[qubes-users] Re: Yubikeys in Qubes

2016-12-02 Thread vegard_pettersen
fredag 2. desember 2016 17.19.29 UTC+1 skrev Grzesiek Chodzicki følgende:
> W dniu piątek, 2 grudnia 2016 10:57:48 UTC+1 użytkownik 
> You can use mouse attached to the usb-vm which has usb input proxy installed 
> to avoid switching devices around.

Thank you very much Mr. Chodzicki, that was enough to push me in the right 
direction and hunt down the instructions here: 
https://github.com/QubesOS/qubes-app-linux-input-proxy

I worked my way through it from the section "Manual usage", starting at 
"Alternatively you can allow USB VM to initiate the connection whenever you 
attach your device. For that you need to ..."

Works like a charm, now I even have two mice attached!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/78386de6-c016-469c-ac66-e5c4f5c070e2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Yubikeys in Qubes

2016-12-02 Thread Grzesiek Chodzicki
W dniu piątek, 2 grudnia 2016 10:57:48 UTC+1 użytkownik vegard_p...@fastmail.fm 
napisał:
> fredag 2. desember 2016 00.54.55 UTC+1 skrev Micah Lee følgende:
> > I just wrote a quick blog post about using Yubikeys in Qubes.
> > Specifically, I wanted to share a script that will use qvm-usb to attach
> > your Yubikey to your gpgvm no matter what USB port you plug it into.
> 
> Thank you very much for this, Micah, it great to see usability scripts for 
> Qubes popping up!
> 
> That said, I tested this and it turns out one needs to have a USB Qube set up 
> (aka USB-VM, sys-usb).
> I followed the receipe here: https://www.qubes-os.org/doc/usb/ .
> 
> My problem now is that I have a single PS/2 port, and have to switch between 
> using either a PS/2 mouse or a PS/2 keyboard, by plugging and unplugging the 
> connector.
> 
> Is there a simple way to completely disable the USB-Qube? 
> The command: "qubesctl top.disable qvm.sys-usb" in dom0 doesn't do much.
> And rebooting the Qubes OS causes system hang; it does not boot anymore.
> 
> Currently I have taken out my SSD-disk and mounted it on a different machine, 
> by:
> ---
> su - 
> cryptsetup luksOpen /dev/sdb2 sdb2_crypt
> lvchange -a y qubes_dom0
> mount /dev/qubes_dom0/root /mnt/qubes_rescue
> ---

You can use mouse attached to the usb-vm which has usb input proxy installed to 
avoid switching devices around.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0b9e6665-d999-4cfe-86e8-40ebc310bb4d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Yubikeys in Qubes

2016-12-02 Thread vegard_pettersen
fredag 2. desember 2016 00.54.55 UTC+1 skrev Micah Lee følgende:
> I just wrote a quick blog post about using Yubikeys in Qubes.
> Specifically, I wanted to share a script that will use qvm-usb to attach
> your Yubikey to your gpgvm no matter what USB port you plug it into.

Thank you very much for this, Micah, it great to see usability scripts for 
Qubes popping up!

That said, I tested this and it turns out one needs to have a USB Qube set up 
(aka USB-VM, sys-usb).
I followed the receipe here: https://www.qubes-os.org/doc/usb/ .

My problem now is that I have a single PS/2 port, and have to switch between 
using either a PS/2 mouse or a PS/2 keyboard, by plugging and unplugging the 
connector.

Is there a simple way to completely disable the USB-Qube? 
The command: "qubesctl top.disable qvm.sys-usb" in dom0 doesn't do much.
And rebooting the Qubes OS causes system hang; it does not boot anymore.

Currently I have taken out my SSD-disk and mounted it on a different machine, 
by:
---
su - 
cryptsetup luksOpen /dev/sdb2 sdb2_crypt
lvchange -a y qubes_dom0
mount /dev/qubes_dom0/root /mnt/qubes_rescue
---

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a455286d-9ab4-44a2-992d-0f2178488404%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.