fixing links with known fix

This commit is contained in:
GammaSQ 2019-03-05 17:47:23 +01:00
parent 48fa6ff8bb
commit bbd702e69a
No known key found for this signature in database
GPG Key ID: D552FD2F98647C64
6 changed files with 13 additions and 14 deletions

View File

@ -198,6 +198,6 @@ Additional Reading:
[1082]: https://github.com/QubesOS/qubes-issues/issues/1082 [1082]: https://github.com/QubesOS/qubes-issues/issues/1082
[usb-challenges]: https://blog.invisiblethings.org/2011/05/31/usb-security-challenges.html [usb-challenges]: https://blog.invisiblethings.org/2011/05/31/usb-security-challenges.html
[YubiKey]: /doc/YubiKey/ [YubiKey]: /doc/YubiKey/
[Creating a USB qube]: /doc/usb-qube-how-to/ [Creating a USB qube]: /doc/usb-qube-howto/
[Using a USB keyboard]: /doc/usb-qube-how-to/#enable-a-usb-keyboard-for-login [Using a USB keyboard]: /doc/usb-qube-howto/#enable-a-usb-keyboard-for-login
[qubes-usb-proxy]: https://github.com/QubesOS/qubes-app-linux-usb-proxy [qubes-usb-proxy]: https://github.com/QubesOS/qubes-app-linux-usb-proxy

View File

@ -1,7 +1,7 @@
--- ---
layout: doc layout: doc
title: USB Qube HowTo title: USB Qube HowTo
permalink: /doc/usb-qube-how-to/ permalink: /doc/usb-qube-howto/
--- ---
USB Qube HowTo USB Qube HowTo
@ -198,9 +198,9 @@ Removing a USB qube
[PCI Devices]: /doc/pci-devices-in-qubes-R4.0/ [PCI Devices]: /doc/pci-devices-in-qubes-R4.0/
[usb-controller]: /doc/usb-devices/#finding-the-right-usb-controller [usb-controller]: /doc/usb-devices/#finding-the-right-usb-controller
[faq]: /faq/#i-created-a-usbvm-and-assigned-usb-controllers-to-it-now-the-usbvm-wont-boot [faq]: /faq/#i-created-a-usbvm-and-assigned-usb-controllers-to-it-now-the-usbvm-wont-boot
[Security Warning about USB Input Devices]: /doc/device-considerations/#security-warning-on-usb-input-device [Security Warning about USB Input Devices]: /doc/device-considerations/#security-warning-on-usb-input-devices
[manual setup]: #manual-setup [manual setup]: #manual-setup
[install dom0 updates]: /doc/software-update-dom0/#how-to-update-software-in-dom0 [install dom0 updates]: /doc/software-update-dom0/#how-to-update-dom0
[hiding USB controllers from dom0]: #how-to-hide-all-usb-controllers-from-dom0 [hiding USB controllers from dom0]: #how-to-hide-all-usb-controllers-from-dom0
[AEM]: /doc/anti-evil-maid/ [AEM]: /doc/anti-evil-maid/
[create a USB qube]: #creating-and-using-a-usb-qube [create a USB qube]: #creating-and-using-a-usb-qube

