mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-02-13 21:41:27 -05:00
fixing links with known fix
This commit is contained in:
parent
48fa6ff8bb
commit
bbd702e69a
@ -198,6 +198,6 @@ Additional Reading:
|
|||||||
[1082]: https://github.com/QubesOS/qubes-issues/issues/1082
|
[1082]: https://github.com/QubesOS/qubes-issues/issues/1082
|
||||||
[usb-challenges]: https://blog.invisiblethings.org/2011/05/31/usb-security-challenges.html
|
[usb-challenges]: https://blog.invisiblethings.org/2011/05/31/usb-security-challenges.html
|
||||||
[YubiKey]: /doc/YubiKey/
|
[YubiKey]: /doc/YubiKey/
|
||||||
[Creating a USB qube]: /doc/usb-qube-how-to/
|
[Creating a USB qube]: /doc/usb-qube-howto/
|
||||||
[Using a USB keyboard]: /doc/usb-qube-how-to/#enable-a-usb-keyboard-for-login
|
[Using a USB keyboard]: /doc/usb-qube-howto/#enable-a-usb-keyboard-for-login
|
||||||
[qubes-usb-proxy]: https://github.com/QubesOS/qubes-app-linux-usb-proxy
|
[qubes-usb-proxy]: https://github.com/QubesOS/qubes-app-linux-usb-proxy
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
layout: doc
|
layout: doc
|
||||||
title: USB Qube HowTo
|
title: USB Qube HowTo
|
||||||
permalink: /doc/usb-qube-how-to/
|
permalink: /doc/usb-qube-howto/
|
||||||
---
|
---
|
||||||
|
|
||||||
USB Qube HowTo
|
USB Qube HowTo
|
||||||
@ -198,9 +198,9 @@ Removing a USB qube
|
|||||||
[PCI Devices]: /doc/pci-devices-in-qubes-R4.0/
|
[PCI Devices]: /doc/pci-devices-in-qubes-R4.0/
|
||||||
[usb-controller]: /doc/usb-devices/#finding-the-right-usb-controller
|
[usb-controller]: /doc/usb-devices/#finding-the-right-usb-controller
|
||||||
[faq]: /faq/#i-created-a-usbvm-and-assigned-usb-controllers-to-it-now-the-usbvm-wont-boot
|
[faq]: /faq/#i-created-a-usbvm-and-assigned-usb-controllers-to-it-now-the-usbvm-wont-boot
|
||||||
[Security Warning about USB Input Devices]: /doc/device-considerations/#security-warning-on-usb-input-device
|
[Security Warning about USB Input Devices]: /doc/device-considerations/#security-warning-on-usb-input-devices
|
||||||
[manual setup]: #manual-setup
|
[manual setup]: #manual-setup
|
||||||
[install dom0 updates]: /doc/software-update-dom0/#how-to-update-software-in-dom0
|
[install dom0 updates]: /doc/software-update-dom0/#how-to-update-dom0
|
||||||
[hiding USB controllers from dom0]: #how-to-hide-all-usb-controllers-from-dom0
|
[hiding USB controllers from dom0]: #how-to-hide-all-usb-controllers-from-dom0
|
||||||
[AEM]: /doc/anti-evil-maid/
|
[AEM]: /doc/anti-evil-maid/
|
||||||
[create a USB qube]: #creating-and-using-a-usb-qube
|
[create a USB qube]: #creating-and-using-a-usb-qube
|
@ -91,8 +91,8 @@ For example, with `qvm-prefs work netvm sys-firewall2`.
|
|||||||
|
|
||||||
To create one with a PCI device attached such as for `sys-net` or `sys-usb`, use the additional commands as follows.
|
To create one with a PCI device attached such as for `sys-net` or `sys-usb`, use the additional commands as follows.
|
||||||
|
|
||||||
**Note** You can use `qvm-pci` to [determine](/doc/assigning-devices/#r40) the `<BDF>`.
|
**Note** You can use `qvm-pci` to [determine](/doc/pci-devices/#qvm-pci-usage) the `<BDF>`.
|
||||||
Also, you will often need to include the `-o no-strict-reset=True` [option](/doc/assigning-devices/#r40-1) with USB controllers.
|
Also, you will often need to include the `-o no-strict-reset=True` [option](/doc/pci-devices/#no-strict-reset) with USB controllers.
|
||||||
|
|
||||||
~~~
|
~~~
|
||||||
qvm-create -C DispVM -l red <sys-VMName>
|
qvm-create -C DispVM -l red <sys-VMName>
|
||||||
@ -240,7 +240,7 @@ Using DisposableVMs in this manner is ideal for untrusted qubes which require pe
|
|||||||
|
|
||||||
5. Attach the USB controller to the `disp-sys-usb`
|
5. Attach the USB controller to the `disp-sys-usb`
|
||||||
|
|
||||||
>_**Note:**_ Most of the commonly used USB controllers (all Intel integrated controllers) require the `-o no-strict-reset=True` option to be set. Instructions detailing how this option is set can be found [here](/doc/assigning-devices/#r40-1).
