user guides: uniform structure of all cli_wallet_daemon_isolation_qubes_whonix.md

This commit is contained in:
erciccione 2021-01-09 15:26:43 +00:00
parent d27c1eee9f
commit 0095a170ed
No known key found for this signature in database
GPG key ID: 762AF8C608E56CDF
12 changed files with 18 additions and 220 deletions

View file

@ -1,7 +1,5 @@
{% include disclaimer.html translated="yes" translationOutdated="yes" %} {% include disclaimer.html translated="yes" translationOutdated="yes" %}
# عزل واجهه سطر الأوامر/الخادم في نظام Qubes + Whonix
مع نظام [Qubes](https://qubes-os.org) + [Whonix](https://whonix.org) يُمكنك إنشاء محفظه مونيرو بدون إتصال بالإنترنت تعمل علي نظام إفتراضي معزول عن خادم مونيرو الذي يَمر كل بياناته من خلال شبكه التور [Tor](https://torproject.org). مع نظام [Qubes](https://qubes-os.org) + [Whonix](https://whonix.org) يُمكنك إنشاء محفظه مونيرو بدون إتصال بالإنترنت تعمل علي نظام إفتراضي معزول عن خادم مونيرو الذي يَمر كل بياناته من خلال شبكه التور [Tor](https://torproject.org).
يُوفر نظام كيوبس السلاسه اللازمه لسهوله إنشاء أنظمه إفتراضيه لأهداف مختلفه. في البدايه ستقوم بإنشاء مكنه إفتراضيه علي وونكس للمحفظه بدون إتصال. بعد ذلك مكنه ووُنكس أُخري لخادم مونيرو . للتواصل بين المحفظه والخادم يُمكنك إستخدام كيوبس [qrexec](https://www.qubes-os.org/doc/qrexec3/). يُوفر نظام كيوبس السلاسه اللازمه لسهوله إنشاء أنظمه إفتراضيه لأهداف مختلفه. في البدايه ستقوم بإنشاء مكنه إفتراضيه علي وونكس للمحفظه بدون إتصال. بعد ذلك مكنه ووُنكس أُخري لخادم مونيرو . للتواصل بين المحفظه والخادم يُمكنك إستخدام كيوبس [qrexec](https://www.qubes-os.org/doc/qrexec3/).
@ -15,28 +13,10 @@
-أول مكنه سيتم إستخدامها للمحفظه, سيُشار إليها بـ`monero-wallet-ws`. قم بإختيار`none` في `NetVM`. -أول مكنه سيتم إستخدامها للمحفظه, سيُشار إليها بـ`monero-wallet-ws`. قم بإختيار`none` في `NetVM`.
- المكنه الأخري سوف تُستخدم للخادم, سيُشار إليها بـ`monerod-ws`. سيتم إختيار `sys-whonix` ل `NetVM`. - المكنه الأخري سوف تُستخدم للخادم, سيُشار إليها بـ`monerod-ws`. سيتم إختيار `sys-whonix` ل `NetVM`. Before moving on, make sure this workstation has enough private storage. You can estimate how much space you need by checking the size of the [raw blockchain]({{ site.baseurl }}/downloads/#blockchain). Keep in mind that the blockchain will take up more space with time.
## 2. في مكنه تطبيق `monerod-ws`: ## 2. في مكنه تطبيق `monerod-ws`:
+ تنزيل وتطبيق وتسطيب برنامج مونيرو.
```
user@host:~$ curl -O "https://downloads.getmonero.org/cli/monero-linux-x64-v0.11.1.0.tar.bz2" -O "{{ site.baseurl }}/downloads/hashes.txt"
user@host:~$ gpg --recv-keys BDA6BD7042B721C467A9759D7455C5E3C0CDCEB9
user@host:~$ gpg --verify hashes.txt
gpg: Signature made Wed 01 Nov 2017 10:01:41 AM UTC
gpg: using RSA key 0x55432DF31CCD4FCD
gpg: Good signature from "Riccardo Spagni <ric@spagni.net>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
Subkey fingerprint: 94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD
user@host:~$ echo '6581506f8a030d8d50b38744ba7144f2765c9028d18d990beb316e13655ab248 monero-linux-x64-v0.11.1.0.tar.bz2' | shasum -c
monero-linux-x64-v0.11.1.0.tar.bz2: OK
user@host:~$ tar xf monero-linux-x64-v0.11.1.0.tar.bz2
user@host:~$ sudo cp monero-v0.11.1.0/monerod /usr/local/bin/
```
+ إنشاء ملف `systemd`. + إنشاء ملف `systemd`.
``` ```
@ -68,12 +48,6 @@ PrivateTmp=true
WantedBy=multi-user.target WantedBy=multi-user.target
``` ```
+ إنسخ `monero-wallet-cli` إلي `monero-wallet-ws` VM.
```
user@host:~$ qvm-copy-to-vm monero-wallet-ws monero-v0.11.1.0/monero-wallet-cli
```
+ إجعل `monerod` الخادم يبدأ فور التشغيل تلقائياً بتعديل ملف `/rw/config/rc.local`. + إجعل `monerod` الخادم يبدأ فور التشغيل تلقائياً بتعديل ملف `/rw/config/rc.local`.
``` ```
@ -110,12 +84,6 @@ socat STDIO TCP:localhost:18081
## 3. في مكنه تطبيق `monero-wallet-ws`: ## 3. في مكنه تطبيق `monero-wallet-ws`:
+ حَرِك ملف `monero-wallet-cli` قابل للتشغيل .
```
user@host:~$ sudo mv QubesIncoming/monerod-ws/monero-wallet-cli /usr/local/bin/
```
+ عَدِل ملف `/rw/config/rc.local`. + عَدِل ملف `/rw/config/rc.local`.
``` ```

