qubes.UpdatesProxy not updating everything over Tor

So by switching the lines up in that file I put the “$tag:whonix-updatevm $anyvm deny” line as first instead of last. This shouldn’t allow updates as ADW once told me on the Qubes forum. But when I try to update Fedora in the Qubes Update tool then it still works. Now when I try whonix-gw or whonix-ws it will give an error something along the lines of “access denied by qubes.UpdatesProxy”, which it should.

But I thought that these updates over Tor were for everything, including the Fedora and Debian templates but it seems like they’re just for the Whonix templates?

What is in your 90-default policy?

Sorry, what do you mean by that?

What rules for updating are there, if you are using 4.1?

You mean in the file?

$type:TemplateVM $default allow,target=sys-whonix

$tag:whonix-updatevm $default allow,target=sys-whonix

$tag:whonix-updatevm $anyvm deny

I switched the last line to the first, it should have stopped all updates to my understanding. But the Fedora and Debian ones still went through. I am on 4.1 and those are the only lines

/etc/qubes/policy.d/90-default.policy

You may want to check and experimenting with it by giving it lower number, since qubes.UpdatesProxy is deprecated in 4.1 but it has legacy support. Also, you can try to switch from $ to @ which is also introduced in 4.1.

2 Likes

Appreciate it, but I don’t think I should be messing around with the files like that on my main Qubes setup. I don’t really know what all that does. It really doesn’t even matter to me how the Fedora and Debian updates work. I only use Qubes for whonix so I’d just like to make sure that the updates for those templates go through Tor. And dom0 should be fine as long as the update qube for it is set as sys-whonix in global settings.

Only reason I’m enquiring about this is because like I said someone on here already told me that all template and system updates go through Tor if you check it during installation. But now when I mess the file up, the updates for Fedora and Debian are still working. Someone on Reddit just told me that the 2 other lines in that file (the first two in my previous reply) only apply to Whonix VMs. So I guess there aren’t even any rules to begin with that would update the Fedora, Debian templates through Tor? I hope I’m getting this right. Anyways, as long as the file in its original state still makes updates for Whonix WS/GW go through Tor, I’ll be happy.

You can check this by shutting down sys-whonix then try to update whonix-xxx. If starting of sys-whonix is invoked then everything is OK. It’s done via tor.

1 Like

That’s what I did with Fedora and Debian too. I shut down sys-whonix and tried to update the Deb and Fed templates. It did start up sys-whonix again and updated Deb/Fed, but how would it even be going through Tor if the qubes.UpdatesProxy file doesn’t have any rules regarding those templates? That’s why I was feeling like maybe it starts up sys-whonix because it’s supposed to go through that, but it doesn’t actually go through that.

This one has, and that is why I told you to check it?

1 Like

Okay, I see now. The command for “Upgrade all TemplateVMs through sys-whonix” is commented out. That’s why the updates for Fed/Deb were still going through. This whole time I was under the assumption that those Templates also go through Tor for updates. So for example if I want to also make Deb/Fed updates go through whonix, then I would need to uncomment the line from this file, but also add the line to qubes.UpdatesProxy? Are these two files somehow connected to eachother or something? And why does one use @ instead of $

1 Like

If any post resolved it for you please consider to flag it as a solution so it could help other users too.

My only real goal is to be certain that the whonix templates go through Tor for updates. So just for clarification: As long as the “/etc/qubes/policy.d/90-default.policy” file has the “Upgrade Whonix TemplateVMs through sys-whonix” and “Deny Whonix TemplateVMs using UpdatesProxy of any other VM” commands uncommented, and also has those same commands in “qubes.UpdatesProxy”, it should always go through Tor for whonix template updates right? And does it matter if I keep it $ on there or change it to @ like on the first file?

I understand that “/etc/qubes-rpc/policy/” is now the older version of “/etc/qubes/policy.d/” but it’s still in the filesystem and has an effect on updates, so making sure everything is right in “/etc/qubes-rpc/policy/” is recommended as well right?

Thank you for all the help!

It should.

It won’t matter until Qubes 5.0, as written there, but you have to keep an eye of 35-compat.policy which provides compatibility.

1 Like

I never said that. :slight_smile:

I said that rule won’t allow Whonix VMs to be updated.

Specifically, I wrote:

1 Like

You seem to know more about the policy files than anyone here so could you verify if I was correct on everything I said in my last reply on this post ^^

Thanks for always helping me

Since you still aren’t sure, please unmark my post as solution.

Your post solved it but I’m just trying to verify with ADW since he’s a part of the Qubes team.

My advise would be:

  • you have to assure yourself, not by others, otherwise there always be a shadow of doubt which is not good by any means.
  • if something is stated wrong here, “seniors” would most probably react, especially if wrongs are stated by “juniors” (like I am). I’m finding the proof in that @adw reacted on your wrong comprehension of his words, and on nothing else in this topic.

Conclusion: dare and believe in yourself. I hope you’ll find only positives in my post.

1 Like