On Saturday, 3 February 2018 22:42:46 UTC, Alex Dubois  wrote:
> On Saturday, 3 February 2018 10:12:25 UTC, ThierryIT  wrote:
> > Le vendredi 19 janvier 2018 13:19:29 UTC+2, Alex Dubois a écrit :
> > > On Friday, 19 January 2018 05:57:16 UTC, ThierryIT  wrote:
> > > > Not familiar with this ... Will need procediure to follow.
> > > > 
> > > > 
> > > > Le mercredi 17 janvier 2018 23:03:31 UTC+2, Alex Dubois a écrit :
> > > > > On Wednesday, 17 January 2018 15:15:45 UTC, ThierryIT  wrote:
> > > > > > No, I am still under R3.2
> > > > > > 
> > > > > > Le mercredi 17 janvier 2018 16:54:58 UTC+2, awokd a écrit :
> > > > > > > On Wed, January 17, 2018 2:09 pm, ThierryIT wrote:
> > > > > > > > "https://github.com/adubois/qubes-app-linux-yubikey";
> > > > > > > >
> > > > > > > >
> > > > > > > > Le mercredi 17 janvier 2018 16:05:52 UTC+2, awokd a écrit :
> > > > > > > >
> > > > > > > >> On Wed, January 17, 2018 1:09 pm, ThierryIT wrote:
> > > > > > > >>
> > > > > > > >>> Nobody ?
> > > > > > > >>>
> > > > > > > >>>
> > > > > > > >>>
> > > > > > > >>> Le mercredi 17 janvier 2018 09:23:34 UTC+2, ThierryIT a écrit 
> > > > > > > >>> :
> > > > > > > >>>
> > > > > > > >>>
> > > > > > > >>>> Hi,
> > > > > > > >>>>
> > > > > > > >>>>
> > > > > > > >>>>
> > > > > > > >>>> I am going to install a new sys-usb.
> > > > > > > >>>> I have before to install all what I need to the template 
> > > > > > > >>>> (fedora-26)
> > > > > > > >>>>  first. When following your procedure:
> > > > > > > >>>>
> > > > > > > >>>>
> > > > > > > >>>> ykpers has been installed but: I cannot do the same for
> > > > > > > >>>> qubes-yubikey-vm and qubes-yubikey-dom0 :
> > > > > > > >>>>
> > > > > > > >>>> no match for argument
> > > > > > > >>>>
> > > > > > > >>>> ideas ?
> > > > > > > >>
> > > > > > > >> Not quite sure what you are trying to do here. What procedure? 
> > > > > > > >> What
> > > > > > > >> command are you entering?
> > > > > > > 
> > > > > > > Are you trying this on Qubes 4.0? Those Yubikey packages might 
> > > > > > > not be in
> > > > > > > the Qubes repo yet.
> > > > > 
> > > > > Hi,
> > > > > 
> > > > > I have not maintained this for some time. So long that I can't 
> > > > > remember if the packages had been created/tested, I don't think they 
> > > > > have.
> > > > > 
> > > > > Best is you follow the steps to build it on a new temporary VM, don't 
> > > > > be afraid it should not be too hard:
> > > > > - Execute the yum command in "Build dependancies"
> > > > > - Also install pam-devel
> > > > > - Follow the steps in preparing the build and build
> > > > > - Deploy the code in Dom0 and the USB VM.
> > > > > 
> > > > > I am about to upgrade to Qubes 4.0 rc4 (when released) so won't 
> > > > > probably be able to help until this is done.
> > > > > 
> > > > > Any help from someone who is used to packaging under Fedora would be 
> > > > > nice.
> > > > > 
> > > > > Alex
> > > 
> > > Sure, I'll update the doc and post here. However as I said don't want to 
> > > touch my Qubes set-up before my upgrade to 4.0 rc4. So might be in 
> > > 2-3weeks
> > 
> > Did you upgrade to Q4R4 ?
> 
> I'm in the process. Having issues with PCI path-through of my second NIC that 
> I need to solve. I have to use PV mode for now and not too happy to have too. 
> I'll open another thread if I can't find a way...

Hi Thierry,

I have recompiled it OK. This was working on R3.2. You can test it on R4 but no 
idea if it will work. I hope to have a bit of time to look at it this week.

To compile it if you want to test / debugInR4
create new VM with network (to get the github) or without network but you'll 
have to copy the download to the VM by another mean. Then:
yum install pam-devel gettext-devel git libtool libyubikey libyubikey-devel -y
yum group install "Development Tools"
git clone https://github.com/adubois/qubes-app-linux-yubikey.git
cd qubes-app-linux-yubikey/
libtoolize --install
autoreconf --install
./configure
make check

files to copy to Dom0 are in folder back-end
files to copy to USBVM are in folder front-end

USBVM should be a VM started on boot with the USB controller that you insert 
the key in...

Read the doc, it is not polished.
There are mechanisms to detect USBVM compromise, hold-replay attacks, etc...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a73944a1-7c80-4ad1-9235-8e43a581f195%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to