Kicksecure Tor Integration
Using Kicksecure without Tor. Can Kicksecure be used without Tor?
Introduction
[edit]Documentation on how to use Kicksecure without Tor.
Options
[edit]Choose one or multiple options (A to E).
A Kicksecure Repositories Review
Look through the repositories provided by Kicksecure on GitHub![]()
(sorted by name
![]()
). For example, security-misc can be installed without installing any packages that
Depends: on tor.
Each repository has a rudimentary README file that explains the functionality of the software package and how to install it.
B Packages for Debian Hosts
Some packages are mentioned on the Packages for Debian Hosts wiki page.
C Kicksecure Meta Packages Review
Alternatively, the user could look at kicksecure-meta-packages debian/control and choose meta packages that do not
Depends: on tor. This is not easy, as a package on which a meta package Depends: might itself have a Depends: on tor.
The user would have to review the output of APT before proceeding with installation to see if it includes tor.
D Install a fake Tor package
1 Pretend that tor is already installed by creating a dummy package using dummy-dependency:
dummy-dependency tor
2 Adjust the system so that APT updates are performed without using Tor.
3 Follow the instructions in Update without Tor to complete the configuration.
E Mask the Tor service.
The user could attempt to prevent Tor from starting before installing Kicksecure. Untested!
1 Prevent the main Tor service from starting automatically.
sudo systemctl mask tor
2 Prevent the default Tor instance from being started by systemd.
sudo systemctl mask tor@default
3 After masking Tor, proceed with Update without Tor.
Update without Tor
[edit]1 Overview and preparation.
Read this section carefully. No commands need to be run yet.
The tor+ prefix would need to be removed from any APT sources files:
- 1 The /etc/apt/sources.list file; and
- 2 Any file inside the /etc/apt/sources.list.d folder.
By Kicksecure default, this would involve modification of /etc/apt/sources.list.d/derivative.sources
, which can be done using the repository-dist tool, and /etc/apt/sources.list.d/debian.sources
, which is documented below.
2 Reconfigure /etc/apt/sources.list.d/derivative.sources to use clearnet transport.
sudo repository-dist --enable --repository stable --transport plain-tls
See Project-APT-Repository for other options (such as testers repository, etc.).
3 Manually remove the tor+ prefix from the Debian sources file.
sudo str_replace "tor+https" "https" /etc/apt/sources.list.d/debian.sources
4 Review and update any additional APT sources files.
Only required if additional third-party repositories were previously added.
5 Completion.
The process of disabling torified APT updates has been completed.
Qubes specific
[edit]Using cacher over clearnet
[edit]Since Kicksecure updates are torified by default (security feature)![]()
, this is not compatible with Qubes
cacher by default without additional configuration.
To set up Qubes cacher:
1 Disable torified updates inside the Kicksecure Template.
The user would need to apply the instructions Update without Tor in the Kicksecure Template.
2 Configure Qubes cacher using the standard Qubes documentation.
Unspecific to Kicksecure. Self Support First Policy applies.
3 Completion.
The process of configuring clearnet cacher updates has been completed.
Using cacher over Tor
[edit]1 Set up Qubes cacher according to the standard Qubes instructions.
Unspecific to Kicksecure. Self Support First Policy applies.
2 Route cacher traffic through Tor.
cacher would need to be configured to use a NetVM that supports torification, such as, for example, Whonix sys-whonix. This is also unspecific to Kicksecure.
3 Configure the Kicksecure Template to use cacher as the Qubes UpdatesProxy.
Specific to Qubes, not Kicksecure.
4 Disable torified updates inside the Kicksecure Template.
The user would need to apply the instructions Update without Tor in the Kicksecure Template. This is because torification would be handled by cacher and its NetVM. [1]
5 Completion.
The process of configuring torified cacher updates has been completed.
Future
[edit]This is mostly undocumented. No development progress should be expected, as this is not the project focus.
References
[edit]- ↑
The
tor+syntax that Kicksecure is using is not easily compatible withapt-cacher-ng.
We believe security software like Kicksecure needs to remain Open Source and independent. Would you help sustain and grow the project? Learn more about our 13 year success story and maybe DONATE!