[qubes-users] Re: Issues with Yubikey 4 input
On 03/15/2018 09:50 PM, ThierryIT wrote: Le vendredi 9 mars 2018 19:34:06 UTC+2, Jon R. a écrit : Hello, I've scoured around the mailing lists / SO / Reddit and haven't come across a solution to this yet. I'm running 4.0 (R4.0) and when I attempt to use my Yubikey it's seemingly not picking up any input on the button press. It's detecting the USB properly and I can attach it fine: [cloe@dom0 Desktop]$ qvm-usb BACKEND:DEVID DESCRIPTION USED BY sys-usb:2-1 Yubico_Yubikey_4_OTP+CCID [cloe@dom0 Desktop]$ qvm-usb attach work sys-usb:2-1 [cloe@dom0 Desktop]$ qvm-usb BACKEND:DEVID DESCRIPTION USED BY sys-usb:2-1 Yubico_Yubikey_4_OTP+CCID work However upon button presses on the Yubikey in the "work" domain there is no action. I've tested this in gedit, the terminal and elsewhere to no avail. Can someone point me in the right direction as to what may be happening? I've successfully attached storage devices and other smart card related devices without any issue so it seems to be isolated to the Yubikey itself. I've tried 2 separate Yubikey 4's and an older version to no avail. Thank you for your time. - Cody I had the same problem than yours ... I was able, after a looong period of fight, to attached my Yubikey but it was not working ... I have found that it was not working with Firefox but only with Chrome ... I am only using mu Yubikey to manage my PGP kys and to be authenticated on web site like Github ... Thx -- ThierryIT Feb 27 Translate message to English - show quoted text - Hi, The problem was a mix of Fedora-26 template between my old R3.2 and the R4.4. When installed the right package version of "qubes-core-agent" who should be: 4.0.23, I am able to attached the Yubikey. Nothing more has to be done. Thx anyway for your full support. Thx -- How do I check my qubes-core-agent and/or make sure it is 4.0.23 please ? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/4a9d9a0a-4942-cecc-2bfc-88bdca3a5651%40riseup.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Issues with Yubikey 4 input
On 04/09/2018 10:56 AM, john wrote: On 04/07/2018 03:04 PM, brendan.hoar- There’s one more thing I just learned; by default, usb keyboards are blocked from all VMs. You have to modify /etc/qubes-rpc/policy/qubes.InputKeyboard to allow the Yubikey to be connected to a specific VM if the classic yubico otp slots are enabled...because they mimic a keyboard. modify it how please ? I actually have 2 yubikey versions the newer Neo, and an older OTP version ; I'm wondering if I should also attempt to disable everything *but OTP in the personalization tool, which I'm reticent to mess with Today, I made the yubikey into OTP only via the Neo personalisation tool & set qubes.InputKeyboard RPC to $anyvm $work allow reboot the AppVM attached the yubikey to work AppVM, however it is still dead in the water ... I only need OTP (I have the dom0 and fedora packages installed) , so, I see no further leads, though I Do recall Axon Andrew mentioning something about SALT for HID keyboards . I really need the yubikey to work sigh -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8196de40-fec3-35d3-c898-2d42aa5a4b95%40riseup.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Issues with Yubikey 4 input
On 04/07/2018 03:04 PM, brendan.hoar- There’s one more thing I just learned; by default, usb keyboards are blocked from all VMs. You have to modify /etc/qubes-rpc/policy/qubes.InputKeyboard to allow the Yubikey to be connected to a specific VM if the classic yubico otp slots are enabled...because they mimic a keyboard. modify it how please ? I actually have 2 yubikey versions the newer Neo, and an older OTP version ; I'm wondering if I should also attempt to disable everything *but OTP in the personalization tool, which I'm reticent to mess with -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/97fd9bb9-5f42-aacd-6dc6-b41df66ce63e%40riseup.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Issues with Yubikey 4 input
There’s one more thing I just learned; by default, usb keyboards are blocked from all VMs. You have to modify /etc/qubes-rpc/policy/qubes.InputKeyboard to allow the Yubikey to be connected to a specific VM if the classic yubico otp slots are enabled...because they mimic a keyboard. Brendan -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/67d6ca72-c437-4f64-9b0b-5514c3a1958c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Issues with Yubikey 4 input
