Kodachi Terminal Version
Kodachi Terminal Edition
A minimal, terminal-only live ISO based on Debian 13 (Trixie) crafted for two critical missions: bulletproof testing of the full Kodachi toolchain and operating as a dedicated SOCKS proxy gateway for your network. Built for power users, hardened servers, and elegant headless deployments.
Download & Installation First Release: 26 October 2025 9.0.1 | Terminal last updated 25 October 2025 - build #1
Download ISO
- SourceForge: https://sourceforge.net/projects/linuxkodachi/files/
- File:
kodachi-terminal-9.0.1.iso(2.4GB)
ISO SHA256 Checksum:
Installation Methods
- Live USB - Boot from USB drive (no installation, portable, leaves no traces)
- Virtual Machine - Run in VMware/VirtualBox/QEMU (isolated testing environment)
- Bare Metal - Install on dedicated hardware (maximum performance as proxy server)
- Persistent Storage - Enable persistence for configuration retention across reboots
Create Bootable USB
Linux (Recommended Method)
# Find USB device
lsblk
# Write ISO to USB (replace /dev/sdX with your USB device)
sudo dd if=kodachi-terminal-9.0.1.iso of=/dev/sdX bs=4M status=progress oflag=sync
Rufus (Windows) - Link: https://rufus.ie/ - Description: Industry-standard tool for creating bootable USB drives. Select ISO file, select USB drive, write in DD mode or ISO mode.
Etcher (Windows/macOS/Linux) - Link: https://www.balena.io/etcher/ - Description: Simple, cross-platform tool for writing ISO images to USB drives. Clean interface and reliable performance.
Ventoy (Multiboot) - Link: https://www.ventoy.net - Description: Modern tool that you install on the USB drive once. You can then just drag-and-drop multiple ISO files (Windows, Linux, etc.) directly onto the drive, and it will give you a boot menu to select from.
YUMI (Your Universal Multiboot Installer) - Link: https://www.pendrivelinux.com/yumi-multiboot-usb-creator/ - Description: Popular tool for creating a multiboot USB drive. It allows you to add multiple operating systems and utilities to a single USB, one at a time.
Universal USB Installer (UUI) - Link: https://www.pendrivelinux.com/universal-usb-installer-easy-as-1-2-3/ - Description: Simple, reliable tool from the makers of YUMI, but designed to create a bootable USB for a single operating system.
macOS
# Find disk identifier
diskutil list
# Unmount disk
diskutil unmountDisk /dev/diskN
# Write ISO
sudo dd if=kodachi-terminal-9.0.1.iso of=/dev/rdiskN bs=4m
Technical Specifications Dashboard
| Component | Details |
|---|---|
| Base System | Debian 13 (Trixie) |
| Architecture | amd64 (x86_64) |
| ISO Size | 2.4GB (lightweight, no GUI bloat) |
| Total Packages | 1,181 packages (2025-10-24 build manifest) |
| Terminal Packages | 247 terminal-specific packages |
| Base Common | 43 shared base packages |
| Firmware Packages | 30+ packages (WiFi, Ethernet, Bluetooth, GPU) |
| Kodachi Binaries | 14 core security binaries pre-installed |
| Interface | Terminal-only (no GUI) |
| Boot Support | BIOS + UEFI compatible |
| Login Credentials | Username: kodachi / Password: r@@t00 |
| Sudo Access | Passwordless sudo enabled |
Pre-Installed Kodachi Binaries
All 14 core security binaries are pre-installed at /home/kodachi/dashboard/hooks/. Launch the toolkit instantly without additional setup.
Package Categories Breakdown
| Category | Count | Signature Packages |
|---|---|---|
| Hardware Firmware | 30+ | firmware-iwlwifi, firmware-realtek, firmware-atheros, broadcom-sta-dkms |
| VPN / Anonymity | 15+ | tor, openvpn, wireguard, shadowsocks-libev, v2ray, xray, hysteria, mieru |
| Network Tools | 20+ | nmap, tcpdump, tshark, whatweb, netcat, socat, proxychains4 |
| DNS Management | 8+ | dnscrypt-proxy, dnsutils, bind9-dnsutils, resolvconf |
| Firewalls | 6+ | iptables, nftables, ufw, iptables-persistent |
| Security Tooling | 25+ | cryptsetup, gnupg, openssh-client, fail2ban, apparmor |
| Development Stack | 30+ | git, python3, perl, build-essential, cmake, gcc |
| System Monitoring | 15+ | htop, iotop, nethogs, sysstat, lm-sensors |
| File Systems | 20+ | btrfs-progs, xfsprogs, ntfs-3g, exfat-utils, squashfs-tools |
| Terminal Multiplexers | 4+ | tmux, screen, byobu |
| Base System | 1000+ | Debian core utilities, libraries, and base packages |
Supported Routing Protocols
Kodachi Terminal ships with 12+ routing protocols via the routing-switch binary, covering everything from battle-tested VPNs to advanced censorship-resistant transports.
| Category | Protocols & Features |
|---|---|
| VPN Protocols | OpenVPN (industry-standard, AES encryption), WireGuard (modern, ChaCha20 encryption) — with kill switch and DNS leak protection |
| Anti-Censorship | Shadowsocks (SOCKS5 + encryption), V2Ray (traffic obfuscation), Xray (enhanced V2Ray), Hysteria2 (high-performance for restrictive networks), Mieru (MITA - lightweight anti-censorship proxy) |
| Proxy Protocols | SOCKS5 (standard proxy), Dante (SOCKS server), HTTP/HTTPS (proxy support), Microsocks (lightweight SOCKS5 server) |
| Tor Integration | Redsocks (transparent Tor routing), SOCKS proxy configuration, TransPort routing, DNS over Tor, System-wide torrification (can run on top of any existing VPN service: WireGuard, OpenVPN, Hysteria2, Shadowsocks, V2Ray, Xray, Mieru) |
| Multi-Layer | VPN + Tor (double encryption), protocol chaining for enhanced anonymity, traffic obfuscation layers |
Protocol Documentation
For detailed protocol configuration and usage, see the routing-switch documentation.
Torrification Capability
Kodachi Terminal supports system-wide torrification that can run on top of any existing VPN service. This means you can layer Tor routing on top of WireGuard, OpenVPN, Hysteria2, Shadowsocks, V2Ray, or Xray connections for enhanced anonymity. Use sudo tor-switch torrify-system-nftables-dns (preferred) or sudo tor-switch torrify-system-iptables-dns to torrify your entire system regardless of your underlying VPN connection. To disable, use sudo tor-switch detorrify-system-nftables or sudo tor-switch detorrify-system-iptables.
Security Models & Layered Anonymity
Kodachi Terminal includes 87+ pre-built security workflows and supports unlimited custom workflows via the workflow-manager binary. Below are 18 example workflows organized by anonymity levels with diverse protocol coverage (WireGuard, OpenVPN, Shadowsocks, Hysteria2, V2Ray, Xray, Mita). Workflows 1-3 (Triple VPN + Tor) provide maximum anonymity for extreme threat models. Workflows 4-8 (Double VPN + Tor) offer ultra anonymity with host+guest configurations. Workflows 9-11 (Single VPN + Double Tor) provide very high anonymity. Workflows 12-18 balance security with performance for various use cases. All profiles are located in /home/kodachi/dashboard/hooks/config/profiles/. Users can create, modify, and chain workflows using workflow-manager to build custom security configurations.
Workflow Comparison Matrix
Router VPN → Host Mullvad → VM Kodachi WireGuard → Torrified
Chain: ISP → Router VPN → Host Mullvad VPN → Kodachi WireGuard (VM NAT) → Torrified System → Tor DNS
Ideal for: Ultimate anonymity, extreme threat models, maximum deniability, state-level adversaries.
sudo routing-switch connect wireguard
sudo tor-switch torrify-system-nftables-dns
Router VPN → Host ProtonVPN → VM Kodachi OpenVPN → Torrified
Chain: ISP → Router VPN → Host ProtonVPN → Kodachi OpenVPN (VM NAT) → Torrified System → Tor DNS
Ideal for: Whistleblowing, state-level adversaries, journalist protection, maximum operational security.
sudo routing-switch connect openvpn
sudo tor-switch torrify-system-nftables-dns
Router VPN → Host NordVPN → VM Kodachi Shadowsocks → Torrified
Chain: ISP → Router VPN → Host NordVPN → Kodachi Shadowsocks (VM NAT) → Torrified System → Tor DNS
Ideal for: Maximum obfuscation, defeating DPI in hostile networks, evading advanced surveillance.
sudo routing-switch connect shadowsocks
sudo tor-switch torrify-system-nftables-dns
Host Mullvad → VM Kodachi OpenVPN → Torrified + Tor DNS
Chain: ISP → Normal Router → Host Mullvad → Kodachi OpenVPN (VM NAT) → Torrified → Tor DNS
Ideal for: Different VPN providers, avoiding single-point surveillance, investigative journalism.
sudo routing-switch connect openvpn
sudo tor-switch torrify-system-nftables-dns
Host ProtonVPN → VM Kodachi Shadowsocks → Torrified + Tor DNS
Chain: ISP → Normal Router → Host ProtonVPN → Kodachi Shadowsocks (VM NAT) → Torrified → Tor DNS
Ideal for: Censorship bypass with double VPN + Tor, evading DPI, hostile network environments.
sudo routing-switch connect shadowsocks
sudo tor-switch torrify-system-nftables-dns
Host NordVPN → VM Kodachi V2Ray → Torrified + Tor DNS
Chain: ISP → Normal Router → Host NordVPN → Kodachi V2Ray (VM NAT) → Torrified → Tor DNS
Ideal for: Traffic obfuscation, triple anonymity layer, defeating advanced network analysis.
sudo routing-switch connect v2ray
sudo tor-switch torrify-system-nftables-dns
Host ExpressVPN → VM Kodachi Hysteria2 → Torrified + Tor DNS
Chain: ISP → Normal Router → Host ExpressVPN → Kodachi Hysteria2 (VM NAT) → Torrified → Tor DNS
Ideal for: High-performance with maximum anonymity, restrictive network circumvention.
sudo routing-switch connect hysteria2
sudo tor-switch torrify-system-nftables-dns
Anonymous VPN → Tor → Torrified System + Tor DNS
Chain: ISP → Kodachi VPN (anonymous node) → Tor → Torrified System → Tor DNS
Ideal for: Investigative journalism, activist operations, secure communications.
sudo routing-switch connect openvpn
sudo tor-switch torrify-system-nftables-dns
Forced Xray → Torrified System + Tor DNS
Chain: ISP → Kodachi Xray (forced traffic) → Torrified System → Tor DNS
Ideal for: Extreme anonymity requirements, .onion operations, dark web access.
sudo routing-switch connect xray
sudo tor-switch torrify-system-nftables-dns
WireGuard → Torrified System + Tor DNS
Chain: ISP → Kodachi WireGuard → Torrified System → Tor DNS
Ideal for: Dark web research, sensitive communications, enhanced privacy.
sudo routing-switch connect wireguard
sudo tor-switch torrify-system-nftables-dns
Router VPN → VM WireGuard → Tor (Single Tor)
Chain: ISP → Router VPN → Kodachi WireGuard (VM via NAT) → Torified System → Tor DNS
Ideal for: Maximum deniability with physical isolation, secure operations.
sudo routing-switch connect wireguard
sudo tor-switch torrify-system-nftables-dns
Host Mullvad → VM Kodachi Shadowsocks → DNScrypt
Chain: ISP → Normal Router → Host Mullvad → Kodachi Shadowsocks (VM NAT) → DNScrypt
Ideal for: Censorship bypass with double VPN layer, evading DPI.
sudo routing-switch connect shadowsocks
sudo dns-switch switch --names dnscrypt-cloudflare
health-control net-check
Host ProtonVPN → VM Kodachi Hysteria2 → DNScrypt
Chain: ISP → Normal Router → Host ProtonVPN → Kodachi Hysteria2 (VM NAT) → DNScrypt
Ideal for: High-performance double VPN for restrictive networks, streaming with privacy.
sudo routing-switch connect hysteria2
sudo dns-switch switch --names dnscrypt-quad9
ip-fetch
Host ExpressVPN → VM Kodachi Xray-VLESS-Reality → DNScrypt
Chain: ISP → Normal Router → Host ExpressVPN → Kodachi Xray-VLESS-Reality (VM NAT) → DNScrypt
Ideal for: Advanced anti-detection with Xray Reality, defeating sophisticated censorship.
sudo routing-switch connect xray
sudo dns-switch switch --names dnscrypt-quad9
health-control security-score
Forced Hysteria2 → Torrified System + Tor DNS
Chain: ISP → Kodachi Hysteria2 (forced traffic) → Torrified System → Tor DNS
Ideal for: Hostile network environments, censorship bypass with good performance.
sudo routing-switch connect hysteria2
sudo tor-switch torrify-system-nftables-dns
V2Ray → Torrified System + Tor DNS
Chain: ISP → Kodachi V2Ray → Torrified System → Tor DNS
Ideal for: General privacy and anonymous browsing, traffic obfuscation.
sudo routing-switch connect v2ray
sudo tor-switch torrify-system-nftables-dns
Anonymous Shadowsocks → Tor + Tor DNS
Chain: ISP → Kodachi Shadowsocks (anonymous node) → Tor → Tor DNS
Ideal for: Daily privacy operations, secure communications, DPI evasion.
sudo routing-switch connect shadowsocks
sudo tor-switch start-tor-dns-nftables
Forced OpenVPN → DNScrypt (Fast Performance)
Chain: ISP → Kodachi OpenVPN (forced traffic) → DNScrypt
Ideal for: Online banking, shopping, business email, general secure browsing.
sudo routing-switch connect openvpn
sudo dns-switch switch --names dnscrypt-quad9
health-control net-check
Protocol-Specific Initial Setup Workflows
Kodachi Terminal includes ready-to-use initial setup profiles for multiple routing protocols:
VPN Protocols:
initial_terminal_setup_openvpn_only- OpenVPN connection setupinitial_terminal_setup_wireguard_only- WireGuard connection setup
Anti-Censorship Protocols:
initial_terminal_setup_shadowsocks_only- Shadowsocks proxy setupinitial_terminal_setup_v2ray_only- V2Ray traffic obfuscationinitial_terminal_setup_xray_vless_only- Xray VLESS protocolinitial_terminal_setup_xray_trojan_only- Xray Trojan protocolinitial_terminal_setup_xray_vless_reality_only- Xray VLESS Realityinitial_terminal_setup_hysteria2_only- Hysteria2 high-performance
Proxy Servers:
initial_terminal_setup_dante_only- Dante SOCKS5 serverinitial_terminal_setup_mita_only- Microsocks lightweight SOCKS5
Tor Combinations:
initial_terminal_setup_tor_only- Tor-only setupinitial_terminal_setup_wireguard_torrify- WireGuard + Tor torrificationinitial_terminal_setup_auth_torrify_only- Authentication + Tor torrification
Execute with: sudo workflow-manager run <profile-name>
Workflow Selection Guide - Organized by Anonymity Tiers
TIER 1: Maximum Anonymity - Triple VPN + Tor (Workflows 01-03) - Anonymity Level: Ultra++ (6/6) - Triple VPN protection with Tor torrification - Best for: Ultimate anonymity, extreme threat models, state-level adversaries, whistleblowing, maximum deniability - Configuration: Router VPN → Host VPN (Mullvad/ProtonVPN/NordVPN) → Kodachi VPN (WireGuard/OpenVPN/Shadowsocks) → Torrified System → Tor DNS - Speed: Slowest to Very Slow
TIER 2: Ultra Anonymity - Double VPN + Tor (Workflows 04-08) - Anonymity Level: Ultra (5/5) - Double VPN with Tor torrification - Best for: Different VPN providers, avoiding single-point surveillance, investigative journalism, activist operations, censorship bypass with maximum protection - Configuration: Normal Router → Host VPN (Mullvad/ProtonVPN/NordVPN/ExpressVPN) → Kodachi VPN (OpenVPN/Shadowsocks/V2Ray/Hysteria2) → Torrified System → Tor DNS - Speed: Slow to Moderate
TIER 3: Very High Anonymity - Single VPN + Double Tor (Workflows 09-11) - Anonymity Level: Very High (4.5/5) - Double Tor circuits or Router + Guest VPN + Tor - Best for: Extreme anonymity requirements, .onion operations, dark web research, sensitive communications, maximum deniability - Configuration: Kodachi VPN (Xray/WireGuard) → Torrified → Double Tor Circuits OR Router VPN → Kodachi VPN → Torrified System - Speed: Very Slow to Slow
TIER 4: High Anonymity - Double VPN without Tor (Workflows 12-14) - Anonymity Level: High (4/5) - Double VPN layer - Best for: Censorship bypass, DPI evasion, advanced anti-detection, high-performance with strong privacy - Configuration: Normal Router → Host VPN (Mullvad/ProtonVPN/ExpressVPN) → Kodachi VPN (Shadowsocks/Hysteria2/Xray-VLESS-Reality) → DNScrypt - Speed: Good to Very Good
TIER 5: Moderate-High Anonymity - Single VPN + Tor (Workflows 15-17) - Anonymity Level: Moderate-High (3.5/5) - Single VPN with Tor - Best for: Hostile network environments, general privacy, anonymous browsing, daily privacy operations, secure communications - Configuration: Kodachi VPN (Hysteria2/V2Ray/Shadowsocks) → Torrified System → Tor DNS - Speed: Moderate
TIER 6: Moderate Anonymity - Single VPN Only (Workflow 18) - Anonymity Level: Moderate (3/5) - Single VPN with encrypted DNS - Best for: Online banking, shopping, business email, general secure browsing, fast performance requirements - Configuration: Kodachi VPN (OpenVPN) → DNScrypt - Speed: Fast
Create Custom Workflows using workflow-manager for: Multi-protocol chains, adaptive failover, custom threat models, automated security responses, and specialized use cases.
NOT Recommended: Tor → VPN
Avoid Configuration: Your Computer → Tor → VPN → Internet
This configuration is widely discouraged; it blocks .onion access, lets the guard see your real IP, makes Tor usage detectable, degrades performance, and shifts trust to the VPN.
Why this is dangerous: Entry nodes see your real IP • ISP detects Tor usage • NO access to .onion sites • Severely degraded performance • VPN provider can see your activity
Evidence: For detailed analysis, read the Tor Project's official documentation on Tor+VPN configurations.
Source Information
Based on Privacy Guides 2025 recommendations, Tor Project official documentation, and Kodachi security research. These workflows represent comprehensive threat modeling from maximum anonymity to secure financial operations.
Hardware Support Matrix
Kodachi Terminal bundles 30+ firmware packages to deliver broad WiFi, Ethernet, Bluetooth, GPU, and microcode coverage out of the box.
| Hardware Type | Supported Chipsets & Manufacturers |
|---|---|
| WiFi | Intel (all generations), Broadcom (modern + legacy wl driver), Atheros/Qualcomm, Realtek, MediaTek, Marvell, TI, Atmel |
| Ethernet | Broadcom (bnx2, bnx2x), Cavium, Myricom, Netronome, QLogic, Realtek |
| Bluetooth | BlueZ firmware, miscellaneous nonfree firmware |
| GPU / Graphics | AMD (amdgpu for terminal console), Intel (microcode) |
| Microcode | Intel CPU microcode updates, AMD CPU microcode updates |
Broadcom Wireless Support - Pre-Installed
Broadcom b43 and b43legacy firmware is pre-installed in the ISO at /lib/firmware/b43/ and /lib/firmware/b43legacy/.
Supported chipsets:
- b43legacy: BCM4301, BCM4303, BCM4306/2 (very old cards)
- b43: BCM4311, BCM4312, BCM4313, BCM4321-BCM4360 (modern cards)
Drivers included:
b43kernel driver (open-source, loaded automatically)b43legacykernel driver (for BCM4301-4306/2)broadcom-sta-dkms(wl proprietary driver, alternative for some cards)b43-fwcuttertool (if you need to extract different firmware versions)
No post-boot installation required - firmware is ready to use immediately.
SOCKS Proxy Server Setup (Primary Use Case)
One of Kodachi Terminal's primary use cases is running as a dedicated SOCKS proxy server for your entire network. This allows all devices (phones, tablets, computers) to route traffic through a single anonymized gateway.
Step-by-Step Server Setup
1. Boot Kodachi Terminal on dedicated hardware or VM
2. Configure network routing
sudo routing-switch connect wireguard # Connect to VPN
sudo tor-switch torrify-system-nftables-dns # Torrify system + Tor DNS
sudo dns-switch switch --names dnscrypt-quad9 # Privacy-focused DNS
3. Start SOCKS proxy server (choose one)
Option A: V2Ray SOCKS5 proxy (recommended for performance)
# Configure V2Ray with SOCKS5 inbound
v2ray run -config /path/to/config.json
# Default SOCKS5 port: 10808
Option B: Microsocks lightweight proxy
Option C: Dante SOCKS server (enterprise-grade)
sudo apt install dante-server
sudo systemctl start danted
# Configure /etc/danted.conf for your network
4. Configure client devices
Point all devices on your network to use:
- SOCKS5 Server: <Kodachi-Terminal-IP>:30050 (or your chosen port)
- Protocol: SOCKS5
5. Verify proxy is working
sudo ip-fetch # Check exit IP
health-control net-check # Verify no leaks
sudo dns-leak test # DNS leak test
Managing the Proxy Server
# Monitor active proxy connections
sudo netstat -tulpn | grep microsocks
# Configure firewall to restrict proxy access to trusted IPs
sudo iptables -A INPUT -p tcp --dport 30050 -s TRUSTED_IP -j ACCEPT
sudo iptables -A INPUT -p tcp --dport 30050 -j DROP
Use Case Examples
Example 1: V2Ray Proxy Server for Network
Boot Kodachi Terminal on old laptop → Connect to VPN → Start V2Ray SOCKS5 server → Configure all home devices to use proxy → Entire household anonymized
Example 2: VMware Testing Environment
Run Kodachi Terminal in VMware Workstation/Fusion → Test all 14 binaries safely → Snapshot before testing → Roll back after experiments → No impact on host system
Example 3: Dedicated Proxy Server Hardware
Old desktop/laptop → Boot Kodachi Terminal → Enable persistent storage → Configure routing protocols → Run 24/7 as network proxy gateway → Centralized anonymity for all devices
Example 4: Internet Café/Public Computer
Boot from USB → No installation required → Use Kodachi binaries for secure browsing → Shut down → No traces left on host machine
Example 5: Travel & Hotels
Boot Kodachi Terminal on travel laptop → Connect to hotel WiFi → Enable VPN + Tor → Access sensitive accounts securely → Bypass local censorship/monitoring
Example 6: Corporate/Educational Testing
Security researchers → Test Kodachi binaries in isolated VM → Learn CLI commands → Verify routing configurations → Safe environment for experimentation
First Boot Experience
Automatic Welcome Screen
On first login, Kodachi Terminal automatically performs:
- Binary Deployment Verification - Validates all 14 core security binaries
- DNSCrypt Auto-Configuration - Enables encrypted DNS on first run
- Online Authentication - Connects to Kodachi services for updates
- System Status Collection - Fetches IP, geolocation, network info, security score
- Interactive Menu Display - Shows 13 pre-configured security workflows
System Status Dashboard
The welcome screen displays comprehensive real-time status information:
Interactive Workflow Menu
The welcome screen presents 13 automated security workflows:
[1] WireGuard Setup
Auth → Status Check → System Hardening → WireGuard Connection → Verification
[2] Xray-VLESS-Reality
Auth → Status Check → System Hardening → Xray-VLESS-Reality Connection → Verification
[3] OpenVPN Setup
Auth → Status Check → System Hardening → OpenVPN Connection → Verification
[4] V2Ray Setup
Auth → Status Check → System Hardening → V2Ray Connection → Verification
[5] Hysteria2 Setup
Auth → Status Check → System Hardening → Hysteria2 Connection → Verification
[6] Xray-VLESS Setup
Auth → Status Check → System Hardening → Xray-VLESS Connection → Verification
[7] Xray-Trojan Setup
Auth → Status Check → System Hardening → Xray-Trojan Connection → Verification
[8] Mita (Microsocks) Setup
Auth → Status Check → System Hardening → Mita SOCKS5 Server → Verification
[9] Torrify Only
Auth → Network Check → System Torrification → Tor Verification
[10] WireGuard + Torrify
Auth → System Hardening → WireGuard Connection → Torrification → Verification
[11] Emergency Recovery
Detorrify → Disconnect All → Network Recovery → Reset Configuration → Verification
[12] Security Score Check
Display comprehensive security score report with detailed breakdown
[13] Exit to Shell
Exit the menu system and access command-line interface for manual operations
Manual Command Usage
After exiting the menu (option 13), run commands manually:
# Explore all available commands
health-control -e # 50+ health control commands
routing-switch -e # All routing and protocol commands
workflow-manager list # List all 87+ workflow profiles
tor-switch -e # Tor management commands
dns-switch -e # DNS configuration commands
# Quick status checks
health-control security-score # Comprehensive security analysis
ip-fetch # Current IP and geolocation
dns-leak test # DNS leak detection
routing-switch status # Network connection status
# Start SOCKS5 proxy server
routing-switch microsocks-enable -u USERNAME -p PASSWORD
Running Custom Workflows
Execute any of the 87+ pre-built profiles:
# List all available workflows
workflow-manager list
# Run specific workflow
sudo workflow-manager run initial_terminal_setup_shadowsocks_only
sudo workflow-manager run torrify-dns-nftables-simple
sudo workflow-manager run privacy-maximum-anonymity
sudo workflow-manager run emergency-recovery-all
# Create custom workflow
workflow-manager create my-custom-workflow
Bypassing Welcome Screen
To skip the interactive menu on login:
# Set environment variable before login
export KODACHI_SKIP_WELCOME=1
# Or add to ~/.bashrc to skip permanently
echo 'export KODACHI_SKIP_WELCOME=1' >> ~/.bashrc
Re-Running Welcome Screen
To manually trigger the welcome screen:
# Source the welcome script
source /etc/profile.d/kodachi-welcome.sh
# Or type the shortcut command
kodachi
VM and Boot Methods
VMware Workstation/Fusion - 4GB+ RAM recommended - 20GB+ disk (if enabling persistence) - Network adapter: NAT or Bridged - Boot from ISO
VirtualBox - Enable EFI (for UEFI boot) - 4GB+ RAM - Network: NAT or Bridged - Attach ISO to virtual optical drive
QEMU/KVM
Physical Hardware - Boot from USB drive - BIOS: Set USB as first boot device - UEFI: Select USB from boot menu
Advanced Configuration
Persistent Storage & Encrypted Persistence
Automatic Persistence Setup (Recommended)
Most USB creation tools handle persistence automatically! When creating your bootable USB, select the persistence option in these tools:
- Rufus (Windows) - Select "Persistent partition size" slider when writing the ISO
- UUI (Universal USB Installer) - Check "Persistent file size for storing changes" option
- YUMI (Multiboot) - Supports persistent storage configuration during setup
See the Create Bootable USB section above for tool downloads and setup.
No manual commands needed - The tools will automatically create and configure the persistent partition for you!
Boot Options:
- live-persist - Enable persistent storage (standard)
- live-persist-encrypted - Enable encrypted persistent storage (recommended for security)
Manual Setup (Advanced - Linux dd Method Only):
If you used the Linux dd method to create your USB, you'll need to manually configure persistence:
# Create encrypted persistent partition on USB
sudo apt install cryptsetup
sudo cryptsetup luksFormat /dev/sdX2
sudo cryptsetup luksOpen /dev/sdX2 persistence
sudo mkfs.ext4 -L persistence /dev/mapper/persistence
sudo mkdir -p /mnt/persistence
sudo mount /dev/mapper/persistence /mnt/persistence
echo "/ union" | sudo tee /mnt/persistence/persistence.conf
sudo umount /mnt/persistence
sudo cryptsetup luksClose persistence
Verification:
Network Configuration
# Configure static IP
sudo nano /etc/network/interfaces
# Restart networking
sudo systemctl restart networking
# WiFi configuration
sudo nmcli dev wifi connect "SSID" password "PASSWORD"
Firewall Configuration
# Configure firewall rules
sudo iptables -A INPUT -p tcp --dport 30050 -s TRUSTED_IP -j ACCEPT
sudo iptables -A INPUT -p tcp --dport 30050 -j DROP
# Monitor active connections
sudo netstat -tulpn | grep microsocks
Emergency Data Destruction (Nuke Password)
What is Nuke Password?
The nuke password feature allows instant, irreversible destruction of encrypted data in emergency scenarios by destroying LUKS encryption keys, making data permanently unrecoverable.
Requirements
- Encrypted persistent storage (
live-persist-encryptedboot option) - LUKS-encrypted partition
health-controlbinary (Kodachi system binary)cryptsetup-nuke-passwordpackage (auto-installed by health-control if missing)
Recommended Method: Using health-control
The health-control binary provides a safe, automated approach to managing nuke passwords with built-in safety features:
# Step 1: Detect LUKS devices on your system
health-control luks-detect
health-control luks-detect --all-devices # Include loop and virtual devices
health-control luks-detect --json # JSON output for scripts
# Step 2: Configure nuke password (Interactive - Recommended)
sudo health-control luks-nuke --action configure --device /dev/sda5
# Prompts for nuke password interactively (safer method)
# OR: Configure with password (Automated - for scripts)
sudo health-control luks-nuke --action configure --device /dev/sda5 --password YOUR_NUKE_PASSWORD
# Step 3: Verify nuke password is configured
health-control luks-nuke --action status # Check all LUKS devices
health-control luks-nuke --action status --device /dev/sda5 # Check specific device
health-control luks-nuke --action status --json # JSON output
# Optional: Remove nuke password
sudo health-control luks-nuke --action remove --device /dev/sda5
