On Saturday, 3 February 2018 22:42:46 UTC, Alex Dubois wrote: > On Saturday, 3 February 2018 10:12:25 UTC, ThierryIT wrote: > > Le vendredi 19 janvier 2018 13:19:29 UTC+2, Alex Dubois a écrit : > > > On Friday, 19 January 2018 05:57:16 UTC, ThierryIT wrote: > > > > Not familiar with this ... Will need procediure to follow. > > > > > > > > > > > > Le mercredi 17 janvier 2018 23:03:31 UTC+2, Alex Dubois a écrit : > > > > > On Wednesday, 17 January 2018 15:15:45 UTC, ThierryIT wrote: > > > > > > No, I am still under R3.2 > > > > > > > > > > > > Le mercredi 17 janvier 2018 16:54:58 UTC+2, awokd a écrit : > > > > > > > On Wed, January 17, 2018 2:09 pm, ThierryIT wrote: > > > > > > > > "https://github.com/adubois/qubes-app-linux-yubikey" > > > > > > > > > > > > > > > > > > > > > > > > Le mercredi 17 janvier 2018 16:05:52 UTC+2, awokd a écrit : > > > > > > > > > > > > > > > >> On Wed, January 17, 2018 1:09 pm, ThierryIT wrote: > > > > > > > >> > > > > > > > >>> Nobody ? > > > > > > > >>> > > > > > > > >>> > > > > > > > >>> > > > > > > > >>> Le mercredi 17 janvier 2018 09:23:34 UTC+2, ThierryIT a écrit > > > > > > > >>> : > > > > > > > >>> > > > > > > > >>> > > > > > > > >>>> Hi, > > > > > > > >>>> > > > > > > > >>>> > > > > > > > >>>> > > > > > > > >>>> I am going to install a new sys-usb. > > > > > > > >>>> I have before to install all what I need to the template > > > > > > > >>>> (fedora-26) > > > > > > > >>>> first. When following your procedure: > > > > > > > >>>> > > > > > > > >>>> > > > > > > > >>>> ykpers has been installed but: I cannot do the same for > > > > > > > >>>> qubes-yubikey-vm and qubes-yubikey-dom0 : > > > > > > > >>>> > > > > > > > >>>> no match for argument > > > > > > > >>>> > > > > > > > >>>> ideas ? > > > > > > > >> > > > > > > > >> Not quite sure what you are trying to do here. What procedure? > > > > > > > >> What > > > > > > > >> command are you entering? > > > > > > > > > > > > > > Are you trying this on Qubes 4.0? Those Yubikey packages might > > > > > > > not be in > > > > > > > the Qubes repo yet. > > > > > > > > > > Hi, > > > > > > > > > > I have not maintained this for some time. So long that I can't > > > > > remember if the packages had been created/tested, I don't think they > > > > > have. > > > > > > > > > > Best is you follow the steps to build it on a new temporary VM, don't > > > > > be afraid it should not be too hard: > > > > > - Execute the yum command in "Build dependancies" > > > > > - Also install pam-devel > > > > > - Follow the steps in preparing the build and build > > > > > - Deploy the code in Dom0 and the USB VM. > > > > > > > > > > I am about to upgrade to Qubes 4.0 rc4 (when released) so won't > > > > > probably be able to help until this is done. > > > > > > > > > > Any help from someone who is used to packaging under Fedora would be > > > > > nice. > > > > > > > > > > Alex > > > > > > Sure, I'll update the doc and post here. However as I said don't want to > > > touch my Qubes set-up before my upgrade to 4.0 rc4. So might be in > > > 2-3weeks > > > > Did you upgrade to Q4R4 ? > > I'm in the process. Having issues with PCI path-through of my second NIC that > I need to solve. I have to use PV mode for now and not too happy to have too. > I'll open another thread if I can't find a way...
Hi Thierry, I have recompiled it OK. This was working on R3.2. You can test it on R4 but no idea if it will work. I hope to have a bit of time to look at it this week. To compile it if you want to test / debugInR4 create new VM with network (to get the github) or without network but you'll have to copy the download to the VM by another mean. Then: yum install pam-devel gettext-devel git libtool libyubikey libyubikey-devel -y yum group install "Development Tools" git clone https://github.com/adubois/qubes-app-linux-yubikey.git cd qubes-app-linux-yubikey/ libtoolize --install autoreconf --install ./configure make check files to copy to Dom0 are in folder back-end files to copy to USBVM are in folder front-end USBVM should be a VM started on boot with the USB controller that you insert the key in... Read the doc, it is not polished. There are mechanisms to detect USBVM compromise, hold-replay attacks, etc... -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a73944a1-7c80-4ad1-9235-8e43a581f195%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.