I know TailsOS offers best privacy when it is booted into. However, I will be using TailsOS strictly for testing purposes.
I just tried creating a standalone qube with 2000 MB RAM, two virtual CPUs, and sys-net as its netqube. I tried “Boot qube from CD-ROM” in Qube Settings, and selected the tails-amd64-6.4.img. However, I am getting “Could not read the boot disk. No bootable device” error.
Is there a way to get TailsOS run as a standaloneVM inside Qubes? Similar to how PrestiumOS was back in the old times.
How do I fill-in the network settings inside TailsOS? So far I have tried inserting the various combinations of IP, Netmask, Gateway, DNS values into Gnome Network manager inside TailsOS, but no success.
How are you checking that network is not working?
Maybe Tails is blocking all network connections outside of Tor.
Did you connect your Tails qube to sys-whonix? In that case it’ll be Tor-over-Tor situation and it’s not supported and will not work.
You need to start Tor in Tails after configuring the network settings according to the guide:
I’ve used Fedora Live ISO for a test and this configuration worked for me there:
1 - A
2 - B
3 - C
a - off
4,5,6 - D,E (string 10.139.1.1,10.139.1.2)
b - on
7,8,9,10 - not set
c - unchecked
If a is off then you’ll be able to set custom DNS servers instead of the ones received from DHCP
If b is on then the connection routes will be added automatically
If c is checked then the connection won’t be used as default route
Thanks, but even after inputting your suggestions, I am still unable to connect to the tor network from insdei TailsOS standaloneVM. I really doubt that my internet connection is blocking access to tor – this can’t be because I am writing this message from a Whonix DispVM, and my myriad other programs are running right now over the tor daemon.
Can you perhaps check your suggested settings with a TailsOS StandaloneVM instead of a Fedora one?
I gave it a try and with the same network configuration using ping and netcat between Tails and its net qube using tcpdump I can see that packets that are coming from Tails, received by net qube, reply sent from net qube to Tails and I can see the reply from net qube coming in eth0 interface in Tails but it’s not reaching the ping/netcat app in Tails.
So Tails is blocking the apps from receiving the packets, but I’m not sure what configuration in Tails is responsible for it (firewall/namespace/apparmor/etc?).
If you can start an HVM with Tails OS iso and connect to Tor than I do suggest a Ventoy Template with all iso’s and disk images you need. I had one for years. I’m not a fan of Tails and I consider it TOXIC so I have only 3 older images and iso. None of them are current.
Thank you @kenosen for your response. I tried to follow the installation but now I am getting stuck at qvm-run -p dispVM "sudo cat /dev/vxdi" | sudo dd status=progress of=/dev/mapper/qubes_dom0-vm--tails-vm-root
dd: writing to '/dev/mapper/qubes_dom0-vm--tails-vm-root': No space left on device
8193+0 records in
8192+0 records out
4194304 bytes (4.2 MB, 4.0 MiB) copied, 0.387461 s, 10.8MB/s
I am using a 32GB usb
when i do lsblk in dispVM I see
vxdi 29.9G
vxdi1 8G
vxdi2 21.9
Just to be safe, I even increased the storage in tails-vm qube
private storage max size = 33GB
system storage max size = 33GB
Tried with exact sizes too. but still the same issue
Isn’t that an internal vm partition? You should have a tails USB, attach that USB to the disposable, and then you’d be looking for /dev/sda or perhaps /dev/sdb whichever is the mount point of the USB drive.