View file

@ -1,7 +1,5 @@
{% include disclaimer.html translated="yes" translationOutdated="no" %} {% include disclaimer.html translated="yes" translationOutdated="no" %}
# CLI-Wallet-/Hintergrunddienstisolierung mit Qubes + Whonix
Mit [Qubes](https://qubes-os.org) + [Whonix](https://whonix.org) ist es möglich, ein nicht vernetztes Wallet in einem System zu betreiben, welches quasi vom Hintergrunddienst isoliert ist und seinen Datenverkehr über [Tor](https://torproject.org/de/) laufen lässt. Mit [Qubes](https://qubes-os.org) + [Whonix](https://whonix.org) ist es möglich, ein nicht vernetztes Wallet in einem System zu betreiben, welches quasi vom Hintergrunddienst isoliert ist und seinen Datenverkehr über [Tor](https://torproject.org/de/) laufen lässt.
Qubes ermöglicht es, flexibel und einfach separate VMs für unterschiedliche Zwecke zu erstellen. Zunächst erstellst du eine Whonix-Workstation für das nicht vernetzte Wallet. Als Nächstes eine weitere Whonix-Workstation für den Hintergrunddienst, der dein Whonix-Gateway als seine NetVM nutzt. Zur Kommunikation zwischen Wallet und Hintergrunddienst kannst du Qubes' [Qrexec](https://www.qubes-os.org/doc/qrexec3/) nutzen. Qubes ermöglicht es, flexibel und einfach separate VMs für unterschiedliche Zwecke zu erstellen. Zunächst erstellst du eine Whonix-Workstation für das nicht vernetzte Wallet. Als Nächstes eine weitere Whonix-Workstation für den Hintergrunddienst, der dein Whonix-Gateway als seine NetVM nutzt. Zur Kommunikation zwischen Wallet und Hintergrunddienst kannst du Qubes' [Qrexec](https://www.qubes-os.org/doc/qrexec3/) nutzen.
@ -18,24 +16,6 @@ Dies ist sicherer als andere Methoden, die etwa den RPC des Wallets durch einen
## 2. In der AppVM `monerod-ws`: ## 2. In der AppVM `monerod-ws`:
+ Monero-Software herunterladen, verifizieren und installieren.
```
user@host:~$ curl -O "https://downloads.getmonero.org/cli/monero-linux-x64-v0.11.1.0.tar.bz2" -O "{{ site.baseurl }}/downloads/hashes.txt"
user@host:~$ gpg --recv-keys BDA6BD7042B721C467A9759D7455C5E3C0CDCEB9
user@host:~$ gpg --verify hashes.txt
gpg: Signature made Wed 01 Nov 2017 10:01:41 AM UTC
gpg: using RSA key 0x55432DF31CCD4FCD
gpg: Good signature from "Riccardo Spagni <ric@spagni.net>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
Subkey fingerprint: 94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD
user@host:~$ echo '6581506f8a030d8d50b38744ba7144f2765c9028d18d990beb316e13655ab248 monero-linux-x64-v0.11.1.0.tar.bz2' | shasum -c
monero-linux-x64-v0.11.1.0.tar.bz2: OK
user@host:~$ tar xf monero-linux-x64-v0.11.1.0.tar.bz2
user@host:~$ sudo cp monero-v0.11.1.0/monerod /usr/local/bin/
```
+ Erstelle eine `systemd`-Datei. + Erstelle eine `systemd`-Datei.
``` ```
@ -67,12 +47,6 @@ PrivateTmp=true
WantedBy=multi-user.target WantedBy=multi-user.target
``` ```
+ Kopiere die `monero-wallet-cli`-Programmdatei in die `monero-wallet-ws`-VM.
```
user@host:~$ qvm-copy-to-vm monero-wallet-ws monero-v0.11.1.0/monero-wallet-cli
```
+ Stelle durch Abändern der Datei `/rw/config/rc.local` ein, dass der `monerod`-Hintergrunddienst bei Systemstart ausgeführt wird. + Stelle durch Abändern der Datei `/rw/config/rc.local` ein, dass der `monerod`-Hintergrunddienst bei Systemstart ausgeführt wird.
``` ```
@ -109,12 +83,6 @@ socat STDIO TCP:localhost:18081
## 3. In der AppVM `monero-wallet-ws`: ## 3. In der AppVM `monero-wallet-ws`:
+ Verschiebe die `monero-wallet-cli`-Programmdatei.
```
user@host:~$ sudo mv QubesIncoming/monerod-ws/monero-wallet-cli /usr/local/bin/
```
+ Bearbeite die Datei `/rw/config/rc.local`. + Bearbeite die Datei `/rw/config/rc.local`.
``` ```

