New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Difficulty to upgrade Whonix TemplateVMs over clearnet considered a bug or feature? #1880

Closed
adrelanos opened this Issue Mar 28, 2016 · 4 comments

Comments

Projects
None yet
3 participants
@adrelanos
Member

adrelanos commented Mar 28, 2016

Currently Whonix TemplateVMs implement a check, refuse to upgrade and show a warning popup when they are not connected to Whonix-Gateway ProxyVM. This mechanism was invented by @nrgaway.

[ Something in Qubes R3.1 has now partially broken this so this warning will be shown even if they are connected to a Whonix-Gateway ProxyVM. ]

Instead of repairing this complex mechanism, I am asking a more fundamental question. Is the difficulty to upgrade Whonix TemplateVMs over clearnet considered a bug or feature? Do we trust the Qubes management stack enough to really set Whonix TemplateVM's NetVM to a Whonix-Gateway ProxyVM?

And if the user changes Whonix TemplateVM's NetVM to sys-firewall (or so) should the user be free to easily upgrade over clearnet or should the user be more patronized and have to jump through an additional hoop?

[ Why upgrade Whonix TemplateVM's over Tor in the first place anyhow? One reason is, it hides the list of installed packages from ISP level observers which can be considered a feature as it leaks less information. However, if the user (perhaps using a standard setup) does not care about this and prefers faster packages download speeds, more power to them. ]

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Mar 28, 2016

Member

Instead of repairing this complex mechanism, I am asking a more fundamental question. Is the difficulty to upgrade Whonix TemplateVMs over clearnet considered a bug or feature? Do we trust the Qubes management stack enough to really set Whonix TemplateVM's NetVM to a Whonix-Gateway ProxyVM?

I think so. I guess the mechanism was implemented to make sure the user followed installation instruction to the end. To hide Whonix usage from ISP level observers, especially in censored areas. Without management stack IMHO it wasn't obvious (other than installation instruction) what to set to really have all Whonix related traffic over Tor.

And if the user changes Whonix TemplateVM's NetVM to sys-firewall (or so) should the user be free to easily upgrade over clearnet or should the user be more patronized and have to jump through an additional hoop?

You tell me :) This will leak Whonix usage. How bad it can be? It depends. Ideally it should depend on tor bridges usage, but there is no easy way to check that at template level. Maybe that message should have additional option like "allow updates over clearnet"? Or even one with "and remember this setting"?

Member

marmarek commented Mar 28, 2016

Instead of repairing this complex mechanism, I am asking a more fundamental question. Is the difficulty to upgrade Whonix TemplateVMs over clearnet considered a bug or feature? Do we trust the Qubes management stack enough to really set Whonix TemplateVM's NetVM to a Whonix-Gateway ProxyVM?

I think so. I guess the mechanism was implemented to make sure the user followed installation instruction to the end. To hide Whonix usage from ISP level observers, especially in censored areas. Without management stack IMHO it wasn't obvious (other than installation instruction) what to set to really have all Whonix related traffic over Tor.

And if the user changes Whonix TemplateVM's NetVM to sys-firewall (or so) should the user be free to easily upgrade over clearnet or should the user be more patronized and have to jump through an additional hoop?

You tell me :) This will leak Whonix usage. How bad it can be? It depends. Ideally it should depend on tor bridges usage, but there is no easy way to check that at template level. Maybe that message should have additional option like "allow updates over clearnet"? Or even one with "and remember this setting"?

@andrewdavidwong

This comment has been minimized.

Show comment
Hide comment
@andrewdavidwong

andrewdavidwong Mar 28, 2016

Member

Is the difficulty to upgrade Whonix TemplateVMs over clearnet considered a bug or feature?

I consider it a feature. (IMHO, it's even worth considering broadening it into a global Qubes feature.)

Do we trust the Qubes management stack enough to really set Whonix TemplateVM's NetVM to a Whonix-Gateway ProxyVM?

I'm not sure I understand. What exactly is the concern? Is it that, if the mechanism were to be removed, the Qubes management stack could somehow fail, and the Whonix TemplateVM's NetVM would default to the regular clearnet ProxyVM, which could result in the user updating the Whonix TemplateVM over their clearnet connection?

