.22 | grep IP
It gives the IP of my VPN.
On Whonix Workstation, checked the IP - IP tor exit node and WhonixCheck on WhonixWorkstation works.
Settings DNS I did not touch. Show you how to make that work Whonixcheck.
Patrick
August 29, 2015, 11:13am
#2
Are you sure that whonixcheck isn’t already telling you on how to fix this?
Please post the complete whonxicheck output [redact IPs].
hectar
August 29, 2015, 12:05pm
#3
Whonix check:
[INFO] [whonixcheck] Pin torproject.org certificate: disabled.
[INFO] [whonixcheck] Root Check Result: Ok, not running as root.
[INFO] [whonixcheck] Check Initializer Result: /var/lib/whonix-initializer/status-files/first_run_initializer.fail does not exist, ok.
[INFO] [whonixcheck] Check Virtualizer Result (debug): systemd_detect_virt_result: oracle
[INFO] [whonixcheck] Check Virtualizer Result: Supported Virtualizer VirtualBox detected, continuing.
virt-what result: virtualbox
[INFO] [whonixcheck] KVMClock Result: /sys/devices/system/clocksource/clocksource0/current_clocksource exist, is tsc, not kvm-clock, ok.
[INFO] [whonixcheck] IP Forwarding Result: /proc/sys/net/ipv4/ip_forward is 0, ok.
[INFO] [whonixcheck] Check whonixsetup Result: done, ok.
[WARNING] [whonixcheck] Tor Check Result:
No network. Tor is disabled.
Please enable Tor!
Start Menu -> Applications -> System -> Connection Wizard (Whonix)
or in Terminal: sudo whonixsetup
Whonixsetup says: Tor networking is already enabled.
Openvpn config file:
[code]
client
dev tun
resolv-retry infinite
nobind
persist-key
persist-tun
remote *.*.*.* * tcp
; SSL configuration.
ca …
cert …
key …
crl-verify …
ns-cert-type server
tls-auth … 1[/code]
50_user:
[code]###########################
VPN-Firewall Settings
###########################
Make sure Tor always connects through the VPN.
Enable: 1
Disable: 0
DISABELD BY DEFAULT, because it requires a VPN provider.
VPN_FIREWALL=1
IP address of the VPN server.
Some providers provide multiple VPN servers.
You can enter multiple IP addresses, separated by spaces.
VPN_SERVERS=“. .. ”
For OpenVPN.
VPN_INTERFACE=tun0
Destinations you don not want routed through the VPN.
10.0.2.2/24: VirtualBox DHCP
LOCAL_NET=“192.168.1.0/24 192.168.0.0/24 127.0.0.0/8 10.152.152.0/24 10.0.2.2/24”[/code]
hectar
August 29, 2015, 4:02pm
#5
I did - the same result. WhonixSetup message:Tor networking is already enabled.
Next autostart whonixcheck: WARNING: Tor Check Result: No network. Tor is disabled
Post your /etc/tor/torrc. [redact IPs if any]
It should include…
Unless you removed it. If you removed it, re-add.
hectar
August 29, 2015, 4:35pm
#8
/etc/tor/torrc
[code]# This file is part of Whonix
Copyright © 2012 - 2013 adrelanos
See the file COPYING for copying conditions.
Use this file for your user customizations.
Please see /etc/tor/torrc.examples for help, options, comments etc.
Anything here will override Whonix’s own Tor config customizations in
/usr/share/tor/tor-service-defaults-torrc
Enable Tor through whonixsetup or manually uncomment “DisableNetwork 0” by
removing the # in front of it.
DisableNetwork 0[/code]
Should work.
Please post the output of.
hectar
August 29, 2015, 4:51pm
#10
[code]~$ bash -x whonixcheck
set -e
set -o pipefail
set -o errtrace
NOTIFY_MSG=‘Checking Tor Connection, Tor Browser Version, Operating System Updates, Whonix Version, Whonix News…
This will happen in background and will take approximately three minutes…’
ICON=/usr/share/icons/anon-icon-pack/whonix.ico
++ basename /usr/bin/whonixcheck
SCRIPTNAME=whonixcheck
IDENTIFIER=whonixcheck
bash -n /usr/lib/msgcollector/error_handler
source /usr/lib/msgcollector/error_handler
trap error_handler ERR
set +e
bash -n /usr/lib/anon-shared-helper-scripts/tor_enabled_check
source /usr/lib/anon-shared-helper-scripts/tor_enabled_check
bash -n /usr/lib/anon-shared-helper-scripts/pkg_manager_running_check
source /usr/lib/anon-shared-helper-scripts/pkg_manager_running_check
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/autostart ‘]’
‘[’ t = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/autostart
bash -n /usr/lib/whonixcheck/autostart
source /usr/lib/whonixcheck/autostart
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/check_apt_repository ‘]’
‘[’ y = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/check_apt_repository
bash -n /usr/lib/whonixcheck/check_apt_repository
source /usr/lib/whonixcheck/check_apt_repository
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/check_control_port_filter ‘]’
‘[’ r = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/check_control_port_filter
bash -n /usr/lib/whonixcheck/check_control_port_filter
source /usr/lib/whonixcheck/check_control_port_filter
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/check_entropy ‘]’
‘[’ y = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/check_entropy
bash -n /usr/lib/whonixcheck/check_entropy
source /usr/lib/whonixcheck/check_entropy
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/check_hostname ‘]’
‘[’ e = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/check_hostname
bash -n /usr/lib/whonixcheck/check_hostname
source /usr/lib/whonixcheck/check_hostname
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/check_initializer ‘]’
‘[’ r = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/check_initializer
bash -n /usr/lib/whonixcheck/check_initializer
source /usr/lib/whonixcheck/check_initializer
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/check_ip_forwarding_disabled ‘]’
‘[’ d = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/check_ip_forwarding_disabled
bash -n /usr/lib/whonixcheck/check_ip_forwarding_disabled
source /usr/lib/whonixcheck/check_ip_forwarding_disabled
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/check_kvmclock ‘]’
‘[’ k = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/check_kvmclock
bash -n /usr/lib/whonixcheck/check_kvmclock
source /usr/lib/whonixcheck/check_kvmclock
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/check_lastrun ‘]’
‘[’ n = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/check_lastrun
bash -n /usr/lib/whonixcheck/check_lastrun
source /usr/lib/whonixcheck/check_lastrun
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/check_logs ‘]’
‘[’ s = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/check_logs
bash -n /usr/lib/whonixcheck/check_logs
source /usr/lib/whonixcheck/check_logs
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/check_news ‘]’
‘[’ s = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/check_news
bash -n /usr/lib/whonixcheck/check_news
source /usr/lib/whonixcheck/check_news
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/check_operating_system ‘]’
‘[’ m = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/check_operating_system
bash -n /usr/lib/whonixcheck/check_operating_system
