-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Hi,
I am new to Qubes OS and this group. Attached please find a PDF outlining how I organized my setup in general. Getting right to the point, here is what I have done so far: * setup and using all fedora-23 based qubes / qubes-split-gpg ... all works fine and as expected * created Windows 7 HVM template [1] * created USB qube [2] and verified that USB pass-through works using the "dev" fedora-23 AppVM. Many of the hardware tools I use have Linux clients [3][4][5] My issue: * other hardware tools I need to use have only Windows clients [6][7][8] * it is my impression that the qubes-windows-tools do not (yet) support USB pass-through - is that correct? * I have also tried to assign the entire USB controller to the Windows HVM but have failed. I can repeat and provide error messages if that would be a valid approach. My next steps: * install VirtualBox [9] in a dedicated fedora-23 based AppVM * run Windows 7 as a guest in VirtualBox inside the fedora-23 qube I know that: 1) USB pass-through into fedora-23 AppVM works 2) I have used a Windows VBox on Linux installs before (non Qubes OS) 3) USB pass-through from Linux to the VBox worked too So I see no reason other than performance that the above wouldn't work. The purpose of this email is: * confirm that qubes-windows-tools do not support USB pass-through and I have not overlooked anything or made a mistake along the way * evaluate whether assigning the entire USB controller to the HVM is a viable solution ... some seem to have had success with that, but I couldn't find much details on how to do it other than the obvious tab in the Qubes VM Manager details for the respective qube. * get feedback regarding my setup in general (attachment) ... does this make sense? * get feedback if anyone else is using the Windows VBox in fedora AppVM approach to enable USB pass-through Thank you for taking the time to read this. I am looking forward to any feedback you are willing to share. /Sven [1] https://www.qubes-os.org/doc/windows-appvms/#using-template-based-window s-appvms-qubes-r2-beta-3-and-later [2] https://www.qubes-os.org/doc/usb/ [3] https://www.totalphase.com/products/beagle-i2cspi/ [4] https://www.saleae.com/originallogic16 [5] https://www.microchip.com/Developmenttools/ProductDetails.aspx?PartNO=DV 244005 [6] https://www.k2l.de/products/42/OptoLyzer%C2%AE%20MOCCA%20compact/ [7] https://www.k2l.de/products/15/MediaLB%C2%AE%20Analyzer/ [8] https://www.k2l.de/products/16/INIC%20Explorer/ [9] https://www.virtualbox.org/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJZlJn1AAoJENpuFnuPVB+2qj4P/2FIG65UyErGMeX7JlVWh63s fZBoSMH0hWenEY96UCGNvqYjIoqYPD68NczXjzOypWzW8/1vjbgKkgRPSglb83/N X4iUU54gCnShiNSMTpqxBRpA/vXA/ynT6uPX2HnytK/4poEgA2w0VH8Xm2PfUVkn WOUHd5QvoFMMczAQY8yu0eM6klI2SwqWo6kMBmXljfak43Mx/WWRgBuEqdZsOMwY P1/ei7Yj98o+VONKO5IwQg9O7GcpCJB8EladQhTXA5/xt/VdjUdao+j8vX0Lr1Ld wT8aD/SSmZuO4DwGV1goUy0eUdsvrwsc9Os0zlUysF4Z28bqyMdseJKNPmYj8Ntj 8skDgCD45BTczURwD63DTtbHC+akOBA1G/T2cIQJOIm2Y1iE3vxWQssZOS8MDJ6F MM4jmjVqLX5oWQxm5VEw5Noajx/Vg0bFPfxfj1HVXidhf9ntaVBV2lS4TUkgCWQc ICqwXfjxoj88O94sCFxoZCMrBS3lE+SEXtAJqkRNxeUGfIO+knSy5oaxKUrEQCQh g6QDc4AaYLYvYvou4hLktWvwTNeeUmzSZGCu5NX3JKuEncVFDBh0KNdjuZGJ9WXG CuW96jgdYvBSbPVrg30kKR3d1YlLCPm8vSvI4FwknclrrVhSBYL2kcInvBJW3aM0 9vqcQKtJgd/O8HTDCWZR =dVhj -----END PGP SIGNATURE----- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/4f59fc8a-c13b-d30e-34be-b0f9a7bf5785%40SvenSemmler.org. For more options, visit https://groups.google.com/d/optout.
domains.pdf
Description: Adobe PDF document
domains.pdf.sig
Description: PGP signature