HOME

TheInfoList



OR:

Whonix (, ) is a Kicksecure–based security hardened
Linux distribution A Linux distribution (often abbreviated as distro) is an operating system made from a software collection that includes the Linux kernel and, often, a package management system. Linux users usually obtain their operating system by downloading one ...
. Its main goals are to provide strong
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of ...
and
anonymity Anonymity describes situations where the acting person's identity is unknown. Some writers have argued that namelessness, though technically correct, does not capture what is more centrally at stake in contexts of anonymity. The important idea he ...
on the Internet. The operating system consists of two virtual machines, a "Workstation" and a Tor "Gateway", running
Debian Debian (), also known as Debian GNU/Linux, is a Linux distribution composed of free and open-source software, developed by the community-supported Debian Project, which was established by Ian Murdock on August 16, 1993. The first version of De ...
GNU/Linux. All communications are forced through the
Tor network Tor, short for The Onion Router, is free and open-source software for enabling anonymous communication. It directs Internet traffic through a free, worldwide, volunteer overlay network, consisting of more than seven thousand relays, to conc ...
. Both Whonix and Kicksecure have documentation which spans from basic operating system maintenance to more advanced topics.


History


The first iteration, TorBOX (February-July 2012)

The initial concept was announced by Schleizer under the pseudonym ''Proper'', and later changed to ''Adrelanos in 2012 before revealing his identity in 2014''. His idea was to leverage a
virtual machine In computing, a virtual machine (VM) is the virtualization/ emulation of a computer system. Virtual machines are based on computer architectures and provide functionality of a physical computer. Their implementations may involve specialized h ...
acting as a
transparent proxy In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. Instead of connecting directly to a server that can fulfill a request ...
to route all Internet traffic through the
Tor network Tor, short for The Onion Router, is free and open-source software for enabling anonymous communication. It directs Internet traffic through a free, worldwide, volunteer overlay network, consisting of more than seven thousand relays, to conc ...
. This would have allowed to mask one's
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
, prevent
DNS leak A DNS leak refers to a security flaw that allows DNS requests to be revealed to ISP DNS servers, despite the use of a VPN service to attempt to conceal them. Although primarily of concern to VPN users, it is also possible to prevent it for proxy ...
s and avoid having to configure proxy settings for individual applications (or ones who do not support them). TorBOX was at its beginning only a guide released on the
Tor Project Tor, short for The Onion Router, is free and open-source software for enabling anonymous communication. It directs Internet traffic through a free, worldwide, volunteer overlay network, consisting of more than seven thousand relays, to conc ...
br>website
which also provided some
shell script A shell script is a computer program designed to be run by a Unix shell, a command-line interpreter. The various dialects of shell scripts are considered to be scripting languages. Typical operations performed by shell scripts include file man ...
s. Other contributors provided more information as TorBOX became more popular. As the project's complexity grew, leak tests became increasingly necessary. Some contributors developed utilities to automatize many steps and improve
user-friendliness Usability can be described as the capacity of a system to provide a condition for its users to perform the tasks safely, effectively, and efficiently while enjoying the experience. In software engineering, usability is the degree to which a sof ...
. Nonetheless, maintaining the build instructions for TorBOX while simultaneously updating the shell scripts became too much of a burden for the developers, who decided to drop the manual creation instructions, migrating them and focusing exclusively on the shell scripts. Even then, complexity was still growing due to additional features or changes in line with security research. In March 25, 2012 with the release of TorBOX's 0.1.3, the programmers agreed to completely automatize the build process and improving codability with a change in the developing process, brought by a new website with better capabilities than the old project's wiki. The TorBOX/aos wiki listed seven released versions. With the advent of the third release, proper released his GPG
public-key Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
containing his contact information, The sixth version saw the first rename of the developer proper to adrelanos. However, the former username was maintained on the Tor Website until the seventh and final version. Development of TorBOX continued until version 0.2.1, release July 16, 2012. The project was renamed the following day.


Rename into aos (July-September 2012)

Andrew Lewman (then Tor Project Executive Director) privately advised adrelanos to rename the project, stating that even if TorBOX mentioned on its website about being unaffiliated with the Tor Project, it was still being mistaken by some people. Adrelanos renamed the project aos, acronym of "anonymous operating system". No new releases were made under the name aos.