source /usr/lib/whonixcheck/check_operating_system
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/check_package_manager_running ‘]’
‘[’ g = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/check_package_manager_running
bash -n /usr/lib/whonixcheck/check_package_manager_running
source /usr/lib/whonixcheck/check_package_manager_running
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/check_packages ‘]’
‘[’ s = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/check_packages
bash -n /usr/lib/whonixcheck/check_packages
source /usr/lib/whonixcheck/check_packages
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/check_stream_isolation ‘]’
‘[’ n = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/check_stream_isolation
bash -n /usr/lib/whonixcheck/check_stream_isolation
source /usr/lib/whonixcheck/check_stream_isolation
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/check_tor_bootstrap ‘]’
‘[’ p = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/check_tor_bootstrap
bash -n /usr/lib/whonixcheck/check_tor_bootstrap
source /usr/lib/whonixcheck/check_tor_bootstrap
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/check_torbrowser ‘]’
‘[’ r = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/check_torbrowser
bash -n /usr/lib/whonixcheck/check_torbrowser
source /usr/lib/whonixcheck/check_torbrowser
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/check_tor_config ‘]’
‘[’ g = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/check_tor_config
bash -n /usr/lib/whonixcheck/check_tor_config
source /usr/lib/whonixcheck/check_tor_config
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/check_tor_enabled ‘]’
‘[’ d = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/check_tor_enabled
bash -n /usr/lib/whonixcheck/check_tor_enabled
source /usr/lib/whonixcheck/check_tor_enabled
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/check_tor_pid ‘]’
‘[’ d = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/check_tor_pid
bash -n /usr/lib/whonixcheck/check_tor_pid
source /usr/lib/whonixcheck/check_tor_pid
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/check_tor_socks_or_trans_port ‘]’
‘[’ t = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/check_tor_socks_or_trans_port
bash -n /usr/lib/whonixcheck/check_tor_socks_or_trans_port
source /usr/lib/whonixcheck/check_tor_socks_or_trans_port
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/check_tor_socks_port_reachability ‘]’
‘[’ y = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/check_tor_socks_port_reachability
bash -n /usr/lib/whonixcheck/check_tor_socks_port_reachability
source /usr/lib/whonixcheck/check_tor_socks_port_reachability
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/check_virtualizer ‘]’
‘[’ r = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/check_virtualizer
bash -n /usr/lib/whonixcheck/check_virtualizer
source /usr/lib/whonixcheck/check_virtualizer
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/check_whonixsetup_done ‘]’
‘[’ e = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/check_whonixsetup_done
bash -n /usr/lib/whonixcheck/check_whonixsetup_done
source /usr/lib/whonixcheck/check_whonixsetup_done
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/cleanup ‘]’
‘[’ p = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/cleanup
bash -n /usr/lib/whonixcheck/cleanup
source /usr/lib/whonixcheck/cleanup
++ trap trap_sigterm SIGTERM
++ trap trap_sigint SIGINT
++ trap trap_sigusr2 SIGUSR2
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/disclaimer ‘]’
‘[’ r = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/disclaimer
bash -n /usr/lib/whonixcheck/disclaimer
source /usr/lib/whonixcheck/disclaimer
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/donate ‘]’
‘[’ e = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/donate
bash -n /usr/lib/whonixcheck/donate
source /usr/lib/whonixcheck/donate
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/help_cli ‘]’
‘[’ i = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/help_cli
bash -n /usr/lib/whonixcheck/help_cli
source /usr/lib/whonixcheck/help_cli
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/parse_cmd ‘]’
‘[’ d = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/parse_cmd
bash -n /usr/lib/whonixcheck/parse_cmd
source /usr/lib/whonixcheck/parse_cmd
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/pin_ssl_cert ‘]’
‘[’ t = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/pin_ssl_cert
bash -n /usr/lib/whonixcheck/pin_ssl_cert
source /usr/lib/whonixcheck/pin_ssl_cert
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/preparation ‘]’
‘[’ n = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/preparation
bash -n /usr/lib/whonixcheck/preparation
source /usr/lib/whonixcheck/preparation
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/process_killer_helper ‘]’
‘[’ r = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/process_killer_helper
bash -n /usr/lib/whonixcheck/process_killer_helper
source /usr/lib/whonixcheck/process_killer_helper
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/root_check ‘]’
‘[’ k = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/root_check
bash -n /usr/lib/whonixcheck/root_check
source /usr/lib/whonixcheck/root_check
for i in ‘/usr/lib/whonixcheck/*’
‘[’ -f /usr/lib/whonixcheck/uwt_tool ‘]’
‘[’ l = ‘~’ ‘]’
grep -q .dpkg-
echo /usr/lib/whonixcheck/uwt_tool
bash -n /usr/lib/whonixcheck/uwt_tool
source /usr/lib/whonixcheck/uwt_tool
whonixcheck_main
trap error_handler ERR
parse_cmd_options
AUTOSTARTED=0
CURL_VERBOSE=–silent
:
case $1 in
break
preparation
‘[’ -e /var/run/whonixcheck/whonixcheck_pid ‘]’
local oldpid
++ cat /var/run/whonixcheck/whonixcheck_pid
oldpid=24073
‘[’ ‘!’ 24073 = ‘’ ‘]’
lastpid=24073
process_killer_helper
++ type -t error_handler
‘[’ function = function ‘]’
trap error_handler ERR
‘[’ 24073 = ‘’ ‘]’
local ps_p_exit_code
ps_p_exit_code=0
ps -p 24073
ps_p_exit_code=1
true
‘[’ ‘!’ 1 = 0 ‘]’
return 0
unset lastpid
rm --force /var/run/whonixcheck/whonixcheck_done
rm --force /var/run/whonixcheck/whonixcheck_recently_run
sudo -u user touch /var/run/whonixcheck/whonixcheck_running
sudo -u user tee /var/run/whonixcheck/whonixcheck_pid
echo 28767
sync
‘[’ ‘’ = ‘’ ‘]’
‘[’ :0 = ‘’ ‘]’
display=:0
local my_tty
local my_tty_exit_code
my_tty_exit_code=0
++ tty
my_tty=/dev/pts/0
‘[’ ‘!’ 0 = 0 ‘]’
‘[’ /dev/pts/0 = ‘’ ‘]’
user_name=user
WHONIX_HOMEPAGE=https://www.whonix.org
++ mktemp --directory
TEMP_DIR=/tmp/tmp.UlaxENzPsv
export TEMP_DIR
get_local_whonix_version
‘[’ -f /usr/share/anon-gw-base-files/gateway ‘]’
whonix_deb_package_name=whonix-gateway-packages-dependencies
whonix_deb_package_version=‘Could not detect Whonix debian version. (Code: 1) Please report this bug!’
