> On 10 Feb 2018, at 17:46, ThierryIT <vmware...@gmail.com> wrote:
> 
> Le samedi 10 février 2018 01:44:36 UTC+2, Alex Dubois a écrit :
>> On Saturday, 3 February 2018 22:42:46 UTC, Alex Dubois  wrote:
>>> On Saturday, 3 February 2018 10:12:25 UTC, ThierryIT  wrote:
>>>> Le vendredi 19 janvier 2018 13:19:29 UTC+2, Alex Dubois a écrit :
>>>>>> On Friday, 19 January 2018 05:57:16 UTC, ThierryIT  wrote:
>>>>>> Not familiar with this ... Will need procediure to follow.
>>>>>> 
>>>>>> 
>>>>>> Le mercredi 17 janvier 2018 23:03:31 UTC+2, Alex Dubois a écrit :
>>>>>>> On Wednesday, 17 January 2018 15:15:45 UTC, ThierryIT  wrote:
>>>>>>>> No, I am still under R3.2
>>>>>>>> 
>>>>>>>> Le mercredi 17 janvier 2018 16:54:58 UTC+2, awokd a écrit :
>>>>>>>>> On Wed, January 17, 2018 2:09 pm, ThierryIT wrote:
>>>>>>>>>> "https://github.com/adubois/qubes-app-linux-yubikey";
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> Le mercredi 17 janvier 2018 16:05:52 UTC+2, awokd a écrit :
>>>>>>>>>> 
>>>>>>>>>>> On Wed, January 17, 2018 1:09 pm, ThierryIT wrote:
>>>>>>>>>>> 
>>>>>>>>>>>> Nobody ?
>>>>>>>>>>>> 
>>>>>>>>>>>> 
>>>>>>>>>>>> 
>>>>>>>>>>>> Le mercredi 17 janvier 2018 09:23:34 UTC+2, ThierryIT a écrit :
>>>>>>>>>>>> 
>>>>>>>>>>>> 
>>>>>>>>>>>>> Hi,
>>>>>>>>>>>>> 
>>>>>>>>>>>>> 
>>>>>>>>>>>>> 
>>>>>>>>>>>>> I am going to install a new sys-usb.
>>>>>>>>>>>>> I have before to install all what I need to the template 
>>>>>>>>>>>>> (fedora-26)
>>>>>>>>>>>>> first. When following your procedure:
>>>>>>>>>>>>> 
>>>>>>>>>>>>> 
>>>>>>>>>>>>> ykpers has been installed but: I cannot do the same for
>>>>>>>>>>>>> qubes-yubikey-vm and qubes-yubikey-dom0 :
>>>>>>>>>>>>> 
>>>>>>>>>>>>> no match for argument
>>>>>>>>>>>>> 
>>>>>>>>>>>>> ideas ?
>>>>>>>>>>> 
>>>>>>>>>>> Not quite sure what you are trying to do here. What procedure? What
>>>>>>>>>>> command are you entering?
>>>>>>>>> 
>>>>>>>>> Are you trying this on Qubes 4.0? Those Yubikey packages might not be 
>>>>>>>>> in
>>>>>>>>> the Qubes repo yet.
>>>>>>> 
>>>>>>> Hi,
>>>>>>> 
>>>>>>> I have not maintained this for some time. So long that I can't remember 
>>>>>>> if the packages had been created/tested, I don't think they have.
>>>>>>> 
>>>>>>> Best is you follow the steps to build it on a new temporary VM, don't 
>>>>>>> be afraid it should not be too hard:
>>>>>>> - Execute the yum command in "Build dependancies"
>>>>>>> - Also install pam-devel
>>>>>>> - Follow the steps in preparing the build and build
>>>>>>> - Deploy the code in Dom0 and the USB VM.
>>>>>>> 
>>>>>>> I am about to upgrade to Qubes 4.0 rc4 (when released) so won't 
>>>>>>> probably be able to help until this is done.
>>>>>>> 
>>>>>>> Any help from someone who is used to packaging under Fedora would be 
>>>>>>> nice.
>>>>>>> 
>>>>>>> Alex
>>>>> 
>>>>> Sure, I'll update the doc and post here. However as I said don't want to 
>>>>> touch my Qubes set-up before my upgrade to 4.0 rc4. So might be in 
>>>>> 2-3weeks
>>>> 
>>>> Did you upgrade to Q4R4 ?
>>> 
>>> I'm in the process. Having issues with PCI path-through of my second NIC 
>>> that I need to solve. I have to use PV mode for now and not too happy to 
>>> have too. I'll open another thread if I can't find a way...
>> 
>> Hi Thierry,
>> 
>> I have recompiled it OK. This was working on R3.2. You can test it on R4 but 
>> no idea if it will work. I hope to have a bit of time to look at it this 
>> week.
>> 
>> To compile it if you want to test / debugInR4
>> create new VM with network (to get the github) or without network but you'll 
>> have to copy the download to the VM by another mean. Then:
>> yum install pam-devel gettext-devel git libtool libyubikey libyubikey-devel 
>> -y
>> yum group install "Development Tools"
>> git clone https://github.com/adubois/qubes-app-linux-yubikey.git
>> cd qubes-app-linux-yubikey/
>> libtoolize --install
>> autoreconf --install
>> ./configure
>> make check
>> 
>> files to copy to Dom0 are in folder back-end
>> files to copy to USBVM are in folder front-end
>> 
>> USBVM should be a VM started on boot with the USB controller that you insert 
>> the key in...
>> 
>> Read the doc, it is not polished.
>> There are mechanisms to detect USBVM compromise, hold-replay attacks, etc...
> 
> Starting to do it, everything went fine, but I do not find the way when I 
> need to copy a folfder (not a file) to dom0 ...
> 
> Thx

You can compress the folder

tar czvpf QubesBack.tgz name of folder

And in dom0
tar xzvpf QubesBack.tgz

Might have some typo there...
> 
> -- 
> You received this message because you are subscribed to a topic in the Google 
> Groups "qubes-users" group.
> To unsubscribe from this topic, visit 
> https://groups.google.com/d/topic/qubes-users/BkdTuXZZnwE/unsubscribe.
> To unsubscribe from this group and all its topics, send an email to 
> qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit 
> https://groups.google.com/d/msgid/qubes-users/5cc4e21a-63ea-4a60-b3b8-540677789ec7%40googlegroups.com.
> For more options, visit https://groups.google.com/d/optout.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/E991B12B-0B1E-4013-9451-A97B3E862626%40gmail.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to