kommuni
February 21, 2021, 9:15pm
1
Continuing the discussion from How is the QubesOS firewall implemented? :
Example - I have 2 qubes representing different identities, which I use
to access separate accounts on the same mail server - if I put them behind
a firewall then they will share a common circuit, allowing identity
correlation.
This can be prevented by using the Stream Isolation[0] feature provided by sys-whonix / whonix-gateway.
To isolate a circuit for a specific qube, it is possible by combining redsocks[1].
Also, sys-whonix bundled Onion Circuits, which is useful for checking the isolation.
[0] Stream Isolation
[1] GitHub - darkk/redsocks: transparent TCP-to-proxy redirector
1 Like
deeplow
February 22, 2021, 10:15am
2
(Moved this into a new topic. Feel free to propose a title change)
unman
February 24, 2021, 5:18pm
3
Stream isolation as documented will not prevent this, since it uses dst
port and dst address.
kommuni
February 24, 2021, 7:32pm
4
Have you tried it? that’s what I thought when I saw the document.
I ran the following commands in two VMs using sys-whonix as netVM, but the streams were isolated.
VM1 : curl -L --socks5-hostname 10.152.152.10:9181 https://1.1.1.1
VM2 : curl -L --socks5-hostname 10.152.152.10:9182 https://1.1.1.1