local dpkg_query_exit_code
dpkg_query_exit_code=0
++ dpkg-query --show ‘–showformat=${Version}’ whonix-gateway-packages-dependencies
whonix_deb_package_version=3:2.5-1
‘[’ ‘!’ 0 = 0 ‘]’
++ awk -F : ‘{ print $2 }’
++ echo 3:2.5-1
whonix_deb_package_version=2.5-1
‘[’ 2.5-1 = ‘’ ‘]’
whonix_build_version=‘Could not read Whonix Build Version File. (Code: 3) Please report this bug!’
local build_version_file
‘[’ -f /usr/share/whonix/build_version ‘]’
‘[’ -f /var/lib/anon-dist/build_version ‘]’
build_version_file=/var/lib/anon-dist/build_version
‘[’ /var/lib/anon-dist/build_version = ‘’ ‘]’
‘[’ -f /var/lib/anon-dist/build_version ‘]’
++ cat /var/lib/anon-dist/build_version
whonix_build_version=11.0.0.3.0
‘[’ 11.0.0.3.0 = ‘’ ‘]’
chmod 700 /tmp/tmp.UlaxENzPsv
‘[’ -f /usr/share/anon-gw-base-files/gateway ‘]’
VM=Whonix-Gateway
vm_lower_case_short=gateway
GATEWAY_IP=127.0.0.1
‘[’ -f /etc/apt/sources.list.d/whonix.list ‘]’
whonix_codename=unknown
local i
read -r i
local first second third fourth
read -r first second third fourth _
‘[’ ‘##’ = deb ‘]’
read -r i
local first second third fourth
read -r first second third fourth _
‘[’ ‘##’ = deb ‘]’
read -r i
local first second third fourth
read -r first second third fourth _
‘[’ ‘##’ = deb ‘]’
read -r i
local first second third fourth
read -r first second third fourth _
‘[’ ‘’ = deb ‘]’
read -r i
local first second third fourth
read -r first second third fourth _
‘[’ ‘##’ = deb ‘]’
read -r i
local first second third fourth
read -r first second third fourth _
‘[’ ‘’ = deb ‘]’
read -r i
local first second third fourth
read -r first second third fourth _
‘[’ ‘##’ = deb ‘]’
read -r i
local first second third fourth
read -r first second third fourth _
‘[’ ‘##’ = deb ‘]’
read -r i
local first second third fourth
read -r first second third fourth _
‘[’ ‘##’ = deb ‘]’
read -r i
local first second third fourth
read -r first second third fourth _
‘[’ ‘##’ = deb ‘]’
read -r i
local first second third fourth
read -r first second third fourth _
‘[’ ‘##’ = deb ‘]’
read -r i
local first second third fourth
read -r first second third fourth _
‘[’ ‘##’ = deb ‘]’
read -r i
local first second third fourth
read -r first second third fourth _
‘[’ ‘##’ = deb ‘]’
read -r i
local first second third fourth
read -r first second third fourth _
‘[’ ‘##’ = deb ‘]’
read -r i
local first second third fourth
read -r first second third fourth _
‘[’ ‘’ = deb ‘]’
read -r i
local first second third fourth
read -r first second third fourth _
‘[’ deb = deb ‘]’
whonix_codename=jessie
break
whonix_codename_uppercase=JESSIE
‘[’ ‘’ = 1 ‘]’
‘[’ 0 = 1 ‘]’
manualrun=1
++ uname --machine
ARCH=i686
++ date
TITLE=‘whonixcheck | Whonix-Gateway | 2.5-1 | Sat Aug 29 16:44:32 UTC 2015’
TPO_PIN_CERT_FILE=/usr/share/torbrowser-launcher/torproject.pem
CURL_TPO_PIN_CERT=‘–cacert /usr/share/torbrowser-launcher/torproject.pem’
output_tool=/usr/lib/msgcollector/msgcollector
output=output_func
++ whoami
who_ami=user
output_func --icon /usr/share/icons/anon-icon-pack/whonix.ico
‘[’ ‘’ = true ‘]’
/usr/lib/msgcollector/msgcollector --identifier whonixcheck --whoami user --icon /usr/share/icons/anon-icon-pack/whonix.ico
return 0
output_func --parenttty /dev/pts/0
‘[’ ‘’ = true ‘]’
/usr/lib/msgcollector/msgcollector --identifier whonixcheck --whoami user --parenttty /dev/pts/0
return 0
output_func --whoami user
‘[’ ‘’ = true ‘]’
/usr/lib/msgcollector/msgcollector --identifier whonixcheck --whoami user --whoami user
return 0
output_func --titlex ‘whonixcheck | Whonix-Gateway | 2.5-1 | Sat Aug 29 16:44:32 UTC 2015’
‘[’ ‘’ = true ‘]’
/usr/lib/msgcollector/msgcollector --identifier whonixcheck --whoami user --titlex ‘whonixcheck | Whonix-Gateway | 2.5-1 | Sat Aug 29 16:44:32 UTC 2015’
return 0
output_func --titlecli ‘whonixcheck | Whonix-Gateway | 2.5-1 | Sat Aug 29 16:44:32 UTC 2015’
‘[’ ‘’ = true ‘]’
/usr/lib/msgcollector/msgcollector --identifier whonixcheck --whoami user --titlecli ‘whonixcheck | Whonix-Gateway | 2.5-1 | Sat Aug 29 16:44:32 UTC 2015’
return 0
output_func --lefttop
‘[’ ‘’ = true ‘]’
/usr/lib/msgcollector/msgcollector --identifier whonixcheck --whoami user --lefttop
return 0
for i in ‘/etc/whonix.d/*’
‘[’ -f /etc/whonix.d/30_aptrepository_default ‘]’
‘[’ t = ‘~’ ‘]’
grep -q .dpkg-
echo /etc/whonix.d/30_aptrepository_default
bash -n /etc/whonix.d/30_aptrepository_default
source /etc/whonix.d/30_aptrepository_default
for i in ‘/etc/whonix.d/*’
‘[’ -f /etc/whonix.d/30_whonixcheck_default ‘]’
‘[’ t = ‘~’ ‘]’
grep -q .dpkg-
echo /etc/whonix.d/30_whonixcheck_default
bash -n /etc/whonix.d/30_whonixcheck_default
source /etc/whonix.d/30_whonixcheck_default
++ NOSLEEP=1
++ WHONIXCHECK_NO_EXIT_ON_UNSUPPORTED_VIRTUALIZER=0
++ WHONIXCHECK_NO_EXIT_ON_KVMCLOCK_DETECTION=0
++ WHONIXCHECK_DISABLE_SOCKS_PORT_TEST=0
++ WHONIXCHECK_NO_EXIT_ON_TRANS_PORT_DETECTION_FAILURE=0
++ WHONIXCHECK_DISABLE_TRANS_PORT_TEST=0
++ WHONIXCHECK_NO_EXIT_ON_IP_FORWARDING_DETECTION=0
++ date +%s
TIME_START=1440866672
local progressbaridx
++ cat /proc/sys/kernel/random/uuid
progressbaridx=a0ee12ef-1b82-4952-bcf0-62e533646834
whonixcheck_run_function uwt_tool
case $whonixcheck_skip_functions in
true ‘INFO: Running uwt_tool, because whonixcheck_skip_functions does not include it.’
