{{Header}} {{title|title= {{project_name_long}} Tor Integration }} {{#seo: |description=Using {{project_name_short}} without Tor. Can Kicksecure be used without Tor? }} {{intro| Using {{project_name_short}} without Tor. Can Kicksecure be used without Tor? }} = Introduction = Documentation on how to use {{project_name_short}} without Tor. {{stub}} {{AdvancedUsersOnly}} = Options = '''Choose one or multiple options.''' '''A)''' Kicksecure Repositories Review Look through the repositories provided by [https://github.com/{{project_name_short}} {{project_name_short}} on github] ([https://github.com/orgs/Kicksecure/repositories?q=&type=all&language=&sort=name sorted by name]). For example, [[security-misc]] can be installed without installing any packages that Depends: on tor. Each repository has a rudimentary readme file which explains the functionality of the software package and how to install it. '''B)''' Packages for Debian Hosts Some packages are mentioned on the [[Packages for Debian Hosts]] wiki page. '''C)''' Kicksecure Meta Packages Review Alternatively, the user could look at [https://github.com/{{project_name_short}}/kicksecure-meta-packages/blob/master/debian/control kicksecure-meta-packages debian/control] and choose meta packages which do not Depends: on tor. This isn't easy. As a package on which a meta pacakge Depends: might itself have a Depends: on tor. The user would have to review the output of APT before proceeding to install to see if it includes tor. '''D)''' Install a fake Tor package 1. fake tor already being installed * https://askubuntu.com/questions/18192/how-to-fake-a-package-version-installed * https://wiki.debian.org/Packaging/HackingDependencies 2. Configure APT to update without Tor 3. [[#Update without Tor|Update without Tor]] '''E)''' Mask the Tor service. The user could attempt to prevent Tor from starting before installing Kicksecure. [[Untested]]! 1. {{CodeSelect|code= sudo systemctl mask tor }} 2. {{CodeSelect|code= sudo systemctl mask tor@default }} 3. [[#Update without Tor|Update without Tor]] = Update without Tor = '''1.''' Information. Just read this. Nothing to do yet in this step. The tor+ prefix would need to be removed from any APT sources files: * '''1)''' The {{CodeSelect|inline=true|code= /etc/apt/sources.list }} file; and * '''2)''' Any file inside the {{CodeSelect|inline=true|code= /etc/apt/sources.list.d }} folder. By {{project_name_short}} default, this would involve modification of {{CodeSelect|inline=true|code= /etc/apt/sources.list.d/derivative.list }}, which can be done using the repository-dist tool and {{CodeSelect|inline=true|code= /etc/apt/sources.list.d/debian.list }}, which is documented below. '''2.''' /etc/apt/sources.list.d/derivative.list {{CodeSelect|code= sudo repository-dist --enable --repository stable --transport plain-tls }} See [[Project-APT-Repository]] for other options (such as testers repository, etc.). '''3.''' /etc/apt/sources.list.d/debian.list The tor+ prefix would need to be removed. {{CodeSelect|code= sudo str_replace "tor+" "" /etc/apt/sources.list.d/debian.list }} '''4.''' Any other APT sources files. Only in case the user had previously opt-in to add additional repositories. '''5.''' Done. The process of disabling torified APT updates has been completed. = Qubes specific = == Using cacher over clearnet == {{stub}} Since [https://www.kicksecure.com/?#explain-protectedupdates Kicksecure updates are torified by default /security feature)], this is not compatible with Qubes' cacher by default without additional configuration. To set up Qubes cacher. '''1.''' Disable torified updates. The user would need to apply the instructions [[Tor#Update_without_Tor||Update without Tor]] in {{project_name_short}} Template. '''2.''' Configure Qubes cacher normally. [[Unspecific]] to {{project_name_short}}. [[Self Support First Policy]] applies. '''3.''' Done. The process of configuring clearnet cacher updates has been completed. == Using cacher over Tor == {{stub}} '''1.''' Configure Qubes cacher normally. [[Unspecific]] to {{project_name_short}}. [[Self Support First Policy]] applies. '''2.''' Torify cacher. cacher would need to be configured to use NetVM that supports torification such as for example [[Whonix]]'s sys-whonix. This is also unspecific to {{project_name_short}}. '''3.''' Configure the {{project_name_short}} Template to use cacher as Qubes UpdatesProxy. Specific to Qubes, not {{project_name_short}}. '''4.''' Disable torified updates. The user would need to apply the instructions [[Tor#Update_without_Tor|Update without Tor]] in {{project_name_short}} Template. This is because torification would be up to cacher and its NetVM. The tor+ syntax that {{project_name_long}} is using is not easily compatible with apt-cacher-ng. * https://github.com/derivative-maker/derivative-maker/blob/master/build_sources/debian_stable_current_clearnet.list * https://github.com/derivative-maker/derivative-maker/blob/master/build_sources/debian_testing_current_onion.list '''5.''' Done. The process of configuring torified cacher updates has been completed. = Future = This is mostly [[undocumented]]. No development progress should be expected as this is not the project focus. At very least not until a stable release of the {{project_name_short}} [[ISO]] becomes available. = References = {{reflist|close=1}} {{Footer}} [[Category:Documentation]]