mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-12-29 01:06:24 -05:00
Warning for usb-vm creation
Added a warning to ensure that people don't get locked out of Qubes without adequate warning and a guide to getting them out of it.
This commit is contained in:
parent
9abdb86f5d
commit
536e8e0bec
@ -24,6 +24,8 @@ Using and Managing USB Devices
|
|||||||
Creating and Using a USB qube
|
Creating and Using a USB qube
|
||||||
-----------------------------
|
-----------------------------
|
||||||
|
|
||||||
|
**Warning:** This has the potential to prevent you from connecting a keyboard to Qubes via USB. There are problems with doing this with a encrypted install (LUKS). If you find yourself in this situation, see this [issue][2270-comm23]
|
||||||
|
|
||||||
The connection of an untrusted USB device to dom0 is a security risk since dom0,
|
The connection of an untrusted USB device to dom0 is a security risk since dom0,
|
||||||
like almost every OS, reads partition tables automatically and since the whole
|
like almost every OS, reads partition tables automatically and since the whole
|
||||||
USB stack is put to work to parse the data presented by the USB device in order
|
USB stack is put to work to parse the data presented by the USB device in order
|
||||||
@ -50,8 +52,6 @@ steps as root in dom0:
|
|||||||
|
|
||||||
qubesctl state.highstate
|
qubesctl state.highstate
|
||||||
|
|
||||||
**Warning:** This has the potential to prevent you from connecting a keyboard to Qubes via USB. There are problems with doing this with a encrypted install (LUKS). If you find yourself in this situation, see this [issue][2270-comm23]
|
|
||||||
|
|
||||||
Alternatively, you can create a USB qube manually as follows:
|
Alternatively, you can create a USB qube manually as follows:
|
||||||
|
|
||||||
1. Read the [Assigning Devices] page to learn how to list and identify your
|
1. Read the [Assigning Devices] page to learn how to list and identify your
|
||||||
|
Loading…
Reference in New Issue
Block a user