Kicksecure Tor Integration

From Kicksecure
Jump to navigation Jump to search

Using Kicksecure without Tor. Can Kicksecure be used without Tor?

Introduction

[edit]

Documentation on how to use Kicksecure without Tor.

Documentation for this is incomplete. Contributions are happily considered! See this for potential alternatives.

Options

[edit]

Choose one or multiple options (A to E).

A Kicksecure Repositories Review

Look through the repositories provided by Kicksecure on GitHubarchive.org iconarchive.today icon (sorted by namearchive.org iconarchive.today icon). For example, security-misc can be installed without installing any packages that Depends: on tor.

Each repository has a rudimentary README file that explains the functionality of the software package and how to install it.

B Packages for Debian Hosts

Some packages are mentioned on the Packages for Debian Hosts wiki page.

C Kicksecure Meta Packages Review

Alternatively, the user could look at kicksecure-meta-packages debian/controlGitHub Logo and choose meta packages that do not Depends: on tor. This is not easy, as a package on which a meta package Depends: might itself have a Depends: on tor.

The user would have to review the output of APT before proceeding with installation to see if it includes tor.

D Install a fake Tor package

1 Pretend that tor is already installed by creating a dummy package using dummy-dependency:

dummy-dependency tor

2 Adjust the system so that APT updates are performed without using Tor.

3 Follow the instructions in Update without Tor to complete the configuration.

E Mask the Tor service.

The user could attempt to prevent Tor from starting before installing Kicksecure. Untested!

1 Prevent the main Tor service from starting automatically.

sudo systemctl mask tor

2 Prevent the default Tor instance from being started by systemd.

sudo systemctl mask tor@default

3 After masking Tor, proceed with Update without Tor.

Update without Tor

[edit]

1 Overview and preparation.

Read this section carefully. No commands need to be run yet.

The tor+ prefix would need to be removed from any APT sources files:

  • 1 The /etc/apt/sources.list file; and
  • 2 Any file inside the /etc/apt/sources.list.d folder.

By Kicksecure default, this would involve modification of /etc/apt/sources.list.d/derivative.sources , which can be done using the repository-dist tool, and /etc/apt/sources.list.d/debian.sources , which is documented below.

2 Reconfigure /etc/apt/sources.list.d/derivative.sources to use clearnet transport.

sudo repository-dist --enable --repository stable --transport plain-tls

See Project-APT-Repository for other options (such as testers repository, etc.).

3 Manually remove the tor+ prefix from the Debian sources file.

sudo str_replace "tor+https" "https" /etc/apt/sources.list.d/debian.sources

4 Review and update any additional APT sources files.

Only required if additional third-party repositories were previously added.

5 Completion.

The process of disabling torified APT updates has been completed.

Qubes specific

[edit]

Using cacher over clearnet

[edit]

Documentation for this is incomplete. Contributions are happily considered! See this for potential alternatives.

Since Kicksecure updates are torified by default (security feature)archive.org iconarchive.today icon, this is not compatible with Qubes cacher by default without additional configuration.

To set up Qubes cacher:

1 Disable torified updates inside the Kicksecure Template.

The user would need to apply the instructions Update without Tor in the Kicksecure Template.

2 Configure Qubes cacher using the standard Qubes documentation.

Unspecific to Kicksecure. Self Support First Policy applies.

3 Completion.

The process of configuring clearnet cacher updates has been completed.

Using cacher over Tor

[edit]

Documentation for this is incomplete. Contributions are happily considered! See this for potential alternatives.

1 Set up Qubes cacher according to the standard Qubes instructions.

Unspecific to Kicksecure. Self Support First Policy applies.

2 Route cacher traffic through Tor.

cacher would need to be configured to use a NetVM that supports torification, such as, for example, Whonix sys-whonix. This is also unspecific to Kicksecure.

3 Configure the Kicksecure Template to use cacher as the Qubes UpdatesProxy.

Specific to Qubes, not Kicksecure.

4 Disable torified updates inside the Kicksecure Template.

The user would need to apply the instructions Update without Tor in the Kicksecure Template. This is because torification would be handled by cacher and its NetVM. [1]

5 Completion.

The process of configuring torified cacher updates has been completed.

Future

[edit]

This is mostly undocumented. No development progress should be expected, as this is not the project focus.

References

[edit]


Notification image

We believe security software like Kicksecure needs to remain Open Source and independent. Would you help sustain and grow the project? Learn more about our 13 year success story and maybe DONATE!