eval uwt_tool
++ uwt_tool
++ ret=0
++ command -v curl.anondist-orig
++ ‘[’ 0 = 0 ‘]’
++ CURL=curl.anondist-orig
++ ret=0
++ command -v apt-get.anondist-orig
++ ‘[’ 0 = 0 ‘]’
++ APT_GET=apt-get.anondist-orig
whonixcheck_run_function pin_tpo_ssl_cert
case $whonixcheck_skip_functions in
true ‘INFO: Running pin_tpo_ssl_cert, because whonixcheck_skip_functions does not include it.’
eval pin_tpo_ssl_cert
++ pin_tpo_ssl_cert
++ ‘[’ ‘’ = true ‘]’
++ local ‘MSG=Pin torproject.org certificate: disabled.
’
++ ‘[’ ‘’ = 1 ‘]’
++ CURL_TPO_PIN_CERT=
++ true 'CURL_TPO_PIN_CERT: ’
‘[’ ‘’ = ‘’ ‘]’
true
whonixcheck_run_function root_check
case $whonixcheck_skip_functions in
true ‘INFO: Running root_check, because whonixcheck_skip_functions does not include it.’
eval root_check
++ root_check
++ ‘[’ ‘!’ ‘’ = 0 ‘]’
+++ id -u
++ ‘[’ 1000 ‘!=’ 0 ‘]’
++ local ‘MSG=Root Check Result: Ok, not running as root.
’
++ ‘[’ ‘’ = 1 ‘]’
whonixcheck_run_function check_initializer
case $whonixcheck_skip_functions in
true ‘INFO: Running check_initializer, because whonixcheck_skip_functions does not include it.’
eval check_initializer
++ check_initializer
++ local log_file start_file done_file done_file_compatiblity skip_file todo_file fail_file
++ log_file=/var/lib/whonix-initializer/status-files/first_run_initializer.log
++ start_file=/var/lib/whonix-initializer/status-files/first_run_initializer.start
++ done_file=/var/lib/whonix-initializer/status-files/first_run_initializer.done
++ done_file_compatiblity=/root/.whonix/first_run_initializer.done
++ skip_file=/var/lib/whonix-initializer/status-files/first_run_initializer.skip
++ todo_file=/var/lib/whonix-initializer/status-files/first_run_initializer.todo
++ fail_file=/var/lib/whonix-initializer/status-files/first_run_initializer.fail
++ ‘[’ -f /var/lib/whonix-initializer/status-files/first_run_initializer.fail ‘]’
++ ‘[’ ‘’ = 1 ‘]’
whonixcheck_run_function check_virtualizer
case $whonixcheck_skip_functions in
true ‘INFO: Running check_virtualizer, because whonixcheck_skip_functions does not include it.’
eval check_virtualizer
++ check_virtualizer
++ local result
+++ sudo virt-what
++ result=virtualbox
++ command -v systemd-detect-virt
+++ systemd-detect-virt
++ systemd_detect_virt_result=oracle
++ local ‘MSG=Check Virtualizer Result (debug): systemd_detect_virt_result: oracle
’
++ ‘[’ ‘’ = 1 ‘]’
++ ‘[’ virtualbox = ‘’ ‘]’
++ ‘[’ virtualbox = virtualbox ‘]’
++ local ‘MSG=Check Virtualizer Result: Supported Virtualizer VirtualBox detected, continuing.
virt-what result: virtualbox
’
++ ‘[’ ‘’ = 1 ‘]’
++ return 0
whonixcheck_run_function check_kvmclock
case $whonixcheck_skip_functions in
true ‘INFO: Running check_kvmclock, because whonixcheck_skip_functions does not include it.’
eval check_kvmclock
++ check_kvmclock
++ ‘[’ ‘!’ -f /sys/devices/system/clocksource/clocksource0/current_clocksource ‘]’
++ local current_clocksource
+++ cat /sys/devices/system/clocksource/clocksource0/current_clocksource
++ current_clocksource=tsc
++ ‘[’ ‘!’ tsc = kvm-clock ‘]’
++ local ‘MSG=KVMClock Result: /sys/devices/system/clocksource/clocksource0/current_clocksource
exist, is tsc
, not kvm-clock
, ok.
’
++ ‘[’ ‘’ = 1 ‘]’
++ return 0
whonixcheck_run_function check_ip_forwarding_disabled
case $whonixcheck_skip_functions in
true ‘INFO: Running check_ip_forwarding_disabled, because whonixcheck_skip_functions does not include it.’
eval check_ip_forwarding_disabled
++ check_ip_forwarding_disabled
++ ‘[’ ‘!’ -f /usr/share/anon-gw-base-files/gateway ‘]’
++ local file_list file_name
++ file_list=‘/proc/sys/net/ipv4/ip_forward /proc/sys/net/ipv6/ip_forward’
++ for file_name in ‘$file_list’
++ local ip_forwarding=
++ local temp=
++ local MSG=
++ ‘[’ ‘!’ -f /proc/sys/net/ipv4/ip_forward ‘]’
+++ cat /proc/sys/net/ipv4/ip_forward
++ ip_forwarding=0
++ ‘[’ 0 = 0 ‘]’
++ local ‘MSG=IP Forwarding Result: /proc/sys/net/ipv4/ip_forward is 0, ok.