Final rename and continued development as Whonix (September 2012-present)

The choice of the name aos was quickly regretted and described as "sub-optimal" by adrelanos. He noted that search engines didn't return relevant results due to the name being shared with many other acronyms. A secondary reason was the project's name being non-capitalized, which would have made it incompatible with the grammatical convention of capitalizing a word at the beginning of a sentence. Adrelanos posted a request for suggestions on the tor-talk
mailing list A mailing list is a collection of names and addresses used by an individual or an organization to send material to multiple recipients. The term is often extended to include the people subscribed to such a list, so the group of subscribers is re ...
. His original idea was a name which would have made the purpose of the anonymous operating system clear and at the same time avoiding confusion or trademark issues.
Nick Mathewson Nick Mathewson is an American computer scientist and co-founder of The Tor Project. He, along with Roger Dingledine, began working on onion routing shortly after they graduated from Massachusetts Institute of Technology (MIT) in the early 2000s. ...
, Tor Project's co-founder debated the idea of having a self-explanatory name, stating that Tor was "doing okay" even without having a particularly descriptive name. While many suggestions were sent, adrelanos concluded the post announcing the new name, Whonix, and publishing a signed message with his final decision on the project's website. He reasoned that the name was unused and would have provided more results in search engines. Whonix is a
compound Compound may refer to: Architecture and built environments * Compound (enclosure), a cluster of buildings having a shared purpose, usually inside a fence or wall ** Compound (fortification), a version of the above fortified with defensive struc ...
of two words: who ("what person/s") and nix (a German word that means "nothing"). Whonix 0.3.0, never released, was based on
Ubuntu Ubuntu ( ) is a Linux distribution based on Debian and composed mostly of free and open-source software. Ubuntu is officially released in three editions: '' Desktop'', ''Server'', and ''Core'' for Internet of things devices and robots. All ...
. While Ubuntu was praised from a technical perspective, potential trademark issues would have complicated the distribution along the potential revocation of the license from
Canonical The adjective canonical is applied in many contexts to mean "according to the canon" the standard, rule or primary source that is accepted as authoritative for the body of knowledge or literature in that context. In mathematics, "canonical examp ...
. Complying with the terms requested by a rebranding would have required work which was beyond the capability of the Whonix developers. Moreover, the release of Ubuntu 12.10 was heavily criticized for the closer integration with the
Amazon Amazon most often refers to: * Amazons, a tribe of female warriors in Greek mythology * Amazon rainforest, a rainforest covering most of the Amazon basin * Amazon River, in South America * Amazon (company), an American multinational technolog ...
ecosystem and other privacy issues. The Whonix project recognized the privacy issues which would have caused a problem with the use of Ubuntu, and recommended against using it even on the host machine. The first release under the new name of Whonix happened with version 0.4.4, the first one since TorBOX 0.2.1. It was rebased on Debian which is described by the project as being "a good compromise of security and usability". The second release, Whonix 0.4.5 was the first to be announced by adrelanos on the tor-talk mailing list. In a blog post published on January 18, 2014 on the Whonix wiki, adrelanos decided to give up his
pseudonymity A pseudonym (; ) or alias () is a fictitious name that a person or group assumes for a particular purpose, which differs from their original or true name ( orthonym). This also differs from a new name that entirely or legally replaces an individu ...
and using for the first time his real name, Patrick Schleizer. Schleizer, a German citizen stated the burden of maintaining his
operational security Operations security (OPSEC) is a process that identifies critical information to determine if friendly actions can be observed by enemy intelligence, determines if information obtained by adversaries could be interpreted to be useful to them, a ...
. Also, he mentioned that both the USA and Germany are not persecuting their citizens for criticizing the government, concluding with a remark on the importance of speaking out in public and taking action.


