debian: Whonix systemd overrides

This commit is contained in:
Jason Mehring 2014-11-09 12:53:07 -05:00
parent 9efcf913e7
commit af189150c9
14 changed files with 80 additions and 40 deletions

View File

@ -40,6 +40,13 @@ user::rw-
group::r-- group::r--
other::r-- other::r--
# file: lib/systemd/system/qubes-whonix-init.service
# owner: root
# group: root
user::rw-
group::r--
other::r--
# file: etc # file: etc
# owner: root # owner: root
# group: root # group: root
@ -166,14 +173,14 @@ user::rwx
group::r-x group::r-x
other::r-x other::r-x
# file: usr/lib/whonix/whonix.sh # file: usr/lib/whonix/init
# owner: root # owner: root
# group: root # group: root
user::rwx user::rwx
group::r-x group::r-x
other::r-x other::r-x
# file: usr/lib/whonix/init # file: usr/lib/whonix/init/qubes-whonix-firewall.sh
# owner: root # owner: root
# group: root # group: root
user::rwx user::rwx
@ -201,12 +208,12 @@ user::rwx
group::r-x group::r-x
other::r-x other::r-x
# file: usr/lib/whonix/init/qubes-firewall-user-script # file: usr/lib/whonix/init/qubes-whonix-tor.service
# owner: root # owner: root
# group: root # group: root
user::rwx user::rw-
group::r-x group::r--
other::r-x other::r--
# file: usr/lib/whonix/messages.yaml # file: usr/lib/whonix/messages.yaml
# owner: root # owner: root

View File

@ -4,11 +4,9 @@ After=qubes-whonix-network.service
Before=network.target Before=network.target
[Service] [Service]
Type=oneshot ExecStart=/usr/lib/whonix/init/qubes-whonix-firewall.sh
RemainAfterExit=yes
ExecStartPre=/usr/lib/whonix/init/init.sh
ExecStart=/usr/lib/whonix/init/qubes-firewall-user-script
StandardOutput=syslog StandardOutput=syslog
[Install] [Install]
WantedBy=multi-user.target WantedBy=multi-user.target
Alias=qubes-firewall.service

View File

@ -0,0 +1,13 @@
[Unit]
Description=Qubes Whonix initialization script
After=qubes-whonix-network.service
Before=qubes-whonix-firewall.service
[Service]
Type=oneshot
RemainAfterExit=yes
ExecStart=/usr/lib/whonix/init/init.sh
StandardOutput=syslog
[Install]
WantedBy=multi-user.target

View File

@ -2,7 +2,7 @@
Description=Qubes Whonix network proxy setup Description=Qubes Whonix network proxy setup
ConditionPathExists=/var/run/qubes-service/qubes-network ConditionPathExists=/var/run/qubes-service/qubes-network
Before=network.target Before=network.target
After=qubes-firewall.service After=iptables.service
[Service] [Service]
Type=oneshot Type=oneshot
@ -12,3 +12,4 @@ StandardOutput=syslog
[Install] [Install]
WantedBy=multi-user.target WantedBy=multi-user.target
Alias=qubes-network.service

View File

@ -53,9 +53,6 @@ if [ "${WHONIX}" == "gateway" ]; then
# we can use to identify that its a tor proxy so updates are secure # we can use to identify that its a tor proxy so updates are secure
error_file="/usr/share/tinyproxy/default.html" error_file="/usr/share/tinyproxy/default.html"
grep -q "${PROXY_META}" "${error_file}" || { grep -q "${PROXY_META}" "${error_file}" || {
sudo sed -i "s/<\/head>/${PROXY_META}\n<\/head>/" "${error_file}" sed -i "s/<\/head>/${PROXY_META}\n<\/head>/" "${error_file}"
} }
fi fi
# Copy firewall script so Qubes will reload it when it reloads
cp -pf /usr/lib/whonix/init/qubes-firewall-user-script /rw/config/qubes-firewall-user-script

View File

@ -0,0 +1,16 @@
[Unit]
Description = Anonymizing overlay network for TCP
After = syslog.target network.target nss-lookup.target
[Service]
Type = simple
ExecStart = /usr/bin/tor --runasdaemon 0 --defaults-torrc /usr/share/tor/tor-service-defaults-torrc -f /etc/tor/torrc --quiet
ExecReload = /bin/kill -HUP ${MAINPID}
ExecStop = /bin/kill -INT ${MAINPID}
TimeoutSec = 60
Restart = on-failure
LimitNOFILE = 32768
[Install]
WantedBy = multi-user.target
Alias=tor.service

