{{Header}} {{title|title= How-to: "Un{{project_name_long}}" - enable clearnet networking }} {{#seo: |description=Enable clearnet networking for Whonix-Gateway and/or Whonix-Workstation / Curl Clearnet Connectivity Test from Whonix-Gateway. }} {{local_connections_mininav}} {{intro| Enable clearnet networking for Whonix-Gateway and/or Whonix-Workstation / Curl Clearnet Connectivity Test from Whonix-Gateway. This is for developers only! }} __TOC__ = Curl Clearnet Connectivity Test from Whonix-Gateway = '''Warning:''' Not anonymous! At time of writing IP {{Check.torproject.org IP}} is check.torproject.org. Using IP ({{Check.torproject.org IP}}) rather than DNS (check.torproject.org) is required since {{project_name_gateway_long}} does not have a global DNS resolver enabled by default for its own traffic (details on page [[Whonix-Gateway System DNS]]). {{CodeSelect|code= sudo -u clearnet {{Curl_Plain}} --silent {{Curl_Secure}} --header 'Host: check.torproject.org' --insecure https://{{Check.torproject.org IP}} | grep IP }} = Enable Clearnet Networking = == restore Whonix-Gateway clearnet networking == Instructions on how to remove {{project_name_short}} Tor default networking for {{project_name_gateway_short}}. After applying these instructions, {{project_name_gateway_short}} will connect to clearnet. This is possible because Whonix-Gateway is simplified "just a set of configurations". (And anything else would technically be pointless and a proprietary obfuscated software instead of a Freedom Software project. By reverting these configurations, it's possible to revert back to the same functionality that Debian has, which Whonix is based on. And Debian of course supports clearnet connectivity. This cannot happen by accident, see [[Dev/Technical_Introduction#Security_Overview]]. '''Warning:''' Not anonymous! {{Developers-only}} '''1.''' Inside {{project_name_gateway_short}}: [[Dev/Firewall_Unload|Unload {{project_name_short}} Firewall]]. '''2.''' Inside {{project_name_gateway_short}}: Verify that the firewall rules have been unloaded. . {{CodeSelect|code= sudo iptables --list }} Expected output:
Chain INPUT (policy ACCEPT)
target     prot opt source               destination

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination
'''3.''' Find out DNS server IP address. Choose either option '''A)''', '''B)''' or '''B)'''. * '''A)''' Use your router's IP address. * '''B)''' Use a public DNS server. (Potential privacy issues!) {{CodeSelect|code= ## Cloudflare nameserver 1.1.1.1 ## Google #nameserver 8.8.8.8 }} * '''C)''' Use the IP address provided by the DNS server IP address. Inside any other VM, any non-Tor VM, any non-Whonix VM. Such as a Debian (based) VM that has functional internet. Figure out its /etc/resolv.conf settings. {{CodeSelect|code= cat /etc/resolv.conf }} '''4.''' Inside {{project_name_gateway_short}}: Delete /etc/resolv.conf. {{CodeSelect|code= sudo rm /etc/resolv.conf }} '''5.''' Inside {{project_name_gateway_short}}: Use the same settings from the non-Tor VM. {{Open with root rights| filename=/etc/resolv.conf }} '''6.''' Inside {{project_name_gateway_short}}: Deactivate all uwt wrappers globally. {{Uwt_wrappers_deactivate_all_permanently}} '''7.''' Inside {{project_name_gateway_short}}: Download https://check.torproject.org {{scurl|https://check.torproject.org}} {{Open File| filename=index.html }} Should include.
Sorry. You are not using Tor.
'''8.''' Inside {{project_name_gateway_short}}: Untorify APT sources. For all files in /etc/apt/sources.list.d folder, remove the {{CodeSelect|inline=true|code= tor+ }} prefix. {{CodeSelect|code= for file_name in /etc/apt/sources.list /etc/apt/sources.list.d/* ; do sudo str_replace "tor+" "" "$file_name" ; done }} '''9.''' Done. == restore Whonix-Workstation clearnet networking == [[Undocumented]]. It would require at least: * Configuration of the host virtualization software to use either: ** A) a different gateway VM or ** B) changing the network type form internal to "normal" (virtualizer specific, NAT for VirtualBox for example). * Disabling Whonix-Workstation firewall. * DNS configuration. * Network configuration. Untested but of course possible in theory. This is possible because Whonix-Workstation is also simplified "just a set of configurations". By reverting these configurations, it's possible to revert back to the same functionality that Debian has, which Whonix is based on. And Debian of course supports clearnet connectivity. This cannot happen by accident or malware running inside the VM, see [[Dev/Technical_Introduction#Security_Overview]]. = How to Un{{project_name_short}} - {{project_name_short}} package removal = TODO: document = Footnotes = {{Footer}}