’
++ ‘[’ ‘’ = 1 ‘]’
++ continue
++ for file_name in ‘$file_list’
++ local ip_forwarding=
++ local temp=
++ local MSG=
++ ‘[’ ‘!’ -f /proc/sys/net/ipv6/ip_forward ‘]’
++ local ‘temp=/proc/sys/net/ipv6/ip_forward does not exist.’
++ ‘[’ /proc/sys/net/ipv6/ip_forward = /proc/sys/net/ipv6/ip_forward ‘]’
++ continue
whonixcheck_run_function check_whonixsetup_done
case $whonixcheck_skip_functions in
true ‘INFO: Running check_whonixsetup_done, because whonixcheck_skip_functions does not include it.’
eval check_whonixsetup_done
++ check_whonixsetup_done
++ check_whonixsetup_done_do
++ ‘[’ -f /var/cache/whonix-setup-wizard/status-files/whonixsetup.done ‘]’
++ whonixsetup_done=1
++ return 0
++ ‘[’ 1 = 0 ‘]’
++ local ‘MSG=Check whonixsetup Result: done, ok.
’
++ ‘[’ ‘’ = 1 ‘]’
whonixcheck_run_function check_tor_enabled
case $whonixcheck_skip_functions in
true ‘INFO: Running check_tor_enabled, because whonixcheck_skip_functions does not include it.’
eval check_tor_enabled
++ check_tor_enabled
++ check_tor_enabled_do
++ ‘[’ ‘!’ -e /usr/share/anon-gw-base-files/gateway ‘]’
++ ‘[’ ‘!’ -e /etc/tor/torrc ‘]’
++ local line
++ read -r line
++ ‘[’ ‘# This file is part of Whonix’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘# Copyright (C) 2012 - 2013 adrelanos ’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘# See the file COPYING for copying conditions.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘# Use this file for your user customizations.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘# Please see /etc/tor/torrc.examples for help, options, comments etc.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘# Anything here will override Whonix’'‘s own Tor config customizations in’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘# /usr/share/tor/tor-service-defaults-torrc’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘# Enable Tor through whonixsetup or manually uncomment “DisableNetwork 0” by’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘# removing the # in front of it.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ unset line
++ read -r line
++ ‘[’ ‘## This file is part of Whonix.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Copyright (C) 2012 - 2014 Patrick Schleizer adrelanos@riseup.net ’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## See the file COPYING for copying conditions.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘# Please use “/etc/tor/torrc” for your custom configuration,’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘# which will override the defaults found here. When this package is updated,’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘# this file may be overwritten.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## You can find the original upstream tor-service-defaults-torrc under’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## /usr/share/tor/tor-service-defaults-torrc.anondist-orig’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘######################################################################’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## DO NOT CHANGE ANYTHING BELOW, UNLESS YOU KNOW WHAT YOU ARE DOING! #’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## DO NOT CHANGE ANYTHING BELOW, UNLESS YOU KNOW WHAT YOU ARE DOING! #’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## DO NOT CHANGE ANYTHING BELOW, UNLESS YOU KNOW WHAT YOU ARE DOING! #’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## DO NOT CHANGE ANYTHING BELOW, UNLESS YOU KNOW WHAT YOU ARE DOING! #’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## DO NOT CHANGE ANYTHING BELOW, UNLESS YOU KNOW WHAT YOU ARE DOING! #’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘######################################################################’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘###################’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#### Internals torrc #’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘######################################’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘# Upstream Defaults File #’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘# Enable / Disable Tor #’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘# Leak Tests #’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘# General Settings #’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘# Workstation Trans/Dns-Port #’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘# Workstation SocksPorts #’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘# Gateway Trans/Dns-Port #’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘# Gateway SocksPorts #’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#####################################’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#########################################’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Upstream Defaults File #’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#########################################’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## These defaults are taken from /usr/share/tor/tor-service-defaults-torrc’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## on Aug 2013 on Debian Jessi.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘DataDirectory /var/lib/tor’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘PidFile /var/run/tor/tor.pid’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘RunAsDaemon 1’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘User debian-tor’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘ControlSocket /var/run/tor/control’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘ControlSocketsGroupWritable 1’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘CookieAuthentication 1’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘CookieAuthFileGroupReadable 1’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘CookieAuthFile /var/run/tor/control.authcookie’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘Log notice file /var/log/tor/log’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#########################’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Enable / Disable Tor #’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#########################’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Tor is disabled by default.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Users are supposed to enable Tor through whonixsetup or manually’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## removing the # in front of “DisableNetwork 0” in /etc/tor/torrc.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘DisableNetwork 1’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#########################################’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Leak Tests #’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#########################################’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘##+# #OptionalFeatureNr .6# Leak Testing.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘##+#’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘##+# Manual Leak Testing:’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘##+# See Whonix/LeakTests. Activate this while testing for leaks. (Step 0)’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘##+# Deactivate after you are done! (Important!) (Step 9)’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘##+#’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘##+# Scripted Leak Testing:’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘##+# If you change the following two lines, beside removing the hash (#),’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘##+# beside commenting them in, you break the integrated leaktest script.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘##+# See leaktest_whonix_gateway() ed.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘##+# See Leak Tests ’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘##+# on information, how to use the integrated leaktest script.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#ReachableDirAddresses *:80’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#ReachableORAddresses *:443’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#FascistFirewall 1’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#########################################’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## General Settings #’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#########################################’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## ControlPort is necessary for tor-arm and Vidalia.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## - Vidalia has to set /var/run/tor/control (default) as’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Control Cookie. (Not installed by default)’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## - Arm autodetects the Control Cookie. (Useful terminal Tor controller.)’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## - Tor Control Port Filter Proxy’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## - Not using HashedControlPassword or CookieAuthentication.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Gateway is no multi purpose machine. It is solely a’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Tor Gateway. As soon as an adversary has physical access’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## or compromised Gateway, it’'‘s Game Over anyway.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘ControlPort 9051’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘ControlListenAddress 127.0.0.1’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘Log notice syslog’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘Log notice file /run/tor/log’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#Log notice file /var/log/tor/log’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Not required:’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#DataDirectory /…’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#PidFile /…’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#ControlSocket /…’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#ControlSocketsGroupWritable 1’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#CookieAuthentication 1’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#CookieAuthFileGroupReadable 1’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#CookieAuthFile /…’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#########################################’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## mixmaster remailer #’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#########################################’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## REVIEW: Are the virtual IP addresses 1.1.1.1 and 2.2.2.2 appropriate or are different values better?’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘mapaddress 1.1.1.1 k54ids7luh523dbi.onion ’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘mapaddress 2.2.2.2 gbhpq7eihle4btsn.onion ’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#########################################’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Misc Settings #’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#########################################’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘VirtualAddrNetwork 10.192.0.0/10’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘AutomapHostsOnResolve 1’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘###############################’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Workstation Trans/Dns-Port #’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘###############################’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## (comment mirrored from /usr/bin/whonix_firewall)’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Transparent Proxy Port for Workstation’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## TRANS_PORT_WORKSTATION=“9040”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘##+# #OptionalFeatureNr .5# Best possible protection against Identity correlation through circuit sharing. ^5^’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘##’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## TransPort is not used for anything preinstalled by default.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Only as a catch all for user installed applications,’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## which is documented.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘##’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## IsolateDestAddr should not be activated by default,’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## if people install filesharing software it would be a nightmare if all connections to the massive amount’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## of destination IP’'‘s would go through separate circuits.