{{Header}} __FORCETOC__ {{#seo: |description={{project_name_gateway_long}} Detailed Design Documentation }} {{intro| {{project_name_gateway_short}} Detailed Design Documentation }} = {{project_name_gateway_short}} = {{project_name_gateway_short}} MUST NOT be ever used for anything other than running Tor on it. If this machine is compromised the identity (public IP), all destinations and all clear-text (and onion service) communication over Tor is available to the attacker. Our first goal in securing the {{project_name_gateway_short}} is minimizing its attack surface. By installing a "minimal system", the only attack surface to an remote attack is Tor itself, apt, [[Dev/onion-grater|onion-grater]] and [[sdwdate]]. You can verify this with netstat. Security features that do not prevent exploitation but only restrict what exploits can do, such as chrooting or sandboxing, do not make much sense: A compromise of Tor already results in a compromise of everything the user cares about. Compile time hardening (see [https://gitlab.torproject.org/legacy/trac/-/issues/5024 Bug #5024: compile time hardening of TBB (RELRO, canary, PIE)]) should be done by the Tor package contributor and is beyond the scope of {{project_name_long}}. Debian is a good compromise of security and usability. More secure and hardened Linux or BSD based options do exist but they require too much work and/or maintenance to be considered for {{project_name_short}}. The [[Dev/Operating System]] design page elaborates on that topic. Having said this, you are welcome to use your own distro. The {{project_name_short}} design is distro agnostic. You just won't be able to thoughtlessly copy and paste commands or to use the source without modifications. = Graphical {{project_name_gateway_short}} benefits over Headless {{project_name_gateway_short}} = In the [[VirtualBox|non-graphical version of {{project_name_gateway_short}}]], it is difficult for users who have never used Linux before to complete tasks like upgrading or configuring obfuscated bridges. Many activities are simpler and easily accessible in a [[VirtualBox|graphical {{project_name_gateway_short}}]], such as:
--flavor whonix-gateway-cli
.
Equivalent for {{project_name_gateway_short}} --flavor whonix-workstation-cli
also exists.
= Footnotes =
{{reflist|close=1}}
{{Footer}}
[[Category:Design]]