View File

@ -40,6 +40,13 @@ user::rw-
group::r-- group::r--
other::r-- other::r--
# file: lib/systemd/system/qubes-whonix-init.service
# owner: root
# group: root
user::rw-
group::r--
other::r--
# file: etc # file: etc
# owner: root # owner: root
# group: root # group: root
@ -145,14 +152,14 @@ user::rwx
group::r-x group::r-x
other::r-x other::r-x
# file: usr/lib/whonix/whonix.sh # file: usr/lib/whonix/init
# owner: root # owner: root
# group: root # group: root
user::rwx user::rwx
group::r-x group::r-x
other::r-x other::r-x
# file: usr/lib/whonix/init # file: usr/lib/whonix/init/qubes-whonix-firewall.sh
# owner: root # owner: root
# group: root # group: root
user::rwx user::rwx
@ -180,13 +187,6 @@ user::rwx
group::r-x group::r-x
other::r-x other::r-x
# file: usr/lib/whonix/init/qubes-firewall-user-script
# owner: root
# group: root
user::rwx
group::r-x
other::r-x
# file: usr/lib/whonix/messages.yaml # file: usr/lib/whonix/messages.yaml
# owner: root # owner: root
# group: root # group: root

View File

@ -4,11 +4,9 @@ After=qubes-whonix-network.service
Before=network.target Before=network.target
[Service] [Service]
Type=oneshot ExecStart=/usr/lib/whonix/init/qubes-whonix-firewall.sh
RemainAfterExit=yes
ExecStartPre=/usr/lib/whonix/init/init.sh
ExecStart=/usr/lib/whonix/init/qubes-firewall-user-script
StandardOutput=syslog StandardOutput=syslog
[Install] [Install]
WantedBy=multi-user.target WantedBy=multi-user.target
Alias=qubes-firewall.service

View File

@ -0,0 +1,13 @@
[Unit]
Description=Qubes Whonix initialization script
After=qubes-whonix-network.service
Before=qubes-whonix-firewall.service
[Service]
Type=oneshot
RemainAfterExit=yes
ExecStart=/usr/lib/whonix/init/init.sh
StandardOutput=syslog
[Install]
WantedBy=multi-user.target

View File

@ -2,7 +2,7 @@
Description=Qubes Whonix network proxy setup Description=Qubes Whonix network proxy setup
ConditionPathExists=/var/run/qubes-service/qubes-network ConditionPathExists=/var/run/qubes-service/qubes-network
Before=network.target Before=network.target
After=qubes-firewall.service After=iptables.service
[Service] [Service]
Type=oneshot Type=oneshot
@ -12,3 +12,4 @@ StandardOutput=syslog
[Install] [Install]
WantedBy=multi-user.target WantedBy=multi-user.target
Alias=qubes-network.service

View File

@ -2,12 +2,6 @@
. /usr/lib/whonix/utility_functions . /usr/lib/whonix/utility_functions
# Or just enable them :)
#ln -s '/lib/systemd/system/qubes-whonix-network.service' '/etc/systemd/system/multi-user.target.wants/qubes-whonix-network.service'
#ln -s '/lib/systemd/system/qubes-whonix-firewall.service' '/etc/systemd/system/multi-user.target.wants/qubes-whonix-firewall.service'
#ln -s '/lib/systemd/system/qubes-whonix-init.service' '/etc/systemd/system/multi-user.target.wants/qubes-whonix-init.service'
INTERFACE="eth1" INTERFACE="eth1"
if [ "${WHONIX}" == "gateway" ]; then if [ "${WHONIX}" == "gateway" ]; then
@ -59,9 +53,6 @@ if [ "${WHONIX}" == "gateway" ]; then
# we can use to identify that its a tor proxy so updates are secure # we can use to identify that its a tor proxy so updates are secure
error_file="/usr/share/tinyproxy/default.html" error_file="/usr/share/tinyproxy/default.html"
grep -q "${PROXY_META}" "${error_file}" || { grep -q "${PROXY_META}" "${error_file}" || {
sudo sed -i "s/<\/head>/${PROXY_META}\n<\/head>/" "${error_file}" sed -i "s/<\/head>/${PROXY_META}\n<\/head>/" "${error_file}"
} }
fi fi
# Copy firewall script so Qubes will reload it when it reloads
cp -pf /usr/lib/whonix/init/qubes-firewall-user-script /rw/config/qubes-firewall-user-script

View File

@ -22,8 +22,13 @@ fi
# ------------------------------------------------------------------------------ # ------------------------------------------------------------------------------
# Enable Qubes-Whonix services # Enable Qubes-Whonix services
# ------------------------------------------------------------------------------ # ------------------------------------------------------------------------------
chroot "${INSTALLDIR}" systemctl disable qubes-whonix-network.service || :
chroot "${INSTALLDIR}" systemctl enable qubes-whonix-network.service || : chroot "${INSTALLDIR}" systemctl enable qubes-whonix-network.service || :
chroot "${INSTALLDIR}" systemctl enable qubes-whonix-firewall || :
chroot "${INSTALLDIR}" systemctl disable qubes-whonix-firewall.service || :
chroot "${INSTALLDIR}" systemctl enable qubes-whonix-firewall.service || :
chroot "${INSTALLDIR}" systemctl enable qubes-whonix-init.service || :
# ------------------------------------------------------------------------------ # ------------------------------------------------------------------------------
# Restore Whonix apt-get # Restore Whonix apt-get