Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upDisplay a privacy risk warning when attempting to change anon-whonix's default_dispvm value #3561
Comments
andrewdavidwong
added
bug
privacy
C: Whonix
labels
Feb 10, 2018
andrewdavidwong
added this to the Release 4.0 milestone
Feb 10, 2018
andrewdavidwong
referenced this issue
in QubesOS/qubes-doc
Feb 10, 2018
Merged
Dispvm 4.0 updates #538
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
Feb 10, 2018
Member
Looks like we might need confirmation about whether the reported behavior is actually the default:
QubesOS/qubes-doc#538 (comment)
Even if it's not the default, however, it might be worth considering having some kind of warning in case the user gets themselves into this situation.
|
Looks like we might need confirmation about whether the reported behavior is actually the default: QubesOS/qubes-doc#538 (comment) Even if it's not the default, however, it might be worth considering having some kind of warning in case the user gets themselves into this situation. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Feb 10, 2018
Fresh install of R4.0rc4 and anon-whonix's default_dispvm is set to whonix-ws-dvm. netvm on both is set to sys-whonix, so out of the box this is not an issue.
Changing the system default dispvm with qubes-prefs does NOT change default_dispvm in anon-whonix or whonix-ws-dvm.
So it's not a default/out of the box concern, but the system does let people shoot themselves in the foot if they start changing anon-whonix or whonix-ws-dvm values around. I'll revise the the doc PR accordingly.
awokd
commented
Feb 10, 2018
|
Fresh install of R4.0rc4 and anon-whonix's |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Feb 10, 2018
However @andrewdavidwong , the Qube Setting GUI is a bit buggy. If I use it to view anon-whonix's default_dispvm on the advanced tab, it claims it's set to the qubes-prefs' default_dispvm, even though it's actually using the value in qvm-prefs anon-whonix default_dispvm. I think there might be a similar issue out there too about the kernel value on this tab.
Also, hitting the drop-down for dispvm only lists default and (none), when I'd expect it to list all templates where template_for_dispvms = true.
awokd
commented
Feb 10, 2018
|
However @andrewdavidwong , the Qube Setting GUI is a bit buggy. If I use it to view anon-whonix's |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
Feb 10, 2018
Member
Thanks for checking and documenting, @awokd. I'll update this issue to be one about footgun protection and open another one for the general Qube Setting GUI buginess.
|
Thanks for checking and documenting, @awokd. I'll update this issue to be one about footgun protection and open another one for the general Qube Setting GUI buginess. |
andrewdavidwong
added
enhancement
P: minor
and removed
bug
labels
Feb 10, 2018
andrewdavidwong
modified the milestones:
Release 4.0,
Release 4.1
Feb 10, 2018
andrewdavidwong
changed the title from
DispVMs launched from anon-whonix use clearnet by default
to
Display a privacy risk warning when attempting to change anon-whonix's default_dispvm value
Feb 10, 2018
andrewdavidwong
added
UX
C: qubes-manager
labels
Feb 10, 2018
andrewdavidwong
referenced this issue
Feb 10, 2018
Closed
The Qube Settings GUI displays information in a misleading way #3565
added a commit
to QubesOS/qubes-doc
that referenced
this issue
Feb 10, 2018
andrewdavidwong
referenced this issue
Feb 17, 2018
Closed
whonix-ws-based VMs lack the anon-vm tag #3595
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
Feb 18, 2018
Member
In #3595 (comment), @mirrorway reports that the one whonix-ws-based VM that happens to be pre-made with the name anon-whonix does not exhibit this problem, but all the subsequent use-created ones do.
|
In #3595 (comment), @mirrorway reports that the one |
andrewdavidwong commentedFeb 10, 2018
•
edited
Edited 1 time
-
andrewdavidwong
edited Feb 10, 2018 (most recent)
Qubes OS version:
R4.0-rc4Affected TemplateVMs:
whonix-wsSteps to reproduce the behavior:
In a defaultR4.0-rc4installation, launch a DispVM fromanon-whonix.Change
anon-whonix'sdefault_dispvmsetting to something other thanwhonix-ws-dvm.Expected behavior:
The DispVM usessys-whonixas its NetVM so that its traffic is Torified.The user is warned about the privacy implications of doing this.
Actual behavior:
The DispVM usessys-netas its NetVM, resulting in a high risk of deanonymization.No warning is given.
General notes:
See: QubesOS/qubes-doc#538 (comment)
CC: @adrelanos