On 04/09/2018 10:56 AM, john wrote:
On 04/07/2018 03:04 PM, brendan.hoar-
There’s one more thing I just learned; by default, usb keyboards are blocked from all VMs. You have to modify /etc/qubes-rpc/policy/qubes.InputKeyboard to allow the Yubikey to be connected to a specific VM if the classic yubico otp slots are enabled...because they mimic a keyboard.

modify it how please ?


I actually have 2 yubikey versions  the newer Neo, and an older OTP version ; I'm wondering if I should also attempt to disable everything *but OTP  in the personalization tool,  which I'm reticent to mess with


Today, I made the yubikey into OTP only via the Neo personalisation tool & set qubes.InputKeyboard RPC to
$anyvm $work allow

reboot the AppVM attached the yubikey to work AppVM, however it is still dead in the water ...

I only need OTP (I have the dom0 and fedora packages installed) , so, I see no further leads, though I Do recall Axon Andrew mentioning something about SALT for HID keyboards ..... I really need the yubikey to work sigh

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8196de40-fec3-35d3-c898-2d42aa5a4b95%40riseup.net.
For more options, visit https://groups.google.com/d/optout.

Reply via email to