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘##’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## For the same reason IsolateDestPort should not be activated by default, since BitTorrent (in some cases)’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## uses random ports.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘TransPort 10.152.152.10:9040’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## (comment mirrored from /usr/bin/whonix_firewall)’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## DNS_PORT_WORKSTATION=“53”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘##+# #OptionalFeatureNr .5# Best possible protection against Identity correlation through circuit sharing. ^5^’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘##’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## DnsPort is not used for anything preinstalled by default.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Only as a catch all for user installed applications,’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## which is documented.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘##’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Not sure about IsolateDestAddr.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## IsolateDestPort has probably very little effect, since most DNS servers listen on port 53.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘DnsPort 10.152.152.10:53 IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘###########################’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Workstation SocksPorts #’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘###########################’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## (comment mirrored from /usr/bin/whonix_firewall)’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Socks Ports for per application circuits.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## SOCKS_PORT_TOR_DEFAULT=“9050”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## SOCKS_PORT_TB=“9100”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## SOCKS_PORT_IRC=“9101”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## SOCKS_PORT_TORBIRDY=“9102”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## SOCKS_PORT_IM=“9103”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## SOCKS_PORT_APT_GET=“9104”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## SOCKS_PORT_GPG=“9105”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## SOCKS_PORT_SSH=“9106”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## SOCKS_PORT_GIT=“9107”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## SOCKS_PORT_SDWDATE=“9108”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## SOCKS_PORT_WGET=“9109”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## SOCKS_PORT_WHONIXCHECK=“9110”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## SOCKS_PORT_BITCOIN=“9111”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## SOCKS_PORT_PRIVOXY=“9112”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## SOCKS_PORT_POLIPO=“9113”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## SOCKS_PORT_WHONIX_NEWS=“9114”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## SOCKS_PORT_TBB_DOWNLOAD=“9115”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## SOCKS_PORT_TBB_GPG=“9116”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## SOCKS_PORT_CURL=“9117”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## SOCKS_PORT_RSS=“9118”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## SOCKS_PORT_TORCHAT=“9119”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## SOCKS_PORT_MIXMASTERUPDATE=“9120”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## SOCKS_PORT_MIXMASTER=“9121”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## SOCKS_PORT_KDE=“9122”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## SOCKS_PORT_GNOME=“9123”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## SOCKS_PORT_APTITUDE=“9124”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## SOCKS_PORT_TBB_DEFAULT=“9150”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Tor Default Port’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Only for applications, which expect Tor to be running on port 9050.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9050’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Web: Tor Browser’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Not using IsolateDestAddr IsolateDestPort, because too much’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## performance loss, too much load on Tor network and not secure.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Ticket Tor Browser should set SOCKS username for a request based on first party domain (#3455) · Issues · Legacy / Trac · GitLab ’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## is the right way to solve this issue. Waiting for upstream.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9100’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#SocksPort 10.152.152.10:9100 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## IRC: XChat’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## People are normally not connected to too many IRC servers,’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## so they can use one circuit per server.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9101 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Mail: Thunderbird with TorBirdy’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Not preinstalled.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Not used by too many people. Most users do not connect to’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## too many servers.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9102 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Instant Messenger’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## People are normally not connected to too many IM servers,’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## so they can use one circuit per server.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9103 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Operating system updates: apt-get’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Not using IsolateDestAddr IsolateDestPort, because too much’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## performance loss, too much load on Tor network and no gain’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## in security.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9104’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## gpg’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Not used by too many people. Most users do not connect to’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## too many servers.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9105 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## ssh’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Not used by too many people. Most users do not connect to’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## too many servers.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9106 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## git’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Not preinstalled.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Not used by too many people. Most users do not connect to’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## too many servers.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9107 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Network Time Synchronization’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## There are only three different connections.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9108 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## command line downloader: wget’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Only manually and by very few applications used. Should not’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## hurt performance or Tor network. Very few connections are’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## expected.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9109 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## whonixcheck’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Only connects to https://check.torproject.org and checks IP’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## and Tor Browser version.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Only one server and only one port.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Would be fine without IsolateDestAddr IsolateDestPort,’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## but add it anyway to have less exceptions.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9110 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## BitCoin’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Not using IsolateDestAddr IsolateDestPort.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Makes too many connections to different servers. Should not’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## hurt if they get through the same circuit.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9111’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## http to socks converter: privoxy’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Not in use for anything preinstalled.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Not using IsolateDestAddr IsolateDestPort for the same reasons’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## as mentioned under Web: Tor Browser.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Only used for Thunderbird with TorBirdy, which is not’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## preinstalled.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9112’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## http to socks converter: polipo’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Not in use for anything preinstalled.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Not using IsolateDestAddr IsolateDestPort for the same reasons’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## as mentioned under Web: Tor Browser.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9113’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Whonix news download’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Only connects to the Whonix homepage and downloads a small file with’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## latest important Whonix news.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Only one server and only one port.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Would be fine without IsolateDestAddr IsolateDestPort,’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## but add it anyway to have less exceptions.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9114 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Tor Browser bundle download’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Rarely used.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Only one server and only one port.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Would be fine without IsolateDestAddr IsolateDestPort,’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## but add it anyway to have less exceptions.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9115 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Tor Browser gpg public key download’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Rarely used.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Only one server and only one port.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Would be fine without IsolateDestAddr IsolateDestPort,’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## but add it anyway to have less exceptions.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9116 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Curl’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Only manually and by very few applications used. Should not’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## hurt performance or Tor network. Very few connections are’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## expected.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9117 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## RSS’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## By default only for the Whonix Blog and for the torproject.org blog.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Few users expected to add their own feeds.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9118 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## TorChat’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Not using IsolateDestAddr or IsolateDestPort, because upstream’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## TorChat also does not do it. Since it only connects to’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## hidden services it would perhaps not make a difference anyway.