On 03/15/2018 09:50 PM, ThierryIT wrote: Le vendredi 9 mars 2018 19:34:06 UTC+2, Jon R. a écrit : Hello, I've scoured around the mailing lists / SO / Reddit and haven't come across a solution to this yet. I'm running 4.0 (R4.0) and when I attempt to use my Yubikey it's seemingly not picking up any input on the button press. It's detecting the USB properly and I can attach it fine: [cloe@dom0 Desktop]$ qvm-usb BACKEND:DEVID DESCRIPTION USED BY sys-usb:2-1 Yubico_Yubikey_4_OTP+CCID [cloe@dom0 Desktop]$ qvm-usb attach work sys-usb:2-1 [cloe@dom0 Desktop]$ qvm-usb BACKEND:DEVID DESCRIPTION USED BY sys-usb:2-1 Yubico_Yubikey_4_OTP+CCID work However upon button presses on the Yubikey in the "work" domain there is no action. I've tested this in gedit, the terminal and elsewhere to no avail. Can someone point me in the right direction as to what may be happening? I've successfully attached storage devices and other smart card related devices without any issue so it seems to be isolated to the Yubikey itself. I've tried 2 separate Yubikey 4's and an older version to no avail. Thank you for your time. - Cody I had the same problem than yours ... I was able, after a looong period of fight, to attached my Yubikey but it was not working ... I have found that it was not working with Firefox but only with Chrome ... I am only using mu Yubikey to manage my PGP kys and to be authenticated on web site like Github ... Thx By "Chrome" did you mean "chromium" or only "Chrome" , if so be curious how you installed "Chrome", as I recall, Chrome was supposed to built in U2F for gmail 2FAuth ; however FFox never has, and there is/was probably a defunct "extension" for the U2F. Personally, I am needing urgently to have HOTP / OTP to work for my lastpass password manager. The latest is I've installed new Yubikey packages in Fedora-26 and Dom0 and tried attaching the key and the other USB "biometric" thing via the widget (in 4.0) both individually and together, to no avail. I'm wondering if this might have something to do with Yubikey's design of actually mimic'ing a keyboard PS: Thisisn't just with the " Yubikey 4 "(I don't have that key...& as another poster posted in this thread), I have 2 of the earlier Yubi keys the Neo and another earlier one -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fc560462-d198-0dc2-1880-f5dbe3449da0%40riseup.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Issues with Yubikey 4 input
> I have found that it was not working with Firefox but only with Chrome ... I am only using mu Yubikey to manage my PGP kys and to be authenticated on web site like Github ... Thanks for the information. My issue seems to be related to the USB passthru / sys-usb. I haven't had time to debug it further but I can't even get the OTP / smart card functionality to be produced outside of the sys-usb Qube. Once I scour the mailing list / GitHub issues I'll update here if I find anything pertinent. Cheers! On Fri, Mar 16, 2018 at 3:50 AM, ThierryIT wrote: > Le vendredi 9 mars 2018 19:34:06 UTC+2, Jon R. a écrit : > > Hello, > > > > I've scoured around the mailing lists / SO / Reddit and haven't come > across a solution to this yet. I'm running 4.0 (R4.0) and when I attempt to > use my Yubikey it's seemingly not picking up any input on the button press. > > > > It's detecting the USB properly and I can attach it fine: > > > > [cloe@dom0 Desktop]$ qvm-usb > > BACKEND:DEVID DESCRIPTION USED BY > > sys-usb:2-1Yubico_Yubikey_4_OTP+CCID > > > > [cloe@dom0 Desktop]$ qvm-usb attach work sys-usb:2-1 > > > > [cloe@dom0 Desktop]$ qvm-usb > > BACKEND:DEVID DESCRIPTION USED BY > > sys-usb:2-1Yubico_Yubikey_4_OTP+CCID work > > > > However upon button presses on the Yubikey in the "work" domain there is > no action. I've tested this in gedit, the terminal and elsewhere to no > avail. > > > > > > Can someone point me in the right direction as to what may be happening? > I've successfully attached storage devices and other smart card related > devices without any issue so it seems to be isolated to the Yubikey itself. > I've tried 2 separate Yubikey 4's and an older version to no avail. > > > > > > Thank you for your time. > > > > > > - Cody > > I had the same problem than yours ... > I was able, after a looong period of fight, to attached my Yubikey but it > was not working ... > I have found that it was not working with Firefox but only with Chrome ... > I am only using mu Yubikey to manage my PGP kys and to be authenticated on > web site like Github ... > > Thx > > -- > You received this message because you are subscribed to the Google Groups > "qubes-users" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to qubes-users+unsubscr...@googlegroups.com. > To post to this group, send email to qubes-users@googlegroups.com. > To view this discussion on the web visit https://groups.google.com/d/ > msgid/qubes-users/bc3da3a6-2568-40ac-b018-beb6facfb1fa%40googlegroups.com. > For more options, visit https://groups.google.com/d/optout. > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAJd29SSUPDpjRw07TrEt0q2juN34x_1jSBY3PaHtJ71NF7DjvQ%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Issues with Yubikey 4 input
