[qubes-users] Re: Issues with Yubikey 4 input

2018-04-10 Thread john

On 03/15/2018 09:50 PM, ThierryIT wrote:

Le vendredi 9 mars 2018 19:34:06 UTC+2, Jon R. a écrit :

Hello,

I've scoured around the mailing lists / SO / Reddit and haven't come across a 
solution to this yet. I'm running 4.0 (R4.0) and when I attempt to use my 
Yubikey it's seemingly not picking up any input on the button press.

It's detecting the USB properly and I can attach it fine:

[cloe@dom0 Desktop]$ qvm-usb
BACKEND:DEVID  DESCRIPTION USED BY
sys-usb:2-1    Yubico_Yubikey_4_OTP+CCID

[cloe@dom0 Desktop]$ qvm-usb attach work sys-usb:2-1

[cloe@dom0 Desktop]$ qvm-usb
BACKEND:DEVID  DESCRIPTION USED BY
sys-usb:2-1    Yubico_Yubikey_4_OTP+CCID   work

However upon button presses on the Yubikey in the "work" domain there is no 
action. I've tested this in gedit, the terminal and elsewhere to no avail.


Can someone point me in the right direction as to what may be happening? I've 
successfully attached storage devices and other smart card related devices 
without any issue so it seems to be isolated to the Yubikey itself. I've tried 
2 separate Yubikey 4's and an older version to no avail.


Thank you for your time.


- Cody


I had the same problem than yours ...
I was able, after a looong period of fight, to attached my Yubikey but it was 
not working ...
I have found that it was not working with Firefox but only with Chrome ... I am 
only using mu Yubikey to manage my PGP kys and to be authenticated on web site 
like Github ...

Thx




--
ThierryIT   
Feb 27
Translate message to English
- show quoted text -
Hi,

The problem was a mix of Fedora-26 template between my old R3.2 and the 
R4.4.
When installed the right package version of "qubes-core-agent" who 
should be: 4.0.23, I am able to attached the Yubikey. Nothing more has 
to be done.

Thx anyway for your full support.
Thx
--


How do I check my qubes-core-agent  and/or  make sure it is 4.0.23 
please ?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4a9d9a0a-4942-cecc-2bfc-88bdca3a5651%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Issues with Yubikey 4 input

2018-04-10 Thread john

On 04/09/2018 10:56 AM, john wrote:

On 04/07/2018 03:04 PM, brendan.hoar-
There’s one more thing I just learned; by default, usb keyboards are 
blocked from all VMs. You have to modify 
/etc/qubes-rpc/policy/qubes.InputKeyboard to allow the Yubikey to be 
connected to a specific VM if the classic yubico otp slots are 
enabled...because they mimic a keyboard.


modify it how please ?


I actually have 2 yubikey versions  the newer Neo, and an older OTP 
version ; I'm wondering if I should also attempt to disable everything 
*but OTP  in the personalization tool,  which I'm reticent to mess with




Today, I made the yubikey into OTP only via the Neo personalisation tool 
& set qubes.InputKeyboard RPC to

$anyvm $work allow

reboot the AppVM attached the yubikey to work AppVM,  however it is 
still dead in the water ...


I only need OTP  (I have the dom0 and fedora packages installed) ,  so, 
I see no further leads,  though I Do  recall  Axon Andrew mentioning 
something about  SALT for  HID keyboards . I really need the yubikey 
to work   sigh


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8196de40-fec3-35d3-c898-2d42aa5a4b95%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Issues with Yubikey 4 input

2018-04-09 Thread john

On 04/07/2018 03:04 PM, brendan.hoar-

There’s one more thing I just learned; by default, usb keyboards are blocked 
from all VMs. You have to modify /etc/qubes-rpc/policy/qubes.InputKeyboard to 
allow the Yubikey to be connected to a specific VM if the classic yubico otp 
slots are enabled...because they mimic a keyboard.


modify it how please ?