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9119’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## mixmaster-update’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Few users expected to use it.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Since it only connects to one or very few servers using’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## IsolateDestAddr IsolateDestPort.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9120 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## mixmaster’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## This port is currently not in use. See Whonix mixmaster integration.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Mixmaster: Tor Remailer ’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Few users expected to use it.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Since it only connects to one or very few servers using’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## IsolateDestAddr IsolateDestPort.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9121 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## KDE application wide proxy.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Not using IsolateDestAddr or IsolateDestPort, because also browsers’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## could use this port.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9122’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## GNOME application wide proxy.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## This port is currently not in use.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Not using IsolateDestAddr or IsolateDestPort, because also browsers’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## could use this port.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9123’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Operating system updates: aptitude’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Not using IsolateDestAddr IsolateDestPort, because too much’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## performance loss, too much load on Tor network and no gain’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## in security.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9124’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Tor Browser Bundle Default Port’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## This port gets used if someone uses the default Tor Browser Bundle.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## (rinetd runs on Workstation and forwards connections from’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## 127.0.0.1:9150 to 10.152.152.10:9150 [as part of the’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## anon-ws-disable-stacked-tor package].)’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Not using IsolateDestAddr IsolateDestPort, because too much’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## performance loss, too much load on Tor network and not secure.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Ticket Tor Browser should set SOCKS username for a request based on first party domain (#3455) · Issues · Legacy / Trac · GitLab ’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## is the right way to solve this issue. Waiting for upstream.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9150’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Tor Messenger’'‘s default port’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## This port gets used if someone uses the default Tor Messenger.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## (rinetd runs on Workstation and forwards connections from’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## 127.0.0.1:9152 to 10.152.152.10:9152 [as part of the’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## anon-ws-disable-stacked-tor package].)’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9152’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘##+# #OptionalFeatureNr .4# More Socks Ports.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Custom Ports #1: ’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## without IsolateDestAddr’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## without IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9153’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9154’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9155’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9156’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9157’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9158’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9159’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘##+# #OptionalFeatureNr .4# More Socks Ports.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Custom Ports #2: ’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## with IsolateDestAddr’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## without IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9160 IsolateDestAddr’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9161 IsolateDestAddr’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9162 IsolateDestAddr’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9163 IsolateDestAddr’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9164 IsolateDestAddr’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9165 IsolateDestAddr’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9166 IsolateDestAddr’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9167 IsolateDestAddr’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9168 IsolateDestAddr’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9169 IsolateDestAddr’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘##+# #OptionalFeatureNr .4# More Socks Ports.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Custom Ports #3: ’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## without IsolateDestAddr’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## with IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9170 IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9171 IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9172 IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9173 IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9174 IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9175 IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9176 IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9177 IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9178 IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9179 IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘##+# #OptionalFeatureNr .4# More Socks Ports.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Custom Ports #4: ’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## with IsolateDestAddr’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## with IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9180 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9181 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9182 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9183 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9184 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9185 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9186 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9187 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9188 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 10.152.152.10:9189 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘###########################’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Gateway Trans/Dns-Port #’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘###########################’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## TransPort and DnsPort are no longer used on Gateway by default.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘##’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## (comment mirrored from /usr/bin/whonix_firewall)’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Transparent Proxy Ports for Gateway’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## TRANS_PORT_GATEWAY=“9041”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## DNS_PORT_GATEWAY=“54”’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘##TransPort 127.0.0.1:9041’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘##DnsPort 127.0.0.1:54’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#######################’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Gateway SocksPorts #’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#######################’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Developer comment:’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘##’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## We actually do not need all of them,’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## but they do not hurt anyway and’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## it keeps the setup more generic,’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## with less exceptions.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘##’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## Comments why we (not) use IsolateDestAddr and/or IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## are the same as in section Workstation SocksPorts.’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 127.0.0.1:9050’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 127.0.0.1:9100’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 127.0.0.1:9101 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 127.0.0.1:9102 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 127.0.0.1:9103 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 127.0.0.1:9104’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 127.0.0.1:9105 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 127.0.0.1:9106 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 127.0.0.1:9107 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 127.0.0.1:9108 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 127.0.0.1:9109 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 127.0.0.1:9110 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 127.0.0.1:9111’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 127.0.0.1:9112’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 127.0.0.1:9113’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 127.0.0.1:9114 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 127.0.0.1:9115 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 127.0.0.1:9116 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 127.0.0.1:9117 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 127.0.0.1:9118 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 127.0.0.1:9119’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 127.0.0.1:9120 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 127.0.0.1:9121 IsolateDestAddr IsolateDestPort’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 127.0.0.1:9122’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 127.0.0.1:9123’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 127.0.0.1:9124’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘SocksPort 127.0.0.1:9150’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#####################################################’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘## End of /usr/share/tor/tor-service-defaults-torrc #’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ ‘[’ ‘#####################################################’ = ‘DisableNetwork 0’ ‘]’
++ read -r line
++ unset line
++ TOR_ENABLED=0
++ return 0
++ ‘[’ 0 = 0 ‘]’
++ local ‘MSG=Tor Check Result:
No network. Tor is disabled.
Please enable Tor!
Start Menu → Applications → System → Connection Wizard (Whonix)
or in Terminal: sudo whonixsetup’
++ ‘[’ 1 = 1 ‘]’
++ output_func --messagecli --typecli warning --message ‘Tor Check Result:
No network. Tor is disabled.
Please enable Tor!
Start Menu → Applications → System → Connection Wizard (Whonix)
or in Terminal: sudo whonixsetup’
++ ‘[’ ‘’ = true ‘]’
++ /usr/lib/msgcollector/msgcollector --identifier whonixcheck --whoami user --messagecli --typecli warning --message ‘Tor Check Result:
No network. Tor is disabled.
Please enable Tor!
Start Menu → Applications → System → Connection Wizard (Whonix)
or in Terminal: sudo whonixsetup’
[WARNING] [whonixcheck] Tor Check Result:
No network. Tor is disabled.
Please enable Tor!
Start Menu → Applications → System → Connection Wizard (Whonix)
or in Terminal: sudo whonixsetup
++ return 0
++ local 'MSG=Tor Check Result:
No network. Tor is disabled.
Please close this window and enable Tor!
