From f19f853f7e36c09be6fd42a9a863106d79c6925a Mon Sep 17 00:00:00 2001 From: Michael Carbone Date: Wed, 1 Jul 2020 09:24:33 -0400 Subject: [PATCH] clarify u2f instructions --- user/security-in-qubes/u2f-proxy.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/user/security-in-qubes/u2f-proxy.md b/user/security-in-qubes/u2f-proxy.md index efcddc09..eff000d9 100644 --- a/user/security-in-qubes/u2f-proxy.md +++ b/user/security-in-qubes/u2f-proxy.md @@ -75,6 +75,7 @@ In dom0: $ sudo qubes-dom0-update qubes-u2f-dom0 $ qvm-service --enable work qubes-u2f-proxy ``` +The above assumes a `work` qube in which you would like to enable u2f. Repeat the `qvm-service` command for all qubes that should have the proxy enabled. Alternatively, you can add `qubes-u2f-proxy` in VM settings -> Services in the Qube Manager of each