I actually have 2 yubikey versions  the newer Neo, and an older OTP 
version ; I'm wondering if I should also attempt to disable everything 
*but OTP  in the personalization tool,  which I'm reticent to mess with


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/97fd9bb9-5f42-aacd-6dc6-b41df66ce63e%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Issues with Yubikey 4 input

2018-04-07 Thread brendan . hoar
There’s one more thing I just learned; by default, usb keyboards are blocked 
from all VMs. You have to modify /etc/qubes-rpc/policy/qubes.InputKeyboard to 
allow the Yubikey to be connected to a specific VM if the classic yubico otp 
slots are enabled...because they mimic a keyboard.

Brendan

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/67d6ca72-c437-4f64-9b0b-5514c3a1958c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Issues with Yubikey 4 input

2018-04-07 Thread john

On 03/15/2018 09:50 PM, ThierryIT wrote:

Le vendredi 9 mars 2018 19:34:06 UTC+2, Jon R. a écrit :

Hello,

I've scoured around the mailing lists / SO / Reddit and haven't come across a 
solution to this yet. I'm running 4.0 (R4.0) and when I attempt to use my 
Yubikey it's seemingly not picking up any input on the button press.

It's detecting the USB properly and I can attach it fine:

[cloe@dom0 Desktop]$ qvm-usb
BACKEND:DEVID  DESCRIPTION USED BY
sys-usb:2-1    Yubico_Yubikey_4_OTP+CCID

[cloe@dom0 Desktop]$ qvm-usb attach work sys-usb:2-1

[cloe@dom0 Desktop]$ qvm-usb
BACKEND:DEVID  DESCRIPTION USED BY
sys-usb:2-1    Yubico_Yubikey_4_OTP+CCID   work

However upon button presses on the Yubikey in the "work" domain there is no 
action. I've tested this in gedit, the terminal and elsewhere to no avail.


Can someone point me in the right direction as to what may be happening? I've 
successfully attached storage devices and other smart card related devices 
without any issue so it seems to be isolated to the Yubikey itself. I've tried 
2 separate Yubikey 4's and an older version to no avail.


Thank you for your time.


- Cody


I had the same problem than yours ...
I was able, after a looong period of fight, to attached my Yubikey but it was 
not working ...
I have found that it was not working with Firefox but only with Chrome ... I am 
only using mu Yubikey to manage my PGP kys and to be authenticated on web site 
like Github ...

Thx



By "Chrome" did you mean "chromium" or only "Chrome"  , if so be curious 
how you installed "Chrome",  as I recall, Chrome was supposed to built 
in U2F  for gmail 2FAuth ; however FFox never has, and there is/was 
probably a defunct "extension" for the U2F.


Personally, I am needing urgently to have HOTP / OTP to work for my 
lastpass password manager.


The latest is I've installed new Yubikey packages in Fedora-26 and Dom0 
and tried attaching the key  and the other  USB  "biometric" thing via 
the widget (in 4.0) both  individually and together, to no avail.


I'm wondering if this might have something to do with Yubikey's design 
of actually mimic'ing  a keyboard


PS: Thisisn't just with  the " Yubikey 4 "(I don't have that 
key...& as another poster posted in this thread),  I have 2 of the 
earlier Yubi keys  the Neo and another earlier one



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fc560462-d198-0dc2-1880-f5dbe3449da0%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Issues with Yubikey 4 input

2018-03-16 Thread Jon R.
> I have found that it was not working with Firefox but only with Chrome
... I am only using mu Yubikey to manage my PGP kys and to be authenticated
on web site like Github ...

Thanks for the information. My issue seems to be related to the USB
passthru / sys-usb. I haven't had time to debug it further but I can't even
get the OTP / smart card functionality to be produced outside of the
sys-usb Qube. Once I scour the mailing list / GitHub issues I'll update
here if I find anything pertinent.

Cheers!