View file

@ -1,7 +1,5 @@
{% include disclaimer.html translated="yes" translationOutdated="yes" %} {% include disclaimer.html translated="yes" translationOutdated="yes" %}
# Aislamiento de Monedero CLI/Daemon con Qubes + Whonix
Con [Qubes](https://qubes-os.org) más [Whonix](https://whonix.org) puedes tener un monedero de Monero sin conexión a la red y en ejecución en un sistema virtualmente aislado del daemon de Monero que tiene todo su tráfico sobre [Tor](https://torproject.org). Con [Qubes](https://qubes-os.org) más [Whonix](https://whonix.org) puedes tener un monedero de Monero sin conexión a la red y en ejecución en un sistema virtualmente aislado del daemon de Monero que tiene todo su tráfico sobre [Tor](https://torproject.org).
Qubes brinda la flexibilidad de crear VMs separadas fácilmente para diferentes propósitos. Primero crearás una estación de trabajo Whonix para el monedero sin conexión a la red. Después, otra estación de trabajo Whonix para el daemon que usará la puerta Whonix como su NetVM. Para comunicación entre el monedero y el daemon puedes usar Qubes [qrexec](https://www.qubes-os.org/doc/qrexec3/). Qubes brinda la flexibilidad de crear VMs separadas fácilmente para diferentes propósitos. Primero crearás una estación de trabajo Whonix para el monedero sin conexión a la red. Después, otra estación de trabajo Whonix para el daemon que usará la puerta Whonix como su NetVM. Para comunicación entre el monedero y el daemon puedes usar Qubes [qrexec](https://www.qubes-os.org/doc/qrexec3/).
@ -15,32 +13,14 @@ Esto es más seguro que otros enfoques que trazan el rpc del monedero a un servi
- La primera estación de trabajo se usará para tu monedero, se referirá a ella como `monero-wallet-ws`. Tendrás `NetVM` ajustado como `none`. - La primera estación de trabajo se usará para tu monedero, se referirá a ella como `monero-wallet-ws`. Tendrás `NetVM` ajustado como `none`.
- La segunda estación de trabajo será para el daemon `monerod`, se referirá a ella como `monerod-ws`. Tendrás `NetVM` ajustado como la puerta Whonix `sys-whonix`. - La segunda estación de trabajo será para el daemon `monerod`, se referirá a ella como `monerod-ws`. Tendrás `NetVM` ajustado como la puerta Whonix `sys-whonix`. Before moving on, make sure this workstation has enough private storage. You can estimate how much space you need by checking the size of the [raw blockchain]({{ site.baseurl }}/downloads/#blockchain). Keep in mind that the blockchain will take up more space with time.
## 2. En la AppVM `monerod-ws`: ## 2. En la AppVM `monerod-ws`:
+ Descarga, verifica e instala el software de Monero.
```
user@host:~$ curl -O "https://downloads.getmonero.org/cli/monero-linux-x64-v0.11.1.0.tar.bz2" -O "{{ site.baseurl }}/downloads/hashes.txt"
user@host:~$ gpg --recv-keys BDA6BD7042B721C467A9759D7455C5E3C0CDCEB9
user@host:~$ gpg --verify hashes.txt
gpg: Signature made Wed 01 Nov 2017 10:01:41 AM UTC
gpg: using RSA key 0x55432DF31CCD4FCD
gpg: Good signature from "Riccardo Spagni <ric@spagni.net>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
Subkey fingerprint: 94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD
user@host:~$ echo '6581506f8a030d8d50b38744ba7144f2765c9028d18d990beb316e13655ab248 monero-linux-x64-v0.11.1.0.tar.bz2' | shasum -c
monero-linux-x64-v0.11.1.0.tar.bz2: OK
user@host:~$ tar xf monero-linux-x64-v0.11.1.0.tar.bz2
user@host:~$ sudo cp monero-v0.11.1.0/monerod /usr/local/bin/
```
+ Crea un archivo `systemd`. + Crea un archivo `systemd`.
``` ```
user@host:~$ sudo gedit /home/user/monerod.service user@host:~$ sudo nano /home/user/monerod.service
``` ```
Pega el siguiente contenido: Pega el siguiente contenido:
@ -68,16 +48,10 @@ PrivateTmp=true
WantedBy=multi-user.target WantedBy=multi-user.target
``` ```
+ Copia el ejecutable `monero-wallet-cli` al VM `monero-wallet-ws`.
```
user@host:~$ qvm-copy-to-vm monero-wallet-ws monero-v0.11.1.0/monero-wallet-cli
```
+ Hacer ejecutable a `monerod` en arranque editando el archivo `/rw/config/rc.local`. + Hacer ejecutable a `monerod` en arranque editando el archivo `/rw/config/rc.local`.
``` ```
user@host:~$ sudo gedit /rw/config/rc.local user@host:~$ sudo nano /rw/config/rc.local
``` ```
Agrega estas líneas al final: Agrega estas líneas al final:
@ -97,7 +71,7 @@ user@host:~$ sudo chmod +x /rw/config/rc.local
``` ```
user@host:~$ sudo mkdir /rw/usrlocal/etc/qubes-rpc user@host:~$ sudo mkdir /rw/usrlocal/etc/qubes-rpc
user@host:~$ sudo gedit /rw/usrlocal/etc/qubes-rpc/user.monerod user@host:~$ sudo nano /rw/usrlocal/etc/qubes-rpc/user.monerod
``` ```
Agrega esta línea: Agrega esta línea:
@ -110,16 +84,10 @@ socat STDIO TCP:localhost:18081
## 3. En la AppVM `monero-wallet-ws`: ## 3. En la AppVM `monero-wallet-ws`:
+ Mueve el ejecutable `monero-wallet-cli`.
```
user@host:~$ sudo mv QubesIncoming/monerod-ws/monero-wallet-cli /usr/local/bin/
```
+ Edita el archivo `/rw/config/rc.local`. + Edita el archivo `/rw/config/rc.local`.
``` ```
user@host:~$ sudo gedit /rw/config/rc.local user@host:~$ sudo nano /rw/config/rc.local
``` ```
Agrega la siguiente línea al final: Agrega la siguiente línea al final:

View file

@ -1,7 +1,5 @@
{% include disclaimer.html translated="yes" translationOutdated="yes" %} {% include disclaimer.html translated="yes" translationOutdated="yes" %}