And if the user changes Whonix TemplateVM's NetVM to sys-firewall (or so) should the user be free to easily upgrade over clearnet or should the user be more patronized and have to jump through an additional hoop?

IMHO, a warning pop-up is not, in this particular case, patronizing. Rather, it's an appropriate way of protecting users from making an honest mistake (a mistake which even a competent, diligent new user could make simply due to not yet being familiar with how Qubes+Whonix works).

I think most users will expect and appreciate that Whonix errs on the side of caution in informing and warning them about taking risky actions. Speaking from a user's perspective, my expectations for privacy-oriented software are different from most other software. When I see that my privacy-oriented software has checks in place which force me to proceed carefully and methodically, it inspires confidence that the software is well-thought-out and designed to protect me. I don't feel annoyed. I feel grateful.

The only time I would feel annoyed is if there were a particular action which I performed regularly, but which I was blocked from/nagged for performing every time, with no option to opt out of the blocking/nagging. So, I do think that experienced users should be free to use whichever NetVM they want, and I think a good way to do this is to offer a "never warn me again"-type option.

Member

andrewdavidwong commented Mar 28, 2016

Is the difficulty to upgrade Whonix TemplateVMs over clearnet considered a bug or feature?

I consider it a feature. (IMHO, it's even worth considering broadening it into a global Qubes feature.)

Do we trust the Qubes management stack enough to really set Whonix TemplateVM's NetVM to a Whonix-Gateway ProxyVM?

I'm not sure I understand. What exactly is the concern? Is it that, if the mechanism were to be removed, the Qubes management stack could somehow fail, and the Whonix TemplateVM's NetVM would default to the regular clearnet ProxyVM, which could result in the user updating the Whonix TemplateVM over their clearnet connection?

And if the user changes Whonix TemplateVM's NetVM to sys-firewall (or so) should the user be free to easily upgrade over clearnet or should the user be more patronized and have to jump through an additional hoop?

IMHO, a warning pop-up is not, in this particular case, patronizing. Rather, it's an appropriate way of protecting users from making an honest mistake (a mistake which even a competent, diligent new user could make simply due to not yet being familiar with how Qubes+Whonix works).

I think most users will expect and appreciate that Whonix errs on the side of caution in informing and warning them about taking risky actions. Speaking from a user's perspective, my expectations for privacy-oriented software are different from most other software. When I see that my privacy-oriented software has checks in place which force me to proceed carefully and methodically, it inspires confidence that the software is well-thought-out and designed to protect me. I don't feel annoyed. I feel grateful.

The only time I would feel annoyed is if there were a particular action which I performed regularly, but which I was blocked from/nagged for performing every time, with no option to opt out of the blocking/nagging. So, I do think that experienced users should be free to use whichever NetVM they want, and I think a good way to do this is to offer a "never warn me again"-type option.

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Mar 31, 2016

Member

Axon:

Do we trust the Qubes management stack enough to really set
Whonix TemplateVM's NetVM to a Whonix-Gateway ProxyVM?
I'm not sure I understand. What exactly is the concern? Is it that,
if the mechanism were to be removed, the Qubes management stack could
somehow fail, and the Whonix TemplateVM's NetVM would default to the
regular clearnet ProxyVM, which could result in the user updating the
Whonix TemplateVM over their clearnet connection?

Was only concerned about hypothetical bugs leading to not setting the
NetVM to sys-whonix.

Member

adrelanos commented Mar 31, 2016

Axon:

Do we trust the Qubes management stack enough to really set
Whonix TemplateVM's NetVM to a Whonix-Gateway ProxyVM?
I'm not sure I understand. What exactly is the concern? Is it that,
if the mechanism were to be removed, the Qubes management stack could
somehow fail, and the Whonix TemplateVM's NetVM would default to the
regular clearnet ProxyVM, which could result in the user updating the
Whonix TemplateVM over their clearnet connection?

Was only concerned about hypothetical bugs leading to not setting the
NetVM to sys-whonix.

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Mar 31, 2016

Member

Okay, so we consider this a feature.

Member

adrelanos commented Mar 31, 2016

Okay, so we consider this a feature.

@adrelanos adrelanos closed this Mar 31, 2016

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment