sys-vpn has a firewall set via qvm-firewall to only be able to access my vpn server, the vpn app itself has lockdown mode set running udp2tcp (wireguard)
how leak proof is my set up? in what scenario could i leak?
is there absolutely no way for sys-vpn to bypass sys-whonix somehow? i get internet speeds at times far greater than i should be getting (2mbps downloads at times)
after switching to openvpn (instead of wireguard + udp2tcp) with the same firewall rules, speed is back to normal - perhaps udp2tcp bugs out when udp is blocked for whatever reason
tor-vpn doesn’t have to be a network qube, as long as it has sys-whonix as its network qube. On tor-vpn install openvpn and get a tcp config. Launch it and everything in tor-vpn is now going through whonix to the openvpn server. You check sys-whonix Tor Control Panel for the kind of connections it’s making. You should see the IP address of the VPN server in there.
Please keep in mind that vpn over tor should be used with caution. It’s fine for temporary use, for example to access a site that blocks Tor, but I advise against using it for regular use. Ideally use temporary VPN tokens (< 3 days), such as those offered by AirVPN and cryptostorm.