# Isolation du Portefeuille CLI et du Démon avec Qubes et Whonix
Avec [Qubes](https://qubes-os.org) et [Whonix](https://whonix.org) vous pouvez disposer d'un portefeuille Monero hors connexion fonctionnant sur un système virtuel isolé du démon Monero dont tout le trafic est forcé à passer à travers [Tor](https://torproject.org). Avec [Qubes](https://qubes-os.org) et [Whonix](https://whonix.org) vous pouvez disposer d'un portefeuille Monero hors connexion fonctionnant sur un système virtuel isolé du démon Monero dont tout le trafic est forcé à passer à travers [Tor](https://torproject.org).
Qubes permet de créer facilement des machines virtuelles pour différents besoins. Tout d'abord, vous crérez une station de travail Whonix sans réseau pour le portefeuille. Ensuite, une seconde station de travail Whonix pour le démon qui utilisera votre passerelle Whonix comme réseau de machine virtuelle. La communication dentre le portefeuille et le démon pourra être réalisée en utilisant Qubes [qrexec](https://www.qubes-os.org/doc/qrexec3/). Qubes permet de créer facilement des machines virtuelles pour différents besoins. Tout d'abord, vous crérez une station de travail Whonix sans réseau pour le portefeuille. Ensuite, une seconde station de travail Whonix pour le démon qui utilisera votre passerelle Whonix comme réseau de machine virtuelle. La communication dentre le portefeuille et le démon pourra être réalisée en utilisant Qubes [qrexec](https://www.qubes-os.org/doc/qrexec3/).
@ -15,32 +13,14 @@ Il s'agit d'une approche plus sûre que d'autres solutions routant les appels de
- La première station de travail sera utilisé pour le portefeuille, on s'y réfèrera en tant que `monero-wallet-ws`. Vous aurez `NetVM` définit à `none`. - La première station de travail sera utilisé pour le portefeuille, on s'y réfèrera en tant que `monero-wallet-ws`. Vous aurez `NetVM` définit à `none`.
- La seconde station de travail sera pour le démon `monerod`, on s'y réfèrera en tant que `monerod-ws`. Vous aurez `NetVM` définit sur la passerelle Whonix `sys-whonix`. - La seconde station de travail sera pour le démon `monerod`, on s'y réfèrera en tant que `monerod-ws`. Vous aurez `NetVM` définit sur la passerelle Whonix `sys-whonix`. Before moving on, make sure this workstation has enough private storage. You can estimate how much space you need by checking the size of the [raw blockchain]({{ site.baseurl }}/downloads/#blockchain). Keep in mind that the blockchain will take up more space with time.
## 2. Dans la machine virtuelle applicative `monerod-ws`: ## 2. Dans la machine virtuelle applicative `monerod-ws`:
+ Télécharger, vérifier et installer l'application Monero.
```
user@host:~$ curl -O "https://downloads.getmonero.org/cli/monero-linux-x64-v0.11.1.0.tar.bz2" -O "{{ site.baseurl }}/downloads/hashes.txt"
user@host:~$ gpg --recv-keys BDA6BD7042B721C467A9759D7455C5E3C0CDCEB9
user@host:~$ gpg --verify hashes.txt
gpg: Signature made Wed 01 Nov 2017 10:01:41 AM UTC
gpg: using RSA key 0x55432DF31CCD4FCD
gpg: Good signature from "Riccardo Spagni <ric@spagni.net>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
Subkey fingerprint: 94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD
user@host:~$ echo '6581506f8a030d8d50b38744ba7144f2765c9028d18d990beb316e13655ab248 monero-linux-x64-v0.11.1.0.tar.bz2' | shasum -c
monero-linux-x64-v0.11.1.0.tar.bz2: OK
user@host:~$ tar xf monero-linux-x64-v0.11.1.0.tar.bz2
user@host:~$ sudo cp monero-v0.11.1.0/monerod /usr/local/bin/
```
+ Créez un fichier `systemd`. + Créez un fichier `systemd`.
``` ```
user@host:~$ sudo gedit /home/user/monerod.service user@host:~$ sudo nano /home/user/monerod.service
``` ```
Collez-y le contenu suivant : Collez-y le contenu suivant :
@ -68,16 +48,10 @@ PrivateTmp=true
WantedBy=multi-user.target WantedBy=multi-user.target
``` ```
+ Copiez l'exécutable `monero-wallet-cli` dans la VM `monero-wallet-ws`.
```
user@host:~$ qvm-copy-to-vm monero-wallet-ws monero-v0.11.1.0/monero-wallet-cli
```
+ Configurez le lancement du démon `monerod` au démarrage en éditant le fichier `/rw/config/rc.local`. + Configurez le lancement du démon `monerod` au démarrage en éditant le fichier `/rw/config/rc.local`.
``` ```
user@host:~$ sudo gedit /rw/config/rc.local user@host:~$ sudo nano /rw/config/rc.local
``` ```
Ajoutez les lignes suivantes à la fin du fichier : Ajoutez les lignes suivantes à la fin du fichier :
@ -97,7 +71,7 @@ user@host:~$ sudo chmod +x /rw/config/rc.local
``` ```
user@host:~$ sudo mkdir /rw/usrlocal/etc/qubes-rpc user@host:~$ sudo mkdir /rw/usrlocal/etc/qubes-rpc
user@host:~$ sudo gedit /rw/usrlocal/etc/qubes-rpc/user.monerod user@host:~$ sudo nano /rw/usrlocal/etc/qubes-rpc/user.monerod
``` ```
Ajoutez cette ligne : Ajoutez cette ligne :
@ -110,16 +84,10 @@ socat STDIO TCP:localhost:18081
## 3. Dans la machine virtuelle applicative `monero-wallet-ws`: ## 3. Dans la machine virtuelle applicative `monero-wallet-ws`:
+ Déplacez l'exécutable `monero-wallet-cli`.
```
user@host:~$ sudo mv QubesIncoming/monerod-ws/monero-wallet-cli /usr/local/bin/
```
+ Éditez le fichier `/rw/config/rc.local`. + Éditez le fichier `/rw/config/rc.local`.
``` ```
user@host:~$ sudo gedit /rw/config/rc.local user@host:~$ sudo nano /rw/config/rc.local
``` ```
Ajoutez-y la ligne suivante à la fin : Ajoutez-y la ligne suivante à la fin :

