On Thu, Aug 29, 2019 at 08:58:33PM -1000, rec wins wrote:
> On 8/29/19 1:49 AM, unman wrote:
> > On Wed, Aug 28, 2019 at 09:01:46PM -1000, rec wins wrote:
> >> On 5/27/19 6:09 AM, Stumpy wrote:
> >>> I am trying to use an onlykey U2F but have run into some issues like it
> >>> showing up in dom0 and sys-usb but seems like i cant use it.
> >>>
> >>> in sys-usb:
> >>> [user@sys-usb ~]$ lsusb | grep Only
> >>> Bus 004 Device 010: ID 1d50:60fc OpenMoko, Inc. OnlyKey Two-factor
> >>> Authentication and Password Solution
> >>>
> >>> and in Dom0:
> >>> [ralph@dom0 ~]$ qvm-usb | grep ONLY ; sudo qvm-usb a sys-usb sys-usb:42
> >>> sys-usb:4-2 CRYPTOTRUST_ONLYKEY_346etc
> >>> Device attach failed:
> >>> [ralph@dom0 ~]$
> >>>
> >>> I decided to go with the chrome app but even though sys-usb seems to see
> >>> the onlykey I cant seem to attach it to the chrome appvm i made?
> >>>
> >>    
> >>
> >> so in dom0  you did
> >> $qvm-usb
> >>
> >> get the BDM number and do
> >>
> >> $qvm-usb attach chromevm sys-usb:X-X
> >>
> >> U2F  keys will work in chromium  for  google logins  with  no
> >> complicated  passthrough setup necessary
> >>
> >> OTP won't ,  if the key does  more than U2F  you may need to  get  a
> >> configuration application for the key  and  make sure it's  U2F  only
> >> slot 1  , 2  etc
> >>
> > 
> > Have you looked at the qubes-u2f-proxy package?
> > https://www.qubes-os.org/doc/u2f-proxy
> > 
> > After installation in dom0 and the relevant template, you enable the
> > service in the qube you want to use it in, and the device should then
> > be available for use in that qube.
> > You *dont* attach the USB device to the qube.
> > 
> > Try that, and see how you get on.
> > 
> > unman
> > 
> 
> 
> attaching does work(only in chromium fwiw) even with the FF about:config
> changes,  though,  apparently  this isn't  'secure'  so
> 
> looking at the u2f proxy  at this point
> 
> 
> Repeat qvm-service --enable (or do this in VM settings -> Services in
> the Qube Manager) for all qubes that should have the proxy enabled. As
> usual with software updates, shut down the templates after installation,
> then restart sys-usb and all qubes that use the proxy. After that, you
> may use your U2F token (but see Browser support below).
> 
> 
> after installing the proxy in the templates and shutting them down, and
> restarting the appVMs  based on them..... there is No   qvm-service  to
> do  qvm-service --enable
> 
> and/or  what or where is this supposed to be  'repeated' ?
> 
> "Repeat qvm-service --enable for all qubes that should have the proxy
> enabled."
> 
> sure sounds like  by "qubes" what is meant is the  AppVMs  or  TBAVM  or
> whatever they are called now :)
> 
"qube" is a "user friendly term for a VM"
(https://www.qubes-os.org/doc/glossary";)

qvm-service is a dom0 command line tool - you can also enable the
service in the GUI interface as noted in the instructions.
You enable the service for *each* qube where you want to use the proxy -
that's the "repeat" part.
Check the policy file in /etc/qubes-rpc/policy/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190830124047.GA12823%40thirdeyesecurity.org.

Reply via email to