Start Menu -> Applications -> System -> Connection Wizard (Whonix)
or in Terminal: <code>sudo whonixsetup</code></p>'
++ ‘[’ 1 = 1 ‘]’
++ output_func --messagex --typex warning --message '
Tor Check Result:
No network. Tor is disabled.
Please close this window and enable Tor!
Start Menu -> Applications -> System -> Connection Wizard (Whonix)
or in Terminal: <code>sudo whonixsetup</code></p>'
++ ‘[’ ‘’ = true ‘]’
++ /usr/lib/msgcollector/msgcollector --identifier whonixcheck --whoami user --messagex --typex warning --message '
Tor Check Result:
No network. Tor is disabled.
Please close this window and enable Tor!
Start Menu -> Applications -> System -> Connection Wizard (Whonix)
or in Terminal: <code>sudo whonixsetup</code></p>'
++ return 0
++ EXIT_CODE=1
++ cleanup 1
++ true cleanup…
++ touch /var/run/whonixcheck/whonixcheck_done
++ sync
++ SIGNAL_TYPE=NONE
++ cd …
++ ‘[’ 1 = ‘’ ‘]’
++ ex_funct
++ ‘[’ ‘!’ NONE = NONE ‘]’
++ trap - SIGTERM
++ trap - SIGINT
++ trap - SIGUSR2
++ maybe_kill_apt_get_update
++ ‘[’ ‘’ = ‘’ ‘]’
++ return 0
++ process_killer_helper
+++ type -t error_handler
++ ‘[’ function = function ‘]’
++ trap error_handler ERR
++ ‘[’ ‘’ = ‘’ ‘]’
++ return 0
++ lastpid=
++ process_killer_helper
+++ type -t error_handler
++ ‘[’ function = function ‘]’
++ trap error_handler ERR
++ ‘[’ ‘’ = ‘’ ‘]’
++ return 0
++ cleanup_files
++ ‘[’ ‘’ = false ‘]’
++ ‘[’ -d /tmp/tmp.UlaxENzPsv ‘]’
++ rm --recursive /tmp/tmp.UlaxENzPsv
++ rm --force /var/run/whonixcheck/whonixcheck_running
++ rm --force /var/run/whonixcheck/whonixcheck_waiting
++ local command_v_output_exit_code
++ command_v_output_exit_code=0
++ command -v output_func
++ ‘[’ 0 = 0 ‘]’
++ local output_status_exit_code
++ output_status_exit_code=0
++ output_func --identifier whonixcheck --status --messagecli
++ ‘[’ ‘’ = true ‘]’
++ /usr/lib/msgcollector/msgcollector --identifier whonixcheck --whoami user --identifier whonixcheck --status --messagecli
++ return 0
++ ‘[’ ‘!’ 1 = 1 ‘]’
++ ‘[’ ‘!’ a0ee12ef-1b82-4952-bcf0-62e533646834 = ‘’ ‘]’
++ local progress_bar_open
++ progress_bar_open=0
++ output_func --identifier whonixcheck --status --progressbaridx a0ee12ef-1b82-4952-bcf0-62e533646834 --progressbarxprogresstxtexisting
++ ‘[’ ‘’ = true ‘]’
++ /usr/lib/msgcollector/msgcollector --identifier whonixcheck --whoami user --identifier whonixcheck --status --progressbaridx a0ee12ef-1b82-4952-bcf0-62e533646834 --progressbarxprogresstxtexisting
++ return 1
++ progress_bar_open=1
++ true
++ ‘[’ NONE = SIGUSR2 ‘]’
++ ‘[’ 1 = 0 ‘]’
++ true ‘No progress bar open. No need to send progress 100 to close progress bar.’
++ ‘[’ ‘!’ NONE = NONE ‘]’
++ output_func --messagex --done
++ ‘[’ ‘’ = true ‘]’
++ /usr/lib/msgcollector/msgcollector --identifier whonixcheck --whoami user --messagex --done
++ return 0
++ output_func --messagecli --done
++ ‘[’ ‘’ = true ‘]’
++ /usr/lib/msgcollector/msgcollector --identifier whonixcheck --whoami user --messagecli --done
++ return 0
++ ‘[’ 1 = ‘’ ‘]’
++ exit 1
[/code]
Patrick
August 29, 2015, 5:17pm
#11
Very strange. So you tell me /etc/tor/torrc includes “DisableNetwork 0” just as expected, but whonixcheck’s code that works for ages can’t see it. I can’t come up with any other natural explanation other than hdd failure and/or a file system bug.
Options:
a) Import a fresh Whonix-Gateway. Should be gone then. Given the strangeness of this issue, this may be useful.
b)
Make that…
# This file is part of Whonix
# Copyright (C) 2012 - 2013 adrelanos <adrelanos at riseup dot net>
# See the file COPYING for copying conditions.
# Use this file for your user customizations.
# Please see /etc/tor/torrc.examples for help, options, comments etc.
# Anything here will override Whonix's own Tor config customizations in
# /usr/share/tor/tor-service-defaults-torrc
# Enable Tor through whonixsetup or manually uncomment "DisableNetwork 0" by
# removing the # in front of it.
DisableNetwork 0
Or.
# This file is part of Whonix
# Copyright (C) 2012 - 2013 adrelanos <adrelanos at riseup dot net>
# See the file COPYING for copying conditions.
# Use this file for your user customizations.
# Please see /etc/tor/torrc.examples for help, options, comments etc.
# Anything here will override Whonix's own Tor config customizations in
# /usr/share/tor/tor-service-defaults-torrc
# Enable Tor through whonixsetup or manually uncomment "DisableNetwork 0" by
# removing the # in front of it.
DisableNetwork 0
DisableNetwork 0
c) Create a file:
Content:
hectar
August 29, 2015, 5:27pm
#12
Variant b) operates. I wonder why so?
Patrick
August 29, 2015, 5:45pm
#13
Likely it’s this: If the file does not end with a newline at the end, the last line is disregarded. That’s a bug.
bash, process
hectar
August 29, 2015, 5:49pm
#14
Tested after line DisableNetwork 0, must necessarily be a string (empty or not), or WhonixCheck not see her. Thanks for the help.
It would be nice to add a statement in the file torcc, it is necessary to leave a blank line at the end. Or fix this bug)
Patrick
August 29, 2015, 5:55pm
#15
Will be fixed in Whonix 12:
committed 05:50PM - 29 Aug 15 UTC
Thanks for hectar for reporting this bug.
Thanks to Jonathan Leffler for his ans… wer on http://stackoverflow.com/a/12916758/2605155.