On 04/09/2018 10:56 AM, john wrote:
On 04/07/2018 03:04 PM, brendan.hoar-
There’s one more thing I just learned; by default, usb keyboards are
blocked from all VMs. You have to modify
/etc/qubes-rpc/policy/qubes.InputKeyboard to allow the Yubikey to be
connected to a specific VM if the classic yubico otp slots are
enabled...because they mimic a keyboard.
modify it how please ?
I actually have 2 yubikey versions the newer Neo, and an older OTP
version ; I'm wondering if I should also attempt to disable everything
*but OTP in the personalization tool, which I'm reticent to mess with
Today, I made the yubikey into OTP only via the Neo personalisation tool
& set qubes.InputKeyboard RPC to
$anyvm $work allow
reboot the AppVM attached the yubikey to work AppVM, however it is
still dead in the water ...
I only need OTP (I have the dom0 and fedora packages installed) , so,
I see no further leads, though I Do recall Axon Andrew mentioning
something about SALT for HID keyboards ..... I really need the yubikey
to work sigh
You received this message because you are subscribed to the Google Groups
To unsubscribe from this group and stop receiving emails from it, send an email
To post to this group, send email to firstname.lastname@example.org.
To view this discussion on the web visit
For more options, visit https://groups.google.com/d/optout.