|
>_**Note:**_ Most of the commonly used USB controllers (all Intel integrated controllers) require the `-o no-strict-reset=True` option to be set. Instructions detailing how this option is set can be found [here](/doc/pci-devices/#no-strict-reset).
|
||||||
|
|
||||||
[user@dom0 ~]$ qvm-pci attach --persistent disp-sys-usb <backined>:<bdf>
|
[user@dom0 ~]$ qvm-pci attach --persistent disp-sys-usb <backined>:<bdf>
|
||||||
|
|
||||||
@ -248,7 +248,7 @@ Using DisposableVMs in this manner is ideal for untrusted qubes which require pe
|
|||||||
|
|
||||||
[user@dom0 ~]$ qvm-prefs disp-sys-usb autostart true
|
[user@dom0 ~]$ qvm-prefs disp-sys-usb autostart true
|
||||||
|
|
||||||
7. Users should now follow instructions on [How to hide USB controllers from dom0](/doc/usb/#how-to-hide-all-usb-controllers-from-dom0)
|
7. Users should now follow instructions on [How to hide USB controllers from dom0](/doc/usb-qube-howto/#how-to-hide-all-usb-controllers-from-dom0)
|
||||||
|
|
||||||
8. At this point, your mouse may not work.
|
8. At this point, your mouse may not work.
|
||||||
Edit the `qubes.InputMouse` policy file in dom0, which is located here:
|
Edit the `qubes.InputMouse` policy file in dom0, which is located here:
|
||||||
@ -273,7 +273,7 @@ Prior to starting the new VMs, users should ensure that no other VMs such as the
|
|||||||
|
|
||||||
The `disp-sys-usb` VM does not start
|
The `disp-sys-usb` VM does not start
|
||||||
|
|
||||||
If the `disp-sys-usb` does not start, it could be due to a PCI passthrough problem. For more details on this issue along with possible solutions, users can look [here](/doc/assigning-devices/#pci-passthrough-issues)
|
If the `disp-sys-usb` does not start, it could be due to a PCI passthrough problem. For more details on this issue along with possible solutions, users can look [here](/doc/pci-devices/#pci-passthrough-issues)
|
||||||
|
|
||||||
|
|
||||||
### Deleting DisposableVM ###
|
### Deleting DisposableVM ###
|
||||||
|
3
doc.md
3
doc.md
@ -67,8 +67,7 @@ redirect_from:
|
|||||||
* [Backup, Restoration, and Migration](/doc/backup-restore/)
|
* [Backup, Restoration, and Migration](/doc/backup-restore/)
|
||||||
* [Using DisposableVMs](/doc/disposablevm/)
|
* [Using DisposableVMs](/doc/disposablevm/)
|
||||||
* [Using and Managing USB Devices in R3.2](/doc/usb/)
|
* [Using and Managing USB Devices in R3.2](/doc/usb/)
|
||||||
* [Using Block or Storage Devices in Qubes R4.0](/doc/block-devices/)
|
* [Using USB and Storage Devices in Qubes R4.0](/doc/usb-devices)
|
||||||
* [Using USB Devices in Qubes R4.0](/doc/usb-devices)
|
|
||||||
* [Optical Discs](/doc/optical-discs/)
|
* [Optical Discs](/doc/optical-discs/)
|
||||||
* [Managing Application Shortcuts](/doc/managing-appvm-shortcuts/)
|
* [Managing Application Shortcuts](/doc/managing-appvm-shortcuts/)
|
||||||
* [Enabling Fullscreen Mode](/doc/full-screen-mode/)
|
* [Enabling Fullscreen Mode](/doc/full-screen-mode/)
|
||||||
|
@ -83,6 +83,6 @@ switch might be the option.
|
|||||||
[verify]: /security/verifying-signatures/
|
[verify]: /security/verifying-signatures/
|
||||||
[classic problem]: https://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf
|
[classic problem]: https://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf
|
||||||
[solutions]: https://www.dwheeler.com/trusting-trust/
|
[solutions]: https://www.dwheeler.com/trusting-trust/
|
||||||
[USB qube]: /doc/usb/#creating-and-using-a-usb-qube
|
[USB qube]: /doc/usb-qubes-howto/#creating-and-using-a-usb-qube
|
||||||
[BadUSB]: https://srlabs.de/badusb/
|
[BadUSB]: https://srlabs.de/badusb/
|
||||||
|
|
||||||
|
@ -11,7 +11,7 @@ Using YubiKey to Qubes authentication
|
|||||||
=====================================
|
=====================================
|
||||||
|
|
||||||
You can use YubiKey to enhance Qubes user authentication, for example to mitigate
|
You can use YubiKey to enhance Qubes user authentication, for example to mitigate
|
||||||
risk of snooping the password. This can also slightly improve security when you have [USB keyboard](/doc/usb/#security-warning-about-usb-input-devices).
|
risk of snooping the password. This can also slightly improve security when you have [USB keyboard](/doc/device-considerations/#security-warning-on-usb-input-devices).
|
||||||
|
|
||||||
There (at least) two possible configurations: using OTP mode and using challenge-response mode.
|
There (at least) two possible configurations: using OTP mode and using challenge-response mode.
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user