View File

@ -91,8 +91,8 @@ For example, with `qvm-prefs work netvm sys-firewall2`.
To create one with a PCI device attached such as for `sys-net` or `sys-usb`, use the additional commands as follows. To create one with a PCI device attached such as for `sys-net` or `sys-usb`, use the additional commands as follows.
**Note** You can use `qvm-pci` to [determine](/doc/assigning-devices/#r40) the `<BDF>`. **Note** You can use `qvm-pci` to [determine](/doc/pci-devices/#qvm-pci-usage) the `<BDF>`.
Also, you will often need to include the `-o no-strict-reset=True` [option](/doc/assigning-devices/#r40-1) with USB controllers. Also, you will often need to include the `-o no-strict-reset=True` [option](/doc/pci-devices/#no-strict-reset) with USB controllers.
~~~ ~~~
qvm-create -C DispVM -l red <sys-VMName> qvm-create -C DispVM -l red <sys-VMName>
@ -240,7 +240,7 @@ Using DisposableVMs in this manner is ideal for untrusted qubes which require pe
5. Attach the USB controller to the `disp-sys-usb` 5. Attach the USB controller to the `disp-sys-usb`
>_**Note:**_ Most of the commonly used USB controllers (all Intel integrated controllers) require the `-o no-strict-reset=True` option to be set. Instructions detailing how this option is set can be found [here](/doc/assigning-devices/#r40-1). >_**Note:**_ Most of the commonly used USB controllers (all Intel integrated controllers) require the `-o no-strict-reset=True` option to be set. Instructions detailing how this option is set can be found [here](/doc/pci-devices/#no-strict-reset).
[user@dom0 ~]$ qvm-pci attach --persistent disp-sys-usb <backined>:<bdf> [user@dom0 ~]$ qvm-pci attach --persistent disp-sys-usb <backined>:<bdf>
@ -248,7 +248,7 @@ Using DisposableVMs in this manner is ideal for untrusted qubes which require pe
[user@dom0 ~]$ qvm-prefs disp-sys-usb autostart true [user@dom0 ~]$ qvm-prefs disp-sys-usb autostart true
7. Users should now follow instructions on [How to hide USB controllers from dom0](/doc/usb/#how-to-hide-all-usb-controllers-from-dom0) 7. Users should now follow instructions on [How to hide USB controllers from dom0](/doc/usb-qube-howto/#how-to-hide-all-usb-controllers-from-dom0)
8. At this point, your mouse may not work. 8. At this point, your mouse may not work.
Edit the `qubes.InputMouse` policy file in dom0, which is located here: Edit the `qubes.InputMouse` policy file in dom0, which is located here:
@ -273,7 +273,7 @@ Prior to starting the new VMs, users should ensure that no other VMs such as the
The `disp-sys-usb` VM does not start The `disp-sys-usb` VM does not start
If the `disp-sys-usb` does not start, it could be due to a PCI passthrough problem. For more details on this issue along with possible solutions, users can look [here](/doc/assigning-devices/#pci-passthrough-issues) If the `disp-sys-usb` does not start, it could be due to a PCI passthrough problem. For more details on this issue along with possible solutions, users can look [here](/doc/pci-devices/#pci-passthrough-issues)
### Deleting DisposableVM ### ### Deleting DisposableVM ###

3
doc.md
View File

@ -67,8 +67,7 @@ redirect_from:
* [Backup, Restoration, and Migration](/doc/backup-restore/) * [Backup, Restoration, and Migration](/doc/backup-restore/)
* [Using DisposableVMs](/doc/disposablevm/) * [Using DisposableVMs](/doc/disposablevm/)
* [Using and Managing USB Devices in R3.2](/doc/usb/) * [Using and Managing USB Devices in R3.2](/doc/usb/)
* [Using Block or Storage Devices in Qubes R4.0](/doc/block-devices/) * [Using USB and Storage Devices in Qubes R4.0](/doc/usb-devices)
* [Using USB Devices in Qubes R4.0](/doc/usb-devices)
* [Optical Discs](/doc/optical-discs/) * [Optical Discs](/doc/optical-discs/)
* [Managing Application Shortcuts](/doc/managing-appvm-shortcuts/) * [Managing Application Shortcuts](/doc/managing-appvm-shortcuts/)
* [Enabling Fullscreen Mode](/doc/full-screen-mode/) * [Enabling Fullscreen Mode](/doc/full-screen-mode/)

View File

@ -83,6 +83,6 @@ switch might be the option.
[verify]: /security/verifying-signatures/ [verify]: /security/verifying-signatures/
[classic problem]: https://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf [classic problem]: https://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf
[solutions]: https://www.dwheeler.com/trusting-trust/ [solutions]: https://www.dwheeler.com/trusting-trust/
[USB qube]: /doc/usb/#creating-and-using-a-usb-qube [USB qube]: /doc/usb-qubes-howto/#creating-and-using-a-usb-qube
[BadUSB]: https://srlabs.de/badusb/ [BadUSB]: https://srlabs.de/badusb/

View File

@ -11,7 +11,7 @@ Using YubiKey to Qubes authentication
===================================== =====================================
You can use YubiKey to enhance Qubes user authentication, for example to mitigate You can use YubiKey to enhance Qubes user authentication, for example to mitigate
risk of snooping the password. This can also slightly improve security when you have [USB keyboard](/doc/usb/#security-warning-about-usb-input-devices). risk of snooping the password. This can also slightly improve security when you have [USB keyboard](/doc/device-considerations/#security-warning-on-usb-input-devices).
There (at least) two possible configurations: using OTP mode and using challenge-response mode. There (at least) two possible configurations: using OTP mode and using challenge-response mode.