On Saturday, March 10, 2018 at 3:05:09 AM UTC+1, Jon R. wrote: > 1. Find a free USB controller. I didn't want to use the same one as my > keyboard or mouse. Your board specs and the lsusb utility are your > friends in the hunt. Check out the Qubes document "Assigning Devices to > VMs" for the gory details of discovering the PCI device assignments to > your USB controllers. > > 2. In the VM you plan to use the key, you'll want to assign the PCI > device for your free hub to that VM. That's accomplished by firing up > Qube settings for the VM and selecting the devices tab. Scroll down to > the available device and move it to the selected box. > > 3. You might have to configure strict reset (or disable strict reset) for > the USB controller. > > 4. Start the VM. > > > > One gotcha: the VM won't run in PVH mode once you make this > assignment. But, my Yubikey lights up when Gmail or Facebook need the > second factor, and it works as advertised. > > > > > It > looks like when in the sys-usb Qube the Yubikey works as intended. When > attaching it to another Qube it's listed under lsusb properly and > lights up accordingly however when using it there is no output (to > stdout / wherever). I'm not quite sure how to debug this further so if > someone could shed some light in that regard that'd be great. > > > In the interim I'll use a solution similar to yours and just juggle the USB > controller to different Qubes as needed (ick!). > > > Thanks for the information! > > > > > On Fri, Mar 9, 2018 at 4:13 PM, William Bormann <william...@gmail.com> wrote: > I have a FIDO U2F Yubico Security Key that I use for authentication to Gmail > and Facebook. In my situation, I decided to use a single VM for two factor > authentication. Here's what I did: > > > > 1. Find a free USB controller. I didn't want to use the same one as my > keyboard or mouse. Your board specs and the lsusb utility are your friends > in the hunt. Check out the Qubes document "Assigning Devices to VMs" for the > gory details of discovering the PCI device assignments to your USB > controllers. > > 2. In the VM you plan to use the key, you'll want to assign the PCI device > for your free hub to that VM. That's accomplished by firing up Qube settings > for the VM and selecting the devices tab. Scroll down to the available > device and move it to the selected box. > > 3. You might have to configure strict reset (or disable strict reset) for > the USB controller. > > 4. Start the VM. > > > > One gotcha: the VM won't run in PVH mode once you make this assignment. > But, my Yubikey lights up when Gmail or Facebook need the second factor, and > it works as advertised. > > > > > > On Friday, March 9, 2018 at 12:34:06 PM UTC-5, Jon R. wrote: > > > Hello, > > > > > > I've scoured around the mailing lists / SO / Reddit and haven't come across > > a solution to this yet. I'm running 4.0 (R4.0) and when I attempt to use my > > Yubikey it's seemingly not picking up any input on the button press. > > > > > > It's detecting the USB properly and I can attach it fine: > > > > > > [cloe@dom0 Desktop]$ qvm-usb > > > BACKEND:DEVID DESCRIPTION USED BY > > > sys-usb:2-1 Yubico_Yubikey_4_OTP+CCID > > > > > > [cloe@dom0 Desktop]$ qvm-usb attach work sys-usb:2-1 > > > > > > [cloe@dom0 Desktop]$ qvm-usb > > > BACKEND:DEVID DESCRIPTION USED BY > > > sys-usb:2-1 Yubico_Yubikey_4_OTP+CCID work > > > > > > However upon button presses on the Yubikey in the "work" domain there is no > > action. I've tested this in gedit, the terminal and elsewhere to no avail. > > > > > > > > > Can someone point me in the right direction as to what may be happening? > > I've successfully attached storage devices and other smart card related > > devices without any issue so it seems to be isolated to the Yubikey itself. > > I've tried 2 separate Yubikey 4's and an older version to no avail. > > > > > > > > > Thank you for your time. > > > > > > > > > - Cody > > > > -- > > You received this message because you are subscribed to the Google Groups > "qubes-users" group. > > To unsubscribe from this group and stop receiving emails from it, send an > email to qubes-users...@googlegroups.com. > > To post to this group, send email to qubes...@googlegroups.com. > > To view this discussion on the web visit > https://groups.google.com/d/msgid/qubes-users/7e00edc7-3c2a-462e-98c6-443dd1af7d36%40googlegroups.com. > > For more options, visit https://groups.google.com/d/optout.
I believe it could possibly be a qvm-usb bug, there appears to be some of those lately which needs fixing, so it might just be a question of waiting. If you want to speed that up, then you can do a search on github to double-check for existing open/closed issues, if there are none already posted for this issue, then you can post it there. If they are closed, then request it to be re-opened if there are no other duplicate open. Remember to include search for other USB devices that fail when using qvm-usb, of which the yubi key might fall under. If you find one of those without yubi key information, then you can add your details in that existing issue. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/038787ee-ea8d-407c-b7a1-e0b513fbaf62%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.