Le vendredi 9 mars 2018 19:34:06 UTC+2, Jon R. a écrit : > Hello, > > I've scoured around the mailing lists / SO / Reddit and haven't come across a > solution to this yet. I'm running 4.0 (R4.0) and when I attempt to use my > Yubikey it's seemingly not picking up any input on the button press. > > It's detecting the USB properly and I can attach it fine: > > [cloe@dom0 Desktop]$ qvm-usb > BACKEND:DEVID DESCRIPTION USED BY > sys-usb:2-1 Yubico_Yubikey_4_OTP+CCID > > [cloe@dom0 Desktop]$ qvm-usb attach work sys-usb:2-1 > > [cloe@dom0 Desktop]$ qvm-usb > BACKEND:DEVID DESCRIPTION USED BY > sys-usb:2-1 Yubico_Yubikey_4_OTP+CCID work > > However upon button presses on the Yubikey in the "work" domain there is no > action. I've tested this in gedit, the terminal and elsewhere to no avail. > > > Can someone point me in the right direction as to what may be happening? I've > successfully attached storage devices and other smart card related devices > without any issue so it seems to be isolated to the Yubikey itself. I've > tried 2 separate Yubikey 4's and an older version to no avail. > > > Thank you for your time. > > > - Cody I had the same problem than yours ... I was able, after a looong period of fight, to attached my Yubikey but it was not working ... I have found that it was not working with Firefox but only with Chrome ... I am only using mu Yubikey to manage my PGP kys and to be authenticated on web site like Github ... Thx -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/bc3da3a6-2568-40ac-b018-beb6facfb1fa%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Issues with Yubikey 4 input
On Saturday, March 10, 2018 at 3:05:09 AM UTC+1, Jon R. wrote: > 1. Find a free USB controller. I didn't want to use the same one as my > keyboard or mouse. Your board specs and the lsusb utility are your > friends in the hunt. Check out the Qubes document "Assigning Devices to > VMs" for the gory details of discovering the PCI device assignments to > your USB controllers. > > 2. In the VM you plan to use the key, you'll want to assign the PCI > device for your free hub to that VM. That's accomplished by firing up > Qube settings for the VM and selecting the devices tab. Scroll down to > the available device and move it to the selected box. > > 3. You might have to configure strict reset (or disable strict reset) for > the USB controller. > > 4. Start the VM. > > > > One gotcha: the VM won't run in PVH mode once you make this > assignment. But, my Yubikey lights up when Gmail or Facebook need the > second factor, and it works as advertised. > > > > > It > looks like when in the sys-usb Qube the Yubikey works as intended. When > attaching it to another Qube it's listed under lsusb properly and > lights up accordingly however when using it there is no output (to > stdout / wherever). I'm not quite sure how to debug this further so if > someone could shed some light in that regard that'd be great. > > > In the interim I'll use a solution similar to yours and just juggle the USB > controller to different Qubes as needed (ick!). > > > Thanks for the information! > > > > > On Fri, Mar 9, 2018 at 4:13 PM, William Bormann wrote: > I have a FIDO U2F Yubico Security Key that I use for authentication to Gmail > and Facebook. In my situation, I decided to use a single VM for two factor > authentication. Here's what I did: > > > > 1. Find a free USB controller. I didn't want to use the same one as my > keyboard or mouse. Your board specs and the lsusb utility are your friends > in the hunt. Check out the Qubes document "Assigning Devices to VMs" for the > gory details of discovering the PCI device assignments to your USB > controllers. > > 2. In the VM you plan to use the key, you'll want to assign the PCI device > for your free hub to that VM. That's accomplished by firing up Qube settings > for the VM and selecting the devices tab. Scroll down to the available > device and move it to the selected box. > > 3. You might have to configure strict reset (or disable strict