User
→ Tunnel-link
[users IP address is linked] → Tor
→ Internet
)
* Tunnel-chain 2: (User
→ Tor
→ Tunnel-link
[anonymous activities linked] → Internet
)
The previous example also holds true if the tunnel-link is first used with tunnel-chain 2 and then reused in tunnel-chain 1. If this were done, all anonymous activities conducted with tunnel-chain 2 would then be link with the users ISP assigned IP address.
}}
----
=== {{q_project_name_long}} Templates ===
{{mbox
| image = [[File:Ambox_warning_pn.svg.png|40px|alt=Warning]]
| text = [[Qubes|{{q_project_name_short}}]] users note:\{\{project_name_gateway_template\}\}
Template "is more like a workstation". It is behind {{project_name_gateway_vm}}
. It is not {{project_name_gateway_vm}}
itself.openvpn
inside {{project_name_gateway_short}} (commonly called {{project_name_gateway_vm}}
) or {{project_name_workstation_short}} (commonly called {{project_name_workstation_vm}}
) while following {{project_name_short}} documentation, openvpn
will not start inside the \{\{project_name_gateway_template\}\}
or {{project_name_workstation_template}}
Template.)
This is because file [https://github.com/{{project_name_short}}/usability-misc/blob/master/usr/lib/systemd/system/openvpn%40openvpn.service.d/50_unpriv.conf /lib/systemd/system/openvpn@openvpn.service.d/50_unpriv.conf] checks the following condition
ConditionPathExists=!/var/run/qubes-service/whonix-templateWhich means, if file
/var/run/qubes-service/whonix-template
exists, which is the case in {{project_name_short}} templateVMs, the {{Code2|openvpn@openvpn}} service will not be started.
none
by Qubes default]. (They are upgraded through the qrexec based updates proxy that will be running on {{project_name_gateway_vm}}
.)
}}