Porting to Qubes OS

In August 2014 a user called WhonixQubes announced on the qubes-users mailing list the first successful integration of
Qubes OS Qubes OS is a security-focused desktop Linux distribution that aims to provide security through isolation. Virtualization is performed by Xen, and user environments can be based on (with official support) Fedora or Debian, or (with communit ...
version R2-rc2 and Whonix 8.2.
Joanna Rutkowska Joanna Rutkowska (born 1981 in Warsaw) is a Polish computer security researcher, primarily known for her research on low-level security and stealth malware, and as founder of the Qubes OS security-focused desktop operating system. She became ...
, founder of Qubes OS, publicly stated her praise about the efforts. In June 2015, Rutkowska announced the reception of funding from the
Open Technology Fund The Open Technology Fund (OTF) is an American nonprofit corporation that aims to support global Internet freedom technologies. Its mission is to "support open technologies and communities that increase free expression, circumvent censorship, an ...
to further sponsor the porting work of Whonix to Qubes OS. The proposal to OTF was made initially in September 2014, after Rutkowska was approached by Michael Carbone, an employee of
Access Now Access Now is a non-profit organization founded in 2009 with a mission to defend and extend the digital civil rights of people around the world. Access Now supports programs including an annual conference on Human Rights (RightsCon), an index ...
and member of the Qubes OS team who helped with the process. At the same time, Patrick Schleizer wrote about wanting to personally focus on the development of Qubes-Whonix. With the release of Qubes OS R3.0 in October 2015, Whonix templates officially became available.


Variants


Standalone

The standard version of Whonix can be used on many different platforms as host-machines, such as
Windows Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for se ...
,
macOS macOS (; previously OS X and originally Mac OS X) is a Unix operating system developed and marketed by Apple Inc. since 2001. It is the primary operating system for Apple's Mac computers. Within the market of desktop and la ...
, GNU/Linux and Qubes OS. It is downloadable in formats compatible with the most common
hypervisors A hypervisor (also known as a virtual machine monitor, VMM, or virtualizer) is a type of computer software, firmware or hardware that creates and runs virtual machines. A computer on which a hypervisor runs one or more virtual machines is cal ...
like
VirtualBox Oracle VM VirtualBox (formerly Sun VirtualBox, Sun xVM VirtualBox and Innotek VirtualBox) is a type-2 hypervisor for x86 virtualization developed by Oracle Corporation. VirtualBox was originally created by Innotek GmbH, which was acquired by S ...
,
QEMU QEMU is a free and open-source emulator (Quick EMUlator). It emulates the machine's central processing unit, processor through dynamic binary translation and provides a set of different hardware and device models for the machine, enabling it t ...
, KVM and Xen. Whonix is reported to have experimental compatibility with
VMware VMware, Inc. is an American cloud computing and virtualization technology company with headquarters in Palo Alto, California. VMware was the first commercially successful company to virtualize the x86 architecture. VMware's desktop software ru ...
and
Hyper-V Microsoft Hyper-V, codenamed Viridian, and briefly known before its release as Windows Server Virtualization, is a native hypervisor; it can create virtual machines on x86-64 systems running Windows. Starting with Windows 8, Hyper-V superseded W ...
, though not officially supported. The VirtualBox packages for both the Workstation and Gateway are distributed with the xfce
desktop environment In computing, a desktop environment (DE) is an implementation of the desktop metaphor made of a bundle of programs running on top of a computer operating system that share a common graphical user interface (GUI), sometimes described as a grap ...
or in a headless "CLI" version. They can be seamlessly combined.


Qubes OS

Whonix can be configured directly from the Qubes OS' installation menu since version R3.0. Since at least Qubes OS R4.0 it can also be installed at a later time using the management software
Salt Salt is a mineral composed primarily of sodium chloride (NaCl), a chemical compound belonging to the larger class of salts; salt in the form of a natural crystalline mineral is known as rock salt or halite. Salt is present in vast quant ...
from dom0.