reset) for > the USB controller. > > 4. Start the VM. > > > > One gotcha: the VM won't run in PVH mode once you make this assignment. > But, my Yubikey lights up when Gmail or Facebook need the second factor, and > it works as advertised. > > > > > > On Friday, March 9, 2018 at 12:34:06 PM UTC-5, Jon R. wrote: > > > Hello, > > > > > > I've scoured around the mailing lists / SO / Reddit and haven't come across > > a solution to this yet. I'm running 4.0 (R4.0) and when I attempt to use my > > Yubikey it's seemingly not picking up any input on the button press. > > > > > > It's detecting the USB properly and I can attach it fine: > > > > > > [cloe@dom0 Desktop]$ qvm-usb > > > BACKEND:DEVID DESCRIPTION USED BY > > > sys-usb:2-1 Yubico_Yubikey_4_OTP+CCID > > > > > > [cloe@dom0 Desktop]$ qvm-usb attach work sys-usb:2-1 > > > > > > [cloe@dom0 Desktop]$ qvm-usb > > > BACKEND:DEVID DESCRIPTION USED BY > > > sys-usb:2-1 Yubico_Yubikey_4_OTP+CCID work > > > > > > However upon button presses on the Yubikey in the "work" domain there is no > > action. I've tested this in gedit, the terminal and elsewhere to no avail. > > > > > > > > > Can someone point me in the right direction as to what may be happening? > > I've successfully attached storage devices and other smart card related > > devices without any issue so it seems to be isolated to the Yubikey itself. > > I've tried 2 separate Yubikey 4's and an older version to no avail. > > > > > > > > > Thank you for your time. > > > > > > > > > - Cody > > > > -- > > You received this message because you are subscribed to the Google Groups > "qubes-users" group. > > To unsubscribe from this group and stop receiving emails from it, send an > email to qubes-users...@googlegroups.com. > > To post to this group, send email to qubes...@googlegroups.com. > > To view this discussion on the web visit > https://groups.google.com/d/msgid/qubes-users/7e00edc7-3c2a-462e-98c6-443dd1af7d36%40googlegroups.com. > > For more options, visit https://groups.google.com/d/optout. I believe it could possibly be a qvm-usb bug, there appears to be some of those lately which needs fixing, so it might just be a question of waiting. If you want to speed that up, then you can do a search on github to double-check for existing open/closed issues, if there are none already posted for this issue, then you can post it there
Re: [qubes-users] Re: Issues with Yubikey 4 input
> 1. Find a free USB controller. I didn't want to use the same one as my > keyboard or mouse. Your board specs and the lsusb utility are your friends > in the hunt. Check out the Qubes document "Assigning Devices to VMs" for > the gory details of discovering the PCI device assignments to your USB > controllers. > 2. In the VM you plan to use the key, you'll want to assign the PCI > device for your free hub to that VM. That's accomplished by firing up Qube > settings for the VM and selecting the devices tab. Scroll down to the > available device and move it to the selected box. > 3. You might have to configure strict reset (or disable strict reset) for > the USB controller. > 4. Start the VM. > > One gotcha: the VM won't run in PVH mode once you make this assignment. > But, my Yubikey lights up when Gmail or Facebook need the second factor, > and it works as advertised. > > It looks like when in the sys-usb Qube the Yubikey works as intended. When attaching it to another Qube it's listed under lsusb properly and lights up accordingly however when using it there is no output (to stdout / wherever). I'm not quite sure how to debug this further so if someone could shed some light in that regard that'd be great. In the interim I'll use a solution similar to yours and just juggle the USB controller to different Qubes as needed (ick!). Thanks for the information! On Fri, Mar 9, 2018 at 4:13 PM, William Bormann wrote: > I have a FIDO U2F Yubico Security Key that I use for authentication to > Gmail and Facebook. In my situation, I decided to use a single VM for two > factor authentication. Here's what I did: > > 1. Find a free USB controller. I didn't want to use the same one as my > keyboard or mouse. Your board specs and the lsusb utility are your friends > in the hunt. Check out the Qubes document "Assigning Devices to VMs" for > the gory details of discovering the PCI device assignments to your USB > controllers. > 2. In the VM you plan to use the key, you'll want to assign the PCI > device for your free hub to that VM. That's accomplished by firing up Qube > settings for the VM and selecting the devices tab. Scroll