Re: [qubes-users] Custom initramfs

2017-09-19 Thread joeviocoe
On Monday, 18 September 2017 23:32:53 UTC-4, cooloutac wrote: > On Sunday, September 10, 2017 at 6:02:24 PM UTC-4, joev...@gmail.com wrote: > > On Monday, 29 August 2016 01:34:11 UTC-4, Raphael Susewind wrote: > > > > while initially I thought it would be interesting to try, the only > > > > sit

Re: [qubes-users] Custom initramfs

2017-09-18 Thread cooloutac
On Sunday, September 10, 2017 at 6:02:24 PM UTC-4, joev...@gmail.com wrote: > On Monday, 29 August 2016 01:34:11 UTC-4, Raphael Susewind wrote: > > > while initially I thought it would be interesting to try, the only > > > situation when yubikey could actually improve security is having to boot

Re: [qubes-users] Custom initramfs

2017-09-10 Thread joeviocoe
On Monday, 29 August 2016 01:34:11 UTC-4, Raphael Susewind wrote: > > while initially I thought it would be interesting to try, the only > > situation when yubikey could actually improve security is having to boot a > > Qubes PC under unavoidable surveilance. > > came to the same conclusion - p

Re: [qubes-users] Custom initramfs

2016-08-28 Thread Raphael Susewind
> while initially I thought it would be interesting to try, the only situation > when yubikey could actually improve security is having to boot a Qubes PC > under unavoidable surveilance. came to the same conclusion - probably not worth the security tradeoff... Perhaps one can implement a 2FA so

Re: [qubes-users] Custom initramfs

2016-08-27 Thread Connor Page
after giving it a thought I decided keep usb devices out of dom0. the solution for debian is real 2FA but ykfde is for lazy people. I gave it as an example of dracut hooks. theoretically you can rearrange hooks so that yubikey authentification happens before rd.qubes.hide_all_usb is processed bu

Re: [qubes-users] Custom initramfs

2016-08-27 Thread Raphael Susewind
> this is an interesting idea. initramfs is generated by dracut. read this > https://github.com/nj0y/ykfde/blob/master/README-dracut.md Yes, I gave ykfde a try. Problem is that Qubes still shows its custom FDE password screen on startup, and never the ykfde second factor one... (possibly - but j

[qubes-users] Custom initramfs

2016-08-26 Thread Connor Page
this is an interesting idea. initramfs is generated by dracut. read this https://github.com/nj0y/ykfde/blob/master/README-dracut.md -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it,

Re: [qubes-users] Custom initramfs

2016-08-25 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-08-25 06:55, Raphael Susewind wrote: > Dear all, > > how can I create a custom initramfs for dom0, using the current one as > template? I was hoping for something like initramfs-tools in Debian... > > The aim is to include yubikey-luks in

[qubes-users] Custom initramfs

2016-08-25 Thread Raphael Susewind
Dear all, how can I create a custom initramfs for dom0, using the current one as template? I was hoping for something like initramfs-tools in Debian... The aim is to include yubikey-luks in the FDE unlocking: https://github.com/cornelinux/yubikey-luks There might be other usecases, too - perhaps