View file

@ -1,7 +1,5 @@
{% include disclaimer.html translated="no" translationOutdated="no" %} {% include disclaimer.html translated="no" translationOutdated="no" %}
# CLI Wallet/Daemon Isolation with Qubes + Whonix
With [Qubes](https://qubes-os.org) + [Whonix](https://whonix.org) you can have a Monero wallet that is without networking and running on a virtually isolated system from the Monero daemon which has all of its traffic forced over [Tor](https://torproject.org). With [Qubes](https://qubes-os.org) + [Whonix](https://whonix.org) you can have a Monero wallet that is without networking and running on a virtually isolated system from the Monero daemon which has all of its traffic forced over [Tor](https://torproject.org).
Qubes gives the flexibility to easily create separate VMs for different purposes. First you will create a Whonix workstation for the wallet with no networking. Next, another Whonix workstation for the @daemon which will use your Whonix gateway as it's NetVM. For communication between the wallet and daemon you can make use of Qubes [qrexec](https://www.qubes-os.org/doc/qrexec3/). Qubes gives the flexibility to easily create separate VMs for different purposes. First you will create a Whonix workstation for the wallet with no networking. Next, another Whonix workstation for the @daemon which will use your Whonix gateway as it's NetVM. For communication between the wallet and daemon you can make use of Qubes [qrexec](https://www.qubes-os.org/doc/qrexec3/).

