Hello, I have used the mullvad doc to create a vpn connection like in this documentation
. I want to wrap my vpn about tor to use my old email server ( and didn’t get banned ) so my mullvad vpn is working and I cloned my sys-whonix and put it after my mullvad vm so like
sys-net → sys-firewall-> MullvadVPN → sys-whonix → any Template
But even in my sys-whonix template I get only the response that I use tor when I use the curl command. So it’s like that my cloned sys -whonix template place tor infront of mullvad.
Can someone explain me how I can tunneling a vpn over tor? I searched a lot in the internet but didn’t found something that fits for my wireguard template. Is there an easy way to connecting to tor before a vpn?
What’s the point of putting the VPN before Tor…? That’s just an extra unnecessary middleman (unless you’re in one of those weird places that behead people for wanting freedom)
I’ve done Tor->VPN successfully in the past but not the other way around. Sounds to me like it’d be a little more complicated due to the way Whonix works but I could be wrong
But I get the same results. I configured that my sys-vpn use sys-firewall for network and then that sys-whonix clone use sys-vpn for internet. In sys-vpn I can connect to the internet, but when I try to connect to tor through my sys-whonix I can’t establish a connection.
After that I tried to use a new qube with an whonix gw, clicked on provides network and in a second fedora template that I placed behind I opened a Firefox browser. But when I tested my ip it shows me the tor ip. I configured that my sys-vpn use sys-whonix as net vm but then I get no connection at all.
And found this text
UDP-style VPN connections are incompatible with Tor because it requires the VPN to be configured to use TCP. [14] This requires adding proto tcp to the VPN configuration file /rw/config/vpn/openvpn-client.ovpn .
So I found and change the passage in my vpn file. After restarting the template I get the message “link is up” so it’s connecting with my sys-whonix template but because that’s not enough I had a 100% packet loss in my ping test. Does anyone know what I am doing wrong?
I chained together qubes to make this work. I’m not sure its the best approach.
Example:
sys-mullvad: Set your firewall settings to only allow connections from the Mullvad IPs. Set your vpn to auto start when qube loads. I used this guide to do that: Using Mullvad VPN in Qubes
sys-whonix: Standard tor connection.
sys-mullvad-whonix: Uses sys-mullvad for the network.
What it looks like in practice.
sys-mullvad start and connects to the VPN.
Then sys-mullvad-whonix starts and connects to Mullvad thru sys-mullvad. Then connects to tor.
(You can go a step further and chain another VPN too: Example: sys-mullvad-tor-proton.)
Slow, but when needed, it could save your life as the world spirals further into dystopia.
You could also replace Lokinet for the Tor part of the chain. That will be my next test.
Make sure you get the TCP 443 versions of your OpenVPN config files if you want it to work over Tor. I use two different VPN providers and they both offer port 443 options in their respective OpenVPN config download pages so I bet yours does too
Yeah rofl we can pretty much chain as many VPN’s and Tor circuits as RAM allows… now when we figure out how to throw i2p into the mix (as in an i2p netvm) then we win the anonymity game