On Fri, Mar 16, 2018 at 3:50 AM, ThierryIT  wrote:

> Le vendredi 9 mars 2018 19:34:06 UTC+2, Jon R. a écrit :
> > Hello,
> >
> > I've scoured around the mailing lists / SO / Reddit and haven't come
> across a solution to this yet. I'm running 4.0 (R4.0) and when I attempt to
> use my Yubikey it's seemingly not picking up any input on the button press.
> >
> > It's detecting the USB properly and I can attach it fine:
> >
> > [cloe@dom0 Desktop]$ qvm-usb
> > BACKEND:DEVID  DESCRIPTION USED BY
> > sys-usb:2-1Yubico_Yubikey_4_OTP+CCID
> >
> > [cloe@dom0 Desktop]$ qvm-usb attach work sys-usb:2-1
> >
> > [cloe@dom0 Desktop]$ qvm-usb
> > BACKEND:DEVID  DESCRIPTION USED BY
> > sys-usb:2-1Yubico_Yubikey_4_OTP+CCID   work
> >
> > However upon button presses on the Yubikey in the "work" domain there is
> no action. I've tested this in gedit, the terminal and elsewhere to no
> avail.
> >
> >
> > Can someone point me in the right direction as to what may be happening?
> I've successfully attached storage devices and other smart card related
> devices without any issue so it seems to be isolated to the Yubikey itself.
> I've tried 2 separate Yubikey 4's and an older version to no avail.
> >
> >
> > Thank you for your time.
> >
> >
> > - Cody
>
> I had the same problem than yours ...
> I was able, after a looong period of fight, to attached my Yubikey but it
> was not working ...
> I have found that it was not working with Firefox but only with Chrome ...
> I am only using mu Yubikey to manage my PGP kys and to be authenticated on
> web site like Github ...
>
> Thx
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/
> msgid/qubes-users/bc3da3a6-2568-40ac-b018-beb6facfb1fa%40googlegroups.com.
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJd29SSUPDpjRw07TrEt0q2juN34x_1jSBY3PaHtJ71NF7DjvQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Issues with Yubikey 4 input

2018-03-16 Thread ThierryIT
Le vendredi 9 mars 2018 19:34:06 UTC+2, Jon R. a écrit :
> Hello,
> 
> I've scoured around the mailing lists / SO / Reddit and haven't come across a 
> solution to this yet. I'm running 4.0 (R4.0) and when I attempt to use my 
> Yubikey it's seemingly not picking up any input on the button press.
> 
> It's detecting the USB properly and I can attach it fine:
> 
> [cloe@dom0 Desktop]$ qvm-usb
> BACKEND:DEVID  DESCRIPTION USED BY
> sys-usb:2-1    Yubico_Yubikey_4_OTP+CCID
> 
> [cloe@dom0 Desktop]$ qvm-usb attach work sys-usb:2-1
> 
> [cloe@dom0 Desktop]$ qvm-usb
> BACKEND:DEVID  DESCRIPTION USED BY
> sys-usb:2-1    Yubico_Yubikey_4_OTP+CCID   work
> 
> However upon button presses on the Yubikey in the "work" domain there is no 
> action. I've tested this in gedit, the terminal and elsewhere to no avail. 
> 
> 
> Can someone point me in the right direction as to what may be happening? I've 
> successfully attached storage devices and other smart card related devices 
> without any issue so it seems to be isolated to the Yubikey itself. I've 
> tried 2 separate Yubikey 4's and an older version to no avail.
> 
> 
> Thank you for your time.
> 
> 
> - Cody

I had the same problem than yours ...
I was able, after a looong period of fight, to attached my Yubikey but it was 
not working ...
I have found that it was not working with Firefox but only with Chrome ... I am 
only using mu Yubikey to manage my PGP kys and to be authenticated on web site 
like Github ... 

Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bc3da3a6-2568-40ac-b018-beb6facfb1fa%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Issues with Yubikey 4 input

2018-03-09 Thread Yuraeitha
On Saturday, March 10, 2018 at 3:05:09 AM UTC+1, Jon R. wrote:
> 1.  Find a free USB controller.  I didn't want to use the same one as my
>  keyboard or mouse.  Your board specs and the lsusb utility are your 
> friends in the hunt.  Check out the Qubes document "Assigning Devices to
>  VMs" for the gory details of discovering the PCI device assignments to 
> your USB controllers.
> 
> 2.  In the VM you plan to use the key, you'll want to assign the PCI 
> device for your free hub to that VM.  That's accomplished by firing up 
> Qube settings for the VM and selecting the devices tab.  Scroll down to 
> the available device and move it to the selected box.
> 
> 3.  You might have to configure strict reset (or disable strict reset) for 
> the USB controller.
> 
> 4.  Start the VM.
> 
> 
> 
> One gotcha:  the VM won't run in PVH mode once you make this 
> assignment.  But, my Yubikey lights up when Gmail or Facebook need the 
> second factor, and it works as advertised.
> 
> 
> 
> 
> It
>  looks like when in the sys-usb Qube the Yubikey works as intended. When
>  attaching it to another Qube it's listed under lsusb properly and 
> lights up accordingly however when using it there is no output (to 
> stdout / wherever). I'm not quite sure how to debug this further so if 
> someone could shed some light in that regard that'd be great.
> 
> 
> In the interim I'll use a solution similar to yours and just juggle the USB 
> controller to different Qubes as needed (ick!).
> 
> 
> Thanks for the information!
> 
> 
> 
> 
> On Fri, Mar 9, 2018 at 4:13 PM, William Bormann  wrote:
> I have a FIDO U2F Yubico Security Key that I use for authentication to Gmail 
> and Facebook.  In my situation, I decided to use a single VM for two factor 
> authentication.  Here's what I did:
> 
> 
> 
> 1.  Find a free USB controller.  I didn't want to use the same one as my 
> keyboard or mouse.  Your board specs and the lsusb utility are your friends 
> in the hunt.  Check out the Qubes document "Assigning Devices to VMs" for the 
> gory details of discovering the PCI device assignments to your USB 
> controllers.
> 
> 2.  In the VM you plan to use the key, you'll want to assign the PCI device 
> for your free hub to that VM.  That's accomplished by firing up Qube settings 
> for the VM and selecting the devices tab.  Scroll down to the available 
> device and move it to the selected box.
> 
> 3.  You might have to configure strict reset (or disable strict reset) for 
> the USB controller.
> 
> 4.  Start the VM.
> 
> 
> 
> One gotcha:  the VM won't run in PVH mode once you make this assignment.  
> But, my Yubikey lights up when Gmail or Facebook need the second factor, and 
> it works as advertised.
> 
> 
> 
> 
> 
> On Friday, March 9, 2018 at 12:34:06 PM UTC-5, Jon R. wrote:
> 
> > Hello,
> 
> >
> 
> > I've scoured around the mailing lists / SO / Reddit and haven't come across 
> > a solution to this yet. I'm running 4.0 (R4.0) and when I attempt to use my 
> > Yubikey it's seemingly not picking up any input on the button press.
> 
> >
> 
> > It's detecting the USB properly and I can attach it fine:
> 
> >
> 
> > [cloe@dom0 Desktop]$ qvm-usb
> 
> > BACKEND:DEVID  DESCRIPTION USED BY
> 
> > sys-usb:2-1    Yubico_Yubikey_4_OTP+CCID
> 
> >
> 
> > [cloe@dom0 Desktop]$ qvm-usb attach work sys-usb:2-1
> 
> >
> 
> > [cloe@dom0 Desktop]$ qvm-usb
> 
> > BACKEND:DEVID  DESCRIPTION USED BY
> 
> > sys-usb:2-1    Yubico_Yubikey_4_OTP+CCID   work
> 
> >
> 
> > However upon button presses on the Yubikey in the "work" domain there is no 
> > action. I've tested this in gedit, the terminal and elsewhere to no avail.
> 
> >
> 
> >
> 
> > Can someone point me in the right direction as to what may be happening? 
> > I've successfully attached storage devices and other smart card related 
> > devices without any issue so it seems to be isolated to the Yubikey itself. 
> > I've tried 2 separate Yubikey 4's and an older version to no avail.
> 
> >
> 
> >
> 
> > Thank you for your time.
> 
> >
> 
> >
> 
> > - Cody
> 
> 
> 
> --
> 
> You received this message because you are subscribed to the Google Groups 
> "qubes-users" group.
> 
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to qubes-users...@googlegroups.com.
> 
> To post to this group, send email to qubes...@googlegroups.com.
> 
> To view this discussion on the web visit 
> https://groups.google.com/d/msgid/qubes-users/7e00edc7-3c2a-462e-98c6-443dd1af7d36%40googlegroups.com.
> 
> For more options, visit https://groups.google.com/d/optout.

