i have a sys-vpn qube set up to which sys-whonix provides networking
in sys-vpn i have mullvad running over wireguard with udp2tcp so it’s compatible with tor
while you’re here, i’ve another question (although this is quite off topic to this thread)
do you have any clue on why whenever i try making requests on the qubes that sys-vpn provides internet to, nothing goes through EXCEPT for when i (for example on firefox) set my proxy to the one mullvad provides (10.64.0.1)? very odd but i can’t really think of any reason
If you do this and connect any other qubes to that firewall, then there
is a risk of breaking anonymity, because sys-whonix will see all
traffic as originating from the same IP - that of the firewall. This may
be fine for your threat model. Or not.
I never presume to speak for the Qubes team.
When I comment in the Forum I speak for myself.
The easy solution IMO would be to have a firewall qube for the vpn qube, and continue to use sys-whonix as a netvm for all other qubes that need to go through tor but do not need firewall rules.
just now rereading this, and (excuse my weak knowledge of qubes) i’m not quite sure what you mean
by “that firewall”, are you talking about the qube between sys-whonix and sys-vpn?
also, how does sys-whonix seeing traffic originating from the firewall’s ip risk breaking anonymity? in the case of compromise you mean?
Since the firewall masquerades all traffic, the netvms will see all
traffic as originating from the same IP address - this means there is a
risk that streams from different qubes will not be isolated. (Not
obviously a problem for guarding VPN.)
I never presume to speak for the Qubes team.
When I comment in the Forum I speak for myself.