Design

An "advanced" configuration uses two physically separate computers, with the Gateway running on the hardware of one of the computers, and the Workstation running in a VM hosted on the second. This protects against attacks on hypervisors at the cost of flexibility. Supported physical hardware platforms include the
Raspberry Pi Raspberry Pi () is a series of small single-board computers (SBCs) developed in the United Kingdom by the Raspberry Pi Foundation in association with Broadcom. The Raspberry Pi project originally leaned towards the promotion of teaching basic ...
3 and unofficial community efforts on the PowerPC workstation hardware, Talos, from Raptor Computing. On first startup, each VM runs a check to ensure that the software is up to date. On every boot, the date and time are set using the ''sdwdate'' secure time daemon that works over Tor's TCP protocol. The Gateway VM is responsible for running Tor, and has two virtual network interfaces. One of these is connected to the outside Internet via
NAT Nat or NAT may refer to: Computing * Network address translation (NAT), in computer networking Organizations * National Actors Theatre, New York City, U.S. * National AIDS trust, a British charity * National Archives of Thailand * National A ...
on the VM host, and is used to communicate with Tor relays. The other is connected to a virtual LAN that runs entirely inside the host. The Workstation VM runs user applications. It is connected only to the internal virtual LAN, and can directly communicate only with the Gateway, which forces all traffic coming from the Workstation to pass through the Tor network. The Workstation VM can "see" only
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
es on the Internal LAN, which are the same in every Whonix installation. User applications therefore have no knowledge of the user's "real" IP address, nor do they have access to any information about the physical hardware. In order to obtain such information, an application would have to find a way to "break out" of the VM, or to subvert the Gateway (perhaps through a bug in Tor or the Gateway's Linux kernel). The Web browser pre-installed in the Workstation VM is the modified version of Mozilla Firefox provided by the Tor Project as part of its Tor Browser package. This browser has been changed to reduce the amount of system-specific information leaked to Web servers. Since version 15 Whonix supports an optional "amnesiac" live-mode, much like the similar security-focused operating system Tails. This combines the best of both worlds by allowing Tor's entry guard system to choose long-lived entry points for the Tor network on the Gateway, reducing the adversaries' ability to trap users by running malicious relays, while rolling back to a trusted state. Some precautions on the host may be needed to avoid data being written to the disk accidentally. Grub-live, an additional separate project, aims to allow bare-metal Debian hosts to boot into a live session, avoiding forensic remnants on disc. For the best defense against malicious guards, it is recommended to boot up the gateway from a pristine state and have a unique guard paired to each user activity. Users would take a snapshot to be able to switch to, and use that guard consistently. This setup guarantees that most activities of the user remain protected from malicious entry guards while not increasing the risk of running into one as a completely amnesiac system would.


Scope

Anonymity is a complex problem with many issues beyond IP address masking that are necessary to protect user privacy. Whonix focuses on these areas to provide a comprehensive solution. Some features: * Kloak - A keystroke anonymization tool that randomizes the timing between key presses. Keystroke biometric algorithms have advanced to the point where it is viable to fingerprint users based on soft biometric traits with extremely high accuracy. This is a privacy risk because masking spatial information—such as the IP address via Tor—is insufficient to anonymize users. * Tirdad - A Linux kernel module for overwriting TCP ISNs. TCP Initial Sequence Numbers use fine-grained kernel timer data, leaking correlatable patterns of CPU activity in non-anonymous system traffic. They may otherwise act as a side-channel for long running crypto operations. * Disabled TCP Timestamps - TCP timestamps leak system clock info down to the millisecond which aids network adversaries in tracking systems behind NAT. * sdwdate - A secure time daemon alternative to NTP that uses trustworthy sources and benefits from Tor's end-to-end encryption. NTP suffers from being easy to manipulate and surveil. RCE flaws were also discovered in NTP clients. * MAT 2 - Software and filesystems add a lot of extraneous information about who, what, how, when and where documents and media files were created. MAT 2 strips out this information to make file sharing safer without divulging identifying information about the source. * LKRG - Linux Kernel Runtime Guard (LKRG) is a Linux security module that thwarts classes of kernel exploitation techniques. Hardening the guest OS makes it more difficult for adversaries to break out of the hypervisor and deanonymize the user.


Documentation

The Whonix wiki includes a collection of operational security guides for tips on preserving anonymity while online. Additionally, a number of original content guides on which security tools to use, and how to use such tools, have been added over time. This includes how to access the
I2P The Invisible Internet Project (I2P) is an anonymous network layer (implemented as a mix network) that allows for censorship-resistant, peer-to-peer communication. Anonymous connections are achieved by encrypting the user's traffic (by using ...
and
Freenet Freenet is a peer-to-peer platform for censorship-resistant, anonymous communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web ...
networks over Tor.


See also

*
Tails (operating system) Tails, or The Amnesic Incognito Live System, is a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity. It connects to the Internet exclusively through the anonymity network Tor. The system is designed t ...
*
Qubes OS Qubes OS is a security-focused desktop Linux distribution that aims to provide security through isolation. Virtualization is performed by Xen, and user environments can be based on (with official support) Fedora or Debian, or (with communit ...


References


External links

* * {{Linux-distro 2012 software Linux distributions Operating system security Tor onion services X86-64 Linux distributions