View file

@ -1,7 +1,5 @@
{% include disclaimer.html translated="yes" translationOutdated="yes" %} {% include disclaimer.html translated="yes" translationOutdated="yes" %}
# Portemonnee isoleren van node met Qubes en Whonix
Met [Qubes](https://qubes-os.org) en [Whonix](https://whonix.org) kun je een Monero-portemonnee zonder netwerkverbinding uitvoeren op een virtueel systeem, geïsoleerd van de Monero-node, waarvan al het verkeer verplicht via [Tor](https://torproject.org) loopt. Met [Qubes](https://qubes-os.org) en [Whonix](https://whonix.org) kun je een Monero-portemonnee zonder netwerkverbinding uitvoeren op een virtueel systeem, geïsoleerd van de Monero-node, waarvan al het verkeer verplicht via [Tor](https://torproject.org) loopt.
Qubes biedt de flexibiliteit om eenvoudig afzonderlijke virtual machines voor verschillende doeleinden te maken. Eerst maak je een Whonix-werkstation voor de portemonnee, zonder netwerkverbinding. Vervolgens maak je een ander Whonix-werkstation dat je Whonix-gateway gebruikt als NetVM. Voor communicatie tussen de portemonnee en de node kun je gebruik maken van Qubes [qrexec](https://www.qubes-os.org/doc/qrexec3/). Qubes biedt de flexibiliteit om eenvoudig afzonderlijke virtual machines voor verschillende doeleinden te maken. Eerst maak je een Whonix-werkstation voor de portemonnee, zonder netwerkverbinding. Vervolgens maak je een ander Whonix-werkstation dat je Whonix-gateway gebruikt als NetVM. Voor communicatie tussen de portemonnee en de node kun je gebruik maken van Qubes [qrexec](https://www.qubes-os.org/doc/qrexec3/).
@ -15,28 +13,10 @@ Dit is veiliger dan andere benaderingen, waarbij de RPC van de portemonnee via e
- Het eerste werkstation wordt gebruikt voor je portemonnee. We noemen het `monero-wallet-ws`. Hier stel je `NetVM` in op `none`. - Het eerste werkstation wordt gebruikt voor je portemonnee. We noemen het `monero-wallet-ws`. Hier stel je `NetVM` in op `none`.
- Het tweede werkstation wordt gebruikt voor `monerod`, de daemon voor de node. We noemen het `monerod-ws`. Hier stel je `NetVM` in op de Whonix-gateway `sys-whonix`. - Het tweede werkstation wordt gebruikt voor `monerod`, de daemon voor de node. We noemen het `monerod-ws`. Hier stel je `NetVM` in op de Whonix-gateway `sys-whonix`. Before moving on, make sure this workstation has enough private storage. You can estimate how much space you need by checking the size of the [raw blockchain]({{ site.baseurl }}/downloads/#blockchain). Keep in mind that the blockchain will take up more space with time.
## 2. In de AppVM `monerod-ws`: ## 2. In de AppVM `monerod-ws`:
+ Download, verifieer en installeer de Monero-software.
```
user@host:~$ curl -O "https://downloads.getmonero.org/cli/monero-linux-x64-v0.11.1.0.tar.bz2" -O "{{ site.baseurl }}/downloads/hashes.txt"
user@host:~$ gpg --recv-keys BDA6BD7042B721C467A9759D7455C5E3C0CDCEB9
user@host:~$ gpg --verify hashes.txt
gpg: Signature made Wed 01 Nov 2017 10:01:41 AM UTC
gpg: using RSA key 0x55432DF31CCD4FCD
gpg: Good signature from "Riccardo Spagni <ric@spagni.net>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
Subkey fingerprint: 94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD
user@host:~$ echo '6581506f8a030d8d50b38744ba7144f2765c9028d18d990beb316e13655ab248 monero-linux-x64-v0.11.1.0.tar.bz2' | shasum -c
monero-linux-x64-v0.11.1.0.tar.bz2: OK
user@host:~$ tar xf monero-linux-x64-v0.11.1.0.tar.bz2
user@host:~$ sudo cp monero-v0.11.1.0/monerod /usr/local/bin/
```
+ Maak een `systemd`-bestand. + Maak een `systemd`-bestand.
``` ```
@ -68,12 +48,6 @@ PrivateTmp=true
WantedBy=multi-user.target WantedBy=multi-user.target
``` ```
+ Kopieer het uitvoerbare bestand `monero-wallet-cli` naar de VM `monero-wallet-ws`.
```
user@host:~$ qvm-copy-to-vm monero-wallet-ws monero-v0.11.1.0/monero-wallet-cli
```
+ Zorg dat de daemon `monerod` wordt uitgevoerd bij het opstarten door het bestand `/rw/config/rc.local` te bewerken. + Zorg dat de daemon `monerod` wordt uitgevoerd bij het opstarten door het bestand `/rw/config/rc.local` te bewerken.
``` ```
@ -110,12 +84,6 @@ socat STDIO TCP:localhost:18081
## 3. In de AppVM `monero-wallet-ws`: ## 3. In de AppVM `monero-wallet-ws`:
+ Verplaats het uitvoerbare bestand `monero-wallet-cli`.
```
user@host:~$ sudo mv QubesIncoming/monerod-ws/monero-wallet-cli /usr/local/bin/
```
+ Bewerk het bestand `/rw/config/rc.local`. + Bewerk het bestand `/rw/config/rc.local`.
``` ```

View file

@ -1,7 +1,5 @@
{% include disclaimer.html translated="no" translationOutdated="no" %} {% include disclaimer.html translated="no" translationOutdated="no" %}
# CLI Wallet/Daemon Isolation with Qubes + Whonix
With [Qubes](https://qubes-os.org) + [Whonix](https://whonix.org) you can have a Monero wallet that is without networking and running on a virtually isolated system from the Monero daemon which has all of its traffic forced over [Tor](https://torproject.org). With [Qubes](https://qubes-os.org) + [Whonix](https://whonix.org) you can have a Monero wallet that is without networking and running on a virtually isolated system from the Monero daemon which has all of its traffic forced over [Tor](https://torproject.org).
Qubes gives the flexibility to easily create separate VMs for different purposes. First you will create a Whonix workstation for the wallet with no networking. Next, another Whonix workstation for the @daemon which will use your Whonix gateway as it's NetVM. For communication between the wallet and daemon you can make use of Qubes [qrexec](https://www.qubes-os.org/doc/qrexec3/). Qubes gives the flexibility to easily create separate VMs for different purposes. First you will create a Whonix workstation for the wallet with no networking. Next, another Whonix workstation for the @daemon which will use your Whonix gateway as it's NetVM. For communication between the wallet and daemon you can make use of Qubes [qrexec](https://www.qubes-os.org/doc/qrexec3/).

