How do i set up whonix under a VPN after this guide?

Hello. thanks for your answer…
I would like to be able to switch between a vpn provider… if i add one to mullvad vpn qube and the network manager and try to pick the new in the list, it re-connects to mullvad…
If i use seperate ones i need to create new appvm’s like extra debian vm also perhaps then…
Could anyone make a guide on how to set this up perhaps? If someone has time that is :slight_smile: Otherwise i can try some later on… It seems to connect to mullvad in the same mullvad qube though, if i add an extra…
Mullvad is in global manager and that might be why, i don’t know…

Why would you want 2 vpn’s chained? Just to take slightly longer to be deanonymized?

He might not want vpn1 to know his destination, and vpn2 to not know his actual ip… Depending on his own threat model and the precautions he takes to subscribe to the vpns, this may or may not be achievable.

To each their own!

How to set up a new AppVM or a vpn? There are guides for both and seems like you already created one of each, so it’s the exact same process, just different vpn providers. But the ovpn files work in the same way.

When you create an AppVM, if you don’t explicitly set a netvm, it’ll use the default netvm.
You can check it with:

[user@dom0 ~]$ qubes-prefs default_netvm

To check the netvm used by a particular qube run:

[user@dom0 ~]$ qvm-prefs QUBE-NAME netvm

You can change the netvm used by a qube by adding the name of the new netvm at the end of the command above.

So if you want a chained setup like browser-vm > vpn-2 > vpn-1 > sys-firewall > sys-net you need to do the following:

[user@dom0 ~]$ qvm-prefs vpn-1 netvm sys-firewall
[user@dom0 ~]$ qvm-prefs vpn-2 netvm vpn-1
[user@dom0 ~]$ qvm-prefs browser-vm netvm vpn-2

I used arbitrary vm names, you need to use the exact name you have on your system.

Also keep in mind that unless you change this set up, vpn-2 will always connect to vpn-1 from now on. If you wish to separate them you’ll need to change the netvm associated to vpn-2 to sys-firewall (in the second command, replace vpn-1 with sys-firewall).

Finally, if you want to change the default netvm to vpn-2 for new qubes (and old qubes that have the netvm property set to default), simply run:

[user@dom0 ~]$ qubes-prefs default_netvm vpn-2

No i just want to be able to switch vpn. Just use one at a time. .

Yeah i agree… It’s best to create a new one like in the guide and just switch in global manager if you wanna change the vpn. And the plan is to use just one vpn at a time, not two… Thanks for the answer!

The best way would be to have separate vpn-services and to just change the vpn in global manager and all qubes that wants to use the vpn… good to know. The official vpn qubes quide is good also though… might be the best actually or smartest solution.

What would be a good way to disconnect the VPN in this guide temporary? It does reconnect if i disconnect it, as it should. But how do i remove that temporarily and just use the normal internet traffic in the best way? I want to check something out of curiosity. Thanks

Has qubes changed? I get get this now:
Then choose Import a saved VPN configuration... from the dropdown list, and click Create.

And the import VPN is gone. How do i fix that?

update… This guide don’t work with a debian template apparently.
How do i install VPN options in debian? I could try it and see if that works.

Make sure that you have both network-manager-openvpn and network-manager-openvpn-gnome installed with apt.

Yes thanks.
sudo apt install `network-manager-openvpn network-manager-openvpn-gnome -y