I believe it could possibly be a qvm-usb bug, there appears to be some of those 
lately which needs fixing, so it might just be a question of waiting. If you 
want to speed that up, then you can do a search on github to double-check for 
existing open/closed issues, if there are none already posted for this issue, 
then you can post it there

Re: [qubes-users] Re: Issues with Yubikey 4 input

2018-03-09 Thread Jon R.
> 1.  Find a free USB controller.  I didn't want to use the same one as my
> keyboard or mouse.  Your board specs and the lsusb utility are your friends
> in the hunt.  Check out the Qubes document "Assigning Devices to VMs" for
> the gory details of discovering the PCI device assignments to your USB
> controllers.
> 2.  In the VM you plan to use the key, you'll want to assign the PCI
> device for your free hub to that VM.  That's accomplished by firing up Qube
> settings for the VM and selecting the devices tab.  Scroll down to the
> available device and move it to the selected box.
> 3.  You might have to configure strict reset (or disable strict reset) for
> the USB controller.
> 4.  Start the VM.
>
> One gotcha:  the VM won't run in PVH mode once you make this assignment.
> But, my Yubikey lights up when Gmail or Facebook need the second factor,
> and it works as advertised.
>
>
It looks like when in the sys-usb Qube the Yubikey works as intended. When
attaching it to another Qube it's listed under lsusb properly and lights up
accordingly however when using it there is no output (to stdout /
wherever). I'm not quite sure how to debug this further so if someone could
shed some light in that regard that'd be great.

In the interim I'll use a solution similar to yours and just juggle the USB
controller to different Qubes as needed (ick!).

Thanks for the information!


On Fri, Mar 9, 2018 at 4:13 PM, William Bormann 
wrote:

> I have a FIDO U2F Yubico Security Key that I use for authentication to
> Gmail and Facebook.  In my situation, I decided to use a single VM for two
> factor authentication.  Here's what I did:
>
> 1.  Find a free USB controller.  I didn't want to use the same one as my
> keyboard or mouse.  Your board specs and the lsusb utility are your friends
> in the hunt.  Check out the Qubes document "Assigning Devices to VMs" for
> the gory details of discovering the PCI device assignments to your USB
> controllers.
> 2.  In the VM you plan to use the key, you'll want to assign the PCI
> device for your free hub to that VM.  That's accomplished by firing up Qube
> settings for the VM and selecting the devices tab.  Scroll down to the
> available device and move it to the selected box.
> 3.  You might have to configure strict reset (or disable strict reset) for
> the USB controller.
> 4.  Start the VM.
>
> One gotcha:  the VM won't run in PVH mode once you make this assignment.
> But, my Yubikey lights up when Gmail or Facebook need the second factor,
> and it works as advertised.
>
> On Friday, March 9, 2018 at 12:34:06 PM UTC-5, Jon R. wrote:
> > Hello,
> >
> > I've scoured around the mailing lists / SO / Reddit and haven't come
> across a solution to this yet. I'm running 4.0 (R4.0) and when I attempt to
> use my Yubikey it's seemingly not picking up any input on the button press.
> >
> > It's detecting the USB properly and I can attach it fine:
> >
> > [cloe@dom0 Desktop]$ qvm-usb
> > BACKEND:DEVID  DESCRIPTION USED BY
> > sys-usb:2-1Yubico_Yubikey_4_OTP+CCID
> >
> > [cloe@dom0 Desktop]$ qvm-usb attach work sys-usb:2-1
> >
> > [cloe@dom0 Desktop]$ qvm-usb
> > BACKEND:DEVID  DESCRIPTION USED BY
> > sys-usb:2-1Yubico_Yubikey_4_OTP+CCID   work
> >
> > However upon button presses on the Yubikey in the "work" domain there is
> no action. I've tested this in gedit, the terminal and elsewhere to no
> avail.
> >
> >
> > Can someone point me in the right direction as to what may be happening?
> I've successfully attached storage devices and other smart card related
> devices without any issue so it seems to be isolated to the Yubikey itself.
> I've tried 2 separate Yubikey 4's and an older version to no avail.
> >
> >
> > Thank you for your time.
> >
> >
> > - Cody
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/
> msgid/qubes-users/7e00edc7-3c2a-462e-98c6-443dd1af7d36%40googlegroups.com.
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJd29SSKf%3DY9CygxG7W6bQXh%3DxomyS76wZchVi0k8%2ByeY7rmzg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Issues with Yubikey 4 input

2018-03-09 Thread William Bormann
I have a FIDO U2F Yubico Security Key that I use for authentication to Gmail 
and Facebook.  In my situation, I decided to use a single VM for two factor 
authentication.  Here's what I did:

1.  Find a free USB controller.  I didn't want to use the same one as my 
keyboard or mouse.  Your board specs and the lsusb utility are your friends in 
the hunt.  Check out the Qubes document "Assigning Devices to VMs" for the gory 
details of discovering the PCI device assignments to your USB controllers.
2.  In the VM you plan to use the key, you'll want to assign the PCI device for 
your free hub to that VM.  That's accomplished by firing up Qube settings for 
the VM and selecting the devices tab.  Scroll down to the available device and 
move it to the selected box.
3.  You might have to configure strict reset (or disable strict reset) for the 
USB controller.
4.  Start the VM.

One gotcha:  the VM won't run in PVH mode once you make this assignment.  But, 
my Yubikey lights up when Gmail or Facebook need the second factor, and it 
works as advertised.

On Friday, March 9, 2018 at 12:34:06 PM UTC-5, Jon R. wrote:
> Hello,
> 
> I've scoured around the mailing lists / SO / Reddit and haven't come across a 
> solution to this yet. I'm running 4.0 (R4.0) and when I attempt to use my 
> Yubikey it's seemingly not picking up any input on the button press.
> 
> It's detecting the USB properly and I can attach it fine:
> 
> [cloe@dom0 Desktop]$ qvm-usb
> BACKEND:DEVID  DESCRIPTION USED BY
> sys-usb:2-1    Yubico_Yubikey_4_OTP+CCID
> 
> [cloe@dom0 Desktop]$ qvm-usb attach work sys-usb:2-1
> 
> [cloe@dom0 Desktop]$ qvm-usb
> BACKEND:DEVID  DESCRIPTION USED BY
> sys-usb:2-1    Yubico_Yubikey_4_OTP+CCID   work
> 
> However upon button presses on the Yubikey in the "work" domain there is no 
> action. I've tested this in gedit, the terminal and elsewhere to no avail. 
> 
> 
> Can someone point me in the right direction as to what may be happening? I've 
> successfully attached storage devices and other smart card related devices 
> without any issue so it seems to be isolated to the Yubikey itself. I've 
> tried 2 separate Yubikey 4's and an older version to no avail.
> 
> 
> Thank you for your time.
> 
> 
> - Cody

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7e00edc7-3c2a-462e-98c6-443dd1af7d36%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.