> On 10 Feb 2018, at 17:46, ThierryIT <vmware...@gmail.com> wrote: > > Le samedi 10 février 2018 01:44:36 UTC+2, Alex Dubois a écrit : >> On Saturday, 3 February 2018 22:42:46 UTC, Alex Dubois wrote: >>> On Saturday, 3 February 2018 10:12:25 UTC, ThierryIT wrote: >>>> Le vendredi 19 janvier 2018 13:19:29 UTC+2, Alex Dubois a écrit : >>>>>> On Friday, 19 January 2018 05:57:16 UTC, ThierryIT wrote: >>>>>> Not familiar with this ... Will need procediure to follow. >>>>>> >>>>>> >>>>>> Le mercredi 17 janvier 2018 23:03:31 UTC+2, Alex Dubois a écrit : >>>>>>> On Wednesday, 17 January 2018 15:15:45 UTC, ThierryIT wrote: >>>>>>>> No, I am still under R3.2 >>>>>>>> >>>>>>>> Le mercredi 17 janvier 2018 16:54:58 UTC+2, awokd a écrit : >>>>>>>>> On Wed, January 17, 2018 2:09 pm, ThierryIT wrote: >>>>>>>>>> "https://github.com/adubois/qubes-app-linux-yubikey" >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> Le mercredi 17 janvier 2018 16:05:52 UTC+2, awokd a écrit : >>>>>>>>>> >>>>>>>>>>> On Wed, January 17, 2018 1:09 pm, ThierryIT wrote: >>>>>>>>>>> >>>>>>>>>>>> Nobody ? >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> Le mercredi 17 janvier 2018 09:23:34 UTC+2, ThierryIT a écrit : >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>>> Hi, >>>>>>>>>>>>> >>>>>>>>>>>>> >>>>>>>>>>>>> >>>>>>>>>>>>> I am going to install a new sys-usb. >>>>>>>>>>>>> I have before to install all what I need to the template >>>>>>>>>>>>> (fedora-26) >>>>>>>>>>>>> first. When following your procedure: >>>>>>>>>>>>> >>>>>>>>>>>>> >>>>>>>>>>>>> ykpers has been installed but: I cannot do the same for >>>>>>>>>>>>> qubes-yubikey-vm and qubes-yubikey-dom0 : >>>>>>>>>>>>> >>>>>>>>>>>>> no match for argument >>>>>>>>>>>>> >>>>>>>>>>>>> ideas ? >>>>>>>>>>> >>>>>>>>>>> Not quite sure what you are trying to do here. What procedure? What >>>>>>>>>>> command are you entering? >>>>>>>>> >>>>>>>>> Are you trying this on Qubes 4.0? Those Yubikey packages might not be >>>>>>>>> in >>>>>>>>> the Qubes repo yet. >>>>>>> >>>>>>> Hi, >>>>>>> >>>>>>> I have not maintained this for some time. So long that I can't remember >>>>>>> if the packages had been created/tested, I don't think they have. >>>>>>> >>>>>>> Best is you follow the steps to build it on a new temporary VM, don't >>>>>>> be afraid it should not be too hard: >>>>>>> - Execute the yum command in "Build dependancies" >>>>>>> - Also install pam-devel >>>>>>> - Follow the steps in preparing the build and build >>>>>>> - Deploy the code in Dom0 and the USB VM. >>>>>>> >>>>>>> I am about to upgrade to Qubes 4.0 rc4 (when released) so won't >>>>>>> probably be able to help until this is done. >>>>>>> >>>>>>> Any help from someone who is used to packaging under Fedora would be >>>>>>> nice. >>>>>>> >>>>>>> Alex >>>>> >>>>> Sure, I'll update the doc and post here. However as I said don't want to >>>>> touch my Qubes set-up before my upgrade to 4.0 rc4. So might be in >>>>> 2-3weeks >>>> >>>> Did you upgrade to Q4R4 ? >>> >>> I'm in the process. Having issues with PCI path-through of my second NIC >>> that I need to solve. I have to use PV mode for now and not too happy to >>> have too. I'll open another thread if I can't find a way... >> >> Hi Thierry, >> >> I have recompiled it OK. This was working on R3.2. You can test it on R4 but >> no idea if it will work. I hope to have a bit of time to look at it this >> week. >> >> To compile it if you want to test / debugInR4 >> create new VM with network (to get the github) or without network but you'll >> have to copy the download to the VM by another mean. Then: >> yum install pam-devel gettext-devel git libtool libyubikey libyubikey-devel >> -y >> yum group install "Development Tools" >> git clone https://github.com/adubois/qubes-app-linux-yubikey.git >> cd qubes-app-linux-yubikey/ >> libtoolize --install >> autoreconf --install >> ./configure >> make check >> >> files to copy to Dom0 are in folder back-end >> files to copy to USBVM are in folder front-end >> >> USBVM should be a VM started on boot with the USB controller that you insert >> the key in... >> >> Read the doc, it is not polished. >> There are mechanisms to detect USBVM compromise, hold-replay attacks, etc... > > Starting to do it, everything went fine, but I do not find the way when I > need to copy a folfder (not a file) to dom0 ... > > Thx
You can compress the folder tar czvpf QubesBack.tgz name of folder And in dom0 tar xzvpf QubesBack.tgz Might have some typo there... > > -- > You received this message because you are subscribed to a topic in the Google > Groups "qubes-users" group. > To unsubscribe from this topic, visit > https://groups.google.com/d/topic/qubes-users/BkdTuXZZnwE/unsubscribe. > To unsubscribe from this group and all its topics, send an email to > qubes-users+unsubscr...@googlegroups.com. > To post to this group, send email to qubes-users@googlegroups.com. > To view this discussion on the web visit > https://groups.google.com/d/msgid/qubes-users/5cc4e21a-63ea-4a60-b3b8-540677789ec7%40googlegroups.com. > For more options, visit https://groups.google.com/d/optout. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/E991B12B-0B1E-4013-9451-A97B3E862626%40gmail.com. For more options, visit https://groups.google.com/d/optout.