On 04/09/2018 10:56 AM, john wrote:
On 04/07/2018 03:04 PM, brendan.hoar-
There’s one more thing I just learned; by default, usb keyboards are
blocked from all VMs. You have to modify
/etc/qubes-rpc/policy/qubes.InputKeyboard to allow the Yubikey to be
connected to a specific VM if the classic yubico otp slots are
enabled...because they mimic a keyboard.
modify it how please ?
I actually have 2 yubikey versions the newer Neo, and an older OTP
version ; I'm wondering if I should also attempt to disable everything
*but OTP in the personalization tool, which I'm reticent to mess with
Today, I made the yubikey into OTP only via the Neo personalisation tool
& set qubes.InputKeyboard RPC to
$anyvm $work allow
reboot the AppVM attached the yubikey to work AppVM, however it is
still dead in the water ...
I only need OTP (I have the dom0 and fedora packages installed) , so,
I see no further leads, though I Do recall Axon Andrew mentioning
something about SALT for HID keyboards ..... I really need the yubikey
to work sigh
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/qubes-users/8196de40-fec3-35d3-c898-2d42aa5a4b95%40riseup.net.
For more options, visit https://groups.google.com/d/optout.