View file

@ -1,7 +1,5 @@
{% include disclaimer.html translated="no" translationOutdated="no" %} {% include disclaimer.html translated="no" translationOutdated="no" %}
# CLI Wallet/Daemon Isolation with Qubes + Whonix
With [Qubes](https://qubes-os.org) + [Whonix](https://whonix.org) you can have a Monero wallet that is without networking and running on a virtually isolated system from the Monero daemon which has all of its traffic forced over [Tor](https://torproject.org). With [Qubes](https://qubes-os.org) + [Whonix](https://whonix.org) you can have a Monero wallet that is without networking and running on a virtually isolated system from the Monero daemon which has all of its traffic forced over [Tor](https://torproject.org).
Qubes gives the flexibility to easily create separate VMs for different purposes. First you will create a Whonix workstation for the wallet with no networking. Next, another Whonix workstation for the @daemon which will use your Whonix gateway as it's NetVM. For communication between the wallet and daemon you can make use of Qubes [qrexec](https://www.qubes-os.org/doc/qrexec3/). Qubes gives the flexibility to easily create separate VMs for different purposes. First you will create a Whonix workstation for the wallet with no networking. Next, another Whonix workstation for the @daemon which will use your Whonix gateway as it's NetVM. For communication between the wallet and daemon you can make use of Qubes [qrexec](https://www.qubes-os.org/doc/qrexec3/).

