Preventing non-Tor connections

corridor is indeed the wrong tool for this topic. (Unless it’s installed it on your router. In that case it’s a nice fail-safe mechanism that can also point out some misconfigurations of your e.g. Qubes OS device, allowing you to fix them before you use the device with a non-corridor router.)

To avoid making non-Tor connections on a Qubes OS device in the first place:

  1. Set the system’s default net qube to sys-whonix or none, and don’t override it to sys-firewall or sys-net for individual qubes (except for sys-whonix itself, which usually should have sys-firewall as its net qube)
  2. Set the clock qube to sys-whonix or none
  3. Set the dom0 update proxy to sys-whonix
  4. Set the template update proxy to sys-whonix for both Whonix and non-Whonix templates
  5. sys-net and sys-firewall are special, because they are upstream from sys-whonix. Add nftables rules (ordered before the systemd network-pre.target) to prevent them from generating their own (non-loopback) output.
1 Like