Safety Features
When using health-control for nuke password management, you get:
- Automatic LUKS Validation: Verifies device is actually a LUKS partition before operations
- Encrypted Header Backup: Creates AES-256-CBC encrypted backup of LUKS header on Desktop (timestamped)
- Package Management: Auto-installs
cryptsetup-nuke-passwordif not present - Comprehensive Logging: All operations logged to
logs-hookfor audit trail - Status Monitoring: Check nuke password status across all LUKS devices
- JSON Support: Full JSON output for GUI/dashboard integration
Advanced/Manual Method
For advanced users who prefer direct control, you can use the underlying cryptsetup command:
# Add nuke password to existing LUKS partition (manual method)
sudo cryptsetup luksAddNuke /dev/sdX2
# You'll be prompted to:
# 1. Enter existing LUKS password
# 2. Enter new NUKE password (different from normal password)
# 3. Confirm nuke password
# <i class="fas fa-exclamation-triangle" style="color: #ff9800;"></i> WARNING: Manual method does NOT create header backups
# Consider using health-control for automated safety features
How It Works
- Normal Boot: Enter regular LUKS password → Data decrypted normally
- Emergency Activation: Enter nuke password → LUKS header destroyed instantly → Data permanently unrecoverable
- Result: Partition appears as random data, no forensic recovery possible
Activation Process
# During boot, when prompted for LUKS password:
# Enter NUKE password instead of normal password
# → LUKS header immediately destroyed
# → Boot fails (expected)
# → Data permanently destroyed
Use Cases
- Border crossings / checkpoints under duress
- Emergency situations requiring immediate data destruction
- Physical device seizure scenarios
- Coercive password disclosure situations
Critical Warning
Nuke password destroys ALL data on the encrypted partition permanently. There is NO recovery, NO undo, NO backup restoration. Use only in genuine emergency scenarios. Test in a non-critical environment first.
Troubleshooting
Issue: WiFi not working
# Check WiFi hardware
lspci | grep -i wireless
# Install missing firmware (if needed)
sudo apt update
sudo apt install firmware-iwlwifi firmware-realtek
sudo modprobe -r iwlwifi && sudo modprobe iwlwifi # Reload driver
Issue: Binary not found
# Verify binaries exist
ls -la ~/dashboard/hooks/
# Check PATH
echo $PATH
# Run with sudo
sudo ip-fetch
Issue: VPN not connecting
# Check VPN configuration
sudo routing-switch status
# Verify network connectivity
ping -c 4 1.1.1.1
# Check DNS resolution
nslookup check.torproject.org
# Review logs
tail -f ~/dashboard/hooks/logs/routing-switch.log
Issue: Tor not starting
# Check Tor service status
sudo systemctl status tor
# Review Tor logs
sudo journalctl -u tor -f
# Restart Tor service
sudo tor-switch stop-tor
sudo tor-switch torrify-system-nftables-dns
Issue: DNS leaks detected
# Switch DNS provider
sudo dns-switch switch --names dnscrypt-quad9
# Test again
sudo dns-leak test --comprehensive
# Verify DNS configuration
cat /etc/resolv.conf
Security Considerations
Recommended Security Measures
- Always verify downloaded ISOs - Check SHA256 checksums
- Use encrypted persistent storage - Enable
live-persist-encryptedboot option - Configure nuke password - For emergency data destruction
- Restrict proxy access - Use firewall rules to limit client IPs
- Regular updates - Keep system packages updated (if using persistence)
- Monitor logs - Review service logs for anomalies
- Test workflows - Verify anonymity configurations before production use
- Backup configurations - Export VPN/proxy configurations separately
- Physical security - Secure hardware running proxy server
- Network segmentation - Isolate proxy server on dedicated network
Related Documentation
- Installation Guide - General installation instructions for Kodachi binaries
- Binaries Overview - Complete reference for all 14 binaries
- routing-switch Documentation - Detailed routing-switch commands
- tor-switch Documentation - Tor network management
- health-control Documentation - System health and emergency controls
Summary
Kodachi Terminal is the perfect solution for:
Key Benefits
Network-wide proxy protection - Run as dedicated SOCKS5 server
Safe binary testing - Isolated environment for experimentation
Multi-protocol support - 12+ routing protocols included
Resource efficient - Lightweight terminal-only design (2.4GB ISO)
Production ready - Based on Debian 13 (Trixie) with comprehensive hardware support
Complete toolkit - All 14 Kodachi binaries pre-installed
Maximum compatibility - 30+ firmware packages for WiFi, Ethernet, Bluetooth
Whether you need a dedicated proxy server for your network or a safe testing environment for Kodachi binaries, Kodachi Terminal provides a complete, lightweight solution.