View file

@ -1,4 +1,4 @@
{% include disclaimer.html translated="yes" translationOutdated="yes" %} {% include disclaimer.html translated="yes" translationOutdated="no" %}
С помощью [Qubes](https://qubes-os.org) + [Whonix](https://whonix.org) можно создать кошелек Monero, который не будет требовать подключения к сети и работать на фактически изолированной от демона Monero системе , у которого весь сетевой трафик будет проходить через сеть [Tor](https://torproject.org). С помощью [Qubes](https://qubes-os.org) + [Whonix](https://whonix.org) можно создать кошелек Monero, который не будет требовать подключения к сети и работать на фактически изолированной от демона Monero системе , у которого весь сетевой трафик будет проходить через сеть [Tor](https://torproject.org).
@ -13,32 +13,14 @@ Qubes предоставляет гибкость, позволяющую лег
- Первая рабочая станция будет использоваться для вашего кошелька, она будет называться `monero-wallet-ws`. `NetVM` оставляем не установленным, выбирая `none`. - Первая рабочая станция будет использоваться для вашего кошелька, она будет называться `monero-wallet-ws`. `NetVM` оставляем не установленным, выбирая `none`.
- Вторая рабочая станция создается для демона `monerod`, она будет называться `monerod-ws`. `NetVM` устанавливаем для шлюза Whonix `sys-whonix`. - Вторая рабочая станция создается для демона `monerod`, она будет называться `monerod-ws`. `NetVM` устанавливаем для шлюза Whonix `sys-whonix`. Before moving on, make sure this workstation has enough private storage. You can estimate how much space you need by checking the size of the [raw blockchain]({{ site.baseurl }}/downloads/#blockchain). Keep in mind that the blockchain will take up more space with time.
## 2. В виртуальной машине AppVM `monerod-ws` делаем следующее: ## 2. В виртуальной машине AppVM `monerod-ws` делаем следующее:
+ Загружаем, проверяем и устанавливаем программное обеспечение Monero.
```
user@host:~$ curl -O "https://downloads.getmonero.org/cli/monero-linux-x64-v0.11.1.0.tar.bz2" -O "https://getmonero.org/downloads/hashes.txt"
user@host:~$ gpg --recv-keys BDA6BD7042B721C467A9759D7455C5E3C0CDCEB9
user@host:~$ gpg --verify hashes.txt
gpg: Signature made Wed 01 Nov 2017 10:01:41 AM UTC
gpg: using RSA key 0x55432DF31CCD4FCD
gpg: Good signature from "Riccardo Spagni <ric@spagni.net>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: BDA6 BD70 42B7 21C4 67A9 759D 7455 C5E3 C0CD CEB9
Subkey fingerprint: 94B7 38DD 3501 32F5 ACBE EA1D 5543 2DF3 1CCD 4FCD
user@host:~$ echo '6581506f8a030d8d50b38744ba7144f2765c9028d18d990beb316e13655ab248 monero-linux-x64-v0.11.1.0.tar.bz2' | shasum -c
monero-linux-x64-v0.11.1.0.tar.bz2: OK
user@host:~$ tar xf monero-linux-x64-v0.11.1.0.tar.bz2
user@host:~$ sudo cp monero-v0.11.1.0/monerod /usr/local/bin/
```
+ Создаем файл `systemd`. + Создаем файл `systemd`.
``` ```
user@host:~$ sudo gedit /home/user/monerod.service user@host:~$ sudo nano /home/user/monerod.service
``` ```
Вставляем в него следующее содержимое: Вставляем в него следующее содержимое:
@ -66,16 +48,10 @@ PrivateTmp=true
WantedBy=multi-user.target WantedBy=multi-user.target
``` ```
+ Копируем файл `monero-wallet-cli` на виртуальную машину `monero-wallet-ws`.
```
user@host:~$ qvm-copy-to-vm monero-wallet-ws monero-v0.11.1.0/monero-wallet-cli
```
+ Добавляем демон `monerod` в автозагрузку, отредактировав файл `/rw/config/rc.local`. + Добавляем демон `monerod` в автозагрузку, отредактировав файл `/rw/config/rc.local`.
``` ```
user@host:~$ sudo gedit /rw/config/rc.local user@host:~$ sudo nano /rw/config/rc.local
``` ```
Добавляем эти строки в конец текста: Добавляем эти строки в конец текста:
@ -95,7 +71,7 @@ user@host:~$ sudo chmod +x /rw/config/rc.local
``` ```
user@host:~$ sudo mkdir /rw/usrlocal/etc/qubes-rpc user@host:~$ sudo mkdir /rw/usrlocal/etc/qubes-rpc
user@host:~$ sudo gedit /rw/usrlocal/etc/qubes-rpc/user.monerod user@host:~$ sudo nano /rw/usrlocal/etc/qubes-rpc/user.monerod
``` ```
Добавляем строку: Добавляем строку:
@ -108,16 +84,10 @@ socat STDIO TCP:localhost:18081
## 3. В виртуальной машине AppVM `monero-wallet-ws` делаем следующее: ## 3. В виртуальной машине AppVM `monero-wallet-ws` делаем следующее:
+ Перемещаем исполняемый файл `monero-wallet-cli`.
```
user@host:~$ sudo mv QubesIncoming/monerod-ws/monero-wallet-cli /usr/local/bin/
```
+ Редактируем файл `/rw/config/rc.local`. + Редактируем файл `/rw/config/rc.local`.
``` ```
user@host:~$ sudo gedit /rw/config/rc.local user@host:~$ sudo nano /rw/config/rc.local
``` ```
Добавляем эту строку в конец документа: Добавляем эту строку в конец документа:

View file

@ -1,7 +1,5 @@
{% include disclaimer.html translated="no" translationOutdated="no" %} {% include disclaimer.html translated="no" translationOutdated="no" %}
# CLI Wallet/Daemon Isolation with Qubes + Whonix
With [Qubes](https://qubes-os.org) + [Whonix](https://whonix.org) you can have a Monero wallet that is without networking and running on a virtually isolated system from the Monero daemon which has all of its traffic forced over [Tor](https://torproject.org). With [Qubes](https://qubes-os.org) + [Whonix](https://whonix.org) you can have a Monero wallet that is without networking and running on a virtually isolated system from the Monero daemon which has all of its traffic forced over [Tor](https://torproject.org).
Qubes gives the flexibility to easily create separate VMs for different purposes. First you will create a Whonix workstation for the wallet with no networking. Next, another Whonix workstation for the @daemon which will use your Whonix gateway as it's NetVM. For communication between the wallet and daemon you can make use of Qubes [qrexec](https://www.qubes-os.org/doc/qrexec3/). Qubes gives the flexibility to easily create separate VMs for different purposes. First you will create a Whonix workstation for the wallet with no networking. Next, another Whonix workstation for the @daemon which will use your Whonix gateway as it's NetVM. For communication between the wallet and daemon you can make use of Qubes [qrexec](https://www.qubes-os.org/doc/qrexec3/).

View file

@ -1,7 +1,5 @@
{% include disclaimer.html translated="no" translationOutdated="no" %} {% include disclaimer.html translated="no" translationOutdated="no" %}
# CLI Wallet/Daemon Isolation with Qubes + Whonix
With [Qubes](https://qubes-os.org) + [Whonix](https://whonix.org) you can have a Monero wallet that is without networking and running on a virtually isolated system from the Monero daemon which has all of its traffic forced over [Tor](https://torproject.org). With [Qubes](https://qubes-os.org) + [Whonix](https://whonix.org) you can have a Monero wallet that is without networking and running on a virtually isolated system from the Monero daemon which has all of its traffic forced over [Tor](https://torproject.org).
Qubes gives the flexibility to easily create separate VMs for different purposes. First you will create a Whonix workstation for the wallet with no networking. Next, another Whonix workstation for the @daemon which will use your Whonix gateway as it's NetVM. For communication between the wallet and daemon you can make use of Qubes [qrexec](https://www.qubes-os.org/doc/qrexec3/). Qubes gives the flexibility to easily create separate VMs for different purposes. First you will create a Whonix workstation for the wallet with no networking. Next, another Whonix workstation for the @daemon which will use your Whonix gateway as it's NetVM. For communication between the wallet and daemon you can make use of Qubes [qrexec](https://www.qubes-os.org/doc/qrexec3/).

View file

@ -1,7 +1,5 @@
{% include disclaimer.html translated="no" translationOutdated="no" %} {% include disclaimer.html translated="no" translationOutdated="no" %}
# CLI Wallet/Daemon Isolation with Qubes + Whonix
With [Qubes](https://qubes-os.org) + [Whonix](https://whonix.org) you can have a Monero wallet that is without networking and running on a virtually isolated system from the Monero daemon which has all of its traffic forced over [Tor](https://torproject.org). With [Qubes](https://qubes-os.org) + [Whonix](https://whonix.org) you can have a Monero wallet that is without networking and running on a virtually isolated system from the Monero daemon which has all of its traffic forced over [Tor](https://torproject.org).
Qubes gives the flexibility to easily create separate VMs for different purposes. First you will create a Whonix workstation for the wallet with no networking. Next, another Whonix workstation for the @daemon which will use your Whonix gateway as it's NetVM. For communication between the wallet and daemon you can make use of Qubes [qrexec](https://www.qubes-os.org/doc/qrexec3/). Qubes gives the flexibility to easily create separate VMs for different purposes. First you will create a Whonix workstation for the wallet with no networking. Next, another Whonix workstation for the @daemon which will use your Whonix gateway as it's NetVM. For communication between the wallet and daemon you can make use of Qubes [qrexec](https://www.qubes-os.org/doc/qrexec3/).