[qubes-users] Yubikey for OTP password manager 2FA only ...with Q4.5 sys-usb please

2018-05-26 Thread yrebstv
https://www.qubes-os.org/doc/usb/#how-to-use-a-usb-keyboard

I wonder if this might fix  the yubikey OTP function  since  the yubikey
mimics  a HID keyboard 

R4.0, using salt

To allow USB keyboard usage (including early boot for LUKS passphrase),
make sure you have the latest qubes-mgmt-salt-dom0-virtual-machines
package (simply install dom0 updates) and execute in dom0:

sudo qubesctl state.sls qvm.usb-keyboard

The above command will take care of all required configuration,
including creating USB qube if not present. Note that it will expose
dom0 to USB devices while entering LUKS passphrase. Users are advised to
physically disconnect other devices from the system for that time, to
minimize the risk.

If you wish to perform only subset of this configuration (for example do
not enable USB keyboard during boot), see manual instructions below.

.
don't suppose anyone has tried this ?


I also am looking to get rid of my PS2 adapter, as its size messes up
the desktop USB port ..

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0b585c90b438835f33063b30596d1b20%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Yubikey for OTP password manager 2FA only ...with Q4.5 sys-usb please

2018-03-25 Thread anon
Hello, using Q4.5 I have been reading the various yubikey howto 
problem-solving, but remain confused what to expect for my use of the 
Yubikey, which is, I believe OTP  for  2FA  for lastpass


On my desktop I have Q3.2 and no sys-usb   and I have NOT had to install 
any particular packages in dom0 or the Fed26 template etc.


in Q4.5 I do note the widget to attach the Yubikey to the AppVM 
example:  EmailVM , and I see it attached with lspci in the AppVM , 
using the widget, however it is nonfunctional.



Typically, the Yubikey at times asks you to detach and reattach it, 
which probably in hindsight is not a good idea, as after doing that the 
widget will no longer allow any detaching.



when I go into dom0 and do qvm-device attach email sys-usb:2-1.1 at 
current it is freezing and I can't Ctl+c out of the command 


I have 8gb Ram in an i7 thinkpad here, and for some reason I can't even 
get sys-usb to launch a Terminal, guess I'll be rebooting , maybe an SSD 
in the future is going to make Q4.5 usable ? (sorry added some 
commentary here) :O



I believe at one point it told me the qubes usb proxy was not installed, 
then I went and tried to dnf install qubes proxy in the sys-usb and it 
said it *Was already installed.



I find sys-usb the most difficult aspect of Qubes use, on Q3.2 after 
locking myself out I gave up on sys-usb ... and don't feel for my 
purposes a huge worry re: security  ..can I do the same in Q4  or 
... what do you suggest ..



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/51f6fd3d-aa10-9734-bde3-402a70dda983%40riseup.net.
For more options, visit https://groups.google.com/d/optout.