down to the > available device and move it to the selected box. > 3. You might have to configure strict reset (or disable strict reset) for > the USB controller. > 4. Start the VM. > > One gotcha: the VM won't run in PVH mode once you make this assignment. > But, my Yubikey lights up when Gmail or Facebook need the second factor, > and it works as advertised. > > On Friday, March 9, 2018 at 12:34:06 PM UTC-5, Jon R. wrote: > > Hello, > > > > I've scoured around the mailing lists / SO / Reddit and haven't come > across a solution to this yet. I'm running 4.0 (R4.0) and when I attempt to > use my Yubikey it's seemingly not picking up any input on the button press. > > > > It's detecting the USB properly and I can attach it fine: > > > > [cloe@dom0 Desktop]$ qvm-usb > > BACKEND:DEVID DESCRIPTION USED BY > > sys-usb:2-1Yubico_Yubikey_4_OTP+CCID > > > > [cloe@dom0 Desktop]$ qvm-usb attach work sys-usb:2-1 > > > > [cloe@dom0 Desktop]$ qvm-usb > > BACKEND:DEVID DESCRIPTION USED BY > > sys-usb:2-1Yubico_Yubikey_4_OTP+CCID work > > > > However upon button presses on the Yubikey in the "work" domain there is > no action. I've tested this in gedit, the terminal and elsewhere to no > avail. > > > > > > Can someone point me in the right direction as to what may be happening? > I've successfully attached storage devices and other smart card related > devices without any issue so it seems to be isolated to the Yubikey itself. > I've tried 2 separate Yubikey 4's and an older version to no avail. > > > > > > Thank you for your time. > > > > > > - Cody > > -- > You received this message because you are subscribed to the Google Groups > "qubes-users" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to qubes-users+unsubscr...@googlegroups.com. > To post to this group, send email to qubes-users@googlegroups.com. > To view this discussion on the web visit https://groups.google.com/d/ > msgid/qubes-users/7e00edc7-3c2a-462e-98c6-443dd1af7d36%40googlegroups.com. > For more options, visit https://groups.google.com/d/optout. > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAJd29SSKf%3DY9CygxG7W6bQXh%3DxomyS76wZchVi0k8%2ByeY7rmzg%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Issues with Yubikey 4 input
I have a FIDO U2F Yubico Security Key that I use for authentication to Gmail and Facebook. In my situation, I decided to use a single VM for two factor authentication. Here's what I did: 1. Find a free USB controller. I didn't want to use the same one as my keyboard or mouse. Your board specs and the lsusb utility are your friends in the hunt. Check out the Qubes document "Assigning Devices to VMs" for the gory details of discovering the PCI device assignments to your USB controllers. 2. In the VM you plan to use the key, you'll want to assign the PCI device for your free hub to that VM. That's accomplished by firing up Qube settings for the VM and selecting the devices tab. Scroll down to the available device and move it to the selected box. 3. You might have to configure strict reset (or disable strict reset) for the USB controller. 4. Start the VM. One gotcha: the VM won't run in PVH mode once you make this assignment. But, my Yubikey lights up when Gmail or Facebook need the second factor, and it works as advertised. On Friday, March 9, 2018 at 12:34:06 PM UTC-5, Jon R. wrote: > Hello, > > I've scoured around the mailing lists / SO / Reddit and haven't come across a > solution to this yet. I'm running 4.0 (R4.0) and when I attempt to use my > Yubikey it's seemingly not picking up any input on the button press. > > It's detecting the USB properly and I can attach it fine: > > [cloe@dom0 Desktop]$ qvm-usb > BACKEND:DEVID DESCRIPTION USED BY > sys-usb:2-1 Yubico_Yubikey_4_OTP+CCID > > [cloe@dom0 Desktop]$ qvm-usb attach work sys-usb:2-1 > > [cloe@dom0 Desktop]$ qvm-usb > BACKEND:DEVID DESCRIPTION USED BY > sys-usb:2-1 Yubico_Yubikey_4_OTP+CCID work > > However upon button presses on the Yubikey in the "work" domain there is no > action. I've tested this in gedit, the terminal and elsewhere to no avail. > > > Can someone point me in the right direction as to what may be happening? I've > successfully attached storage devices and other smart card related devices > without any issue so it seems to be isolated to the Yubikey itself. I've > tried 2 separate Yubikey 4's and an older version to no avail. > > > Thank you for your time. > > > - Cody -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7e00edc7-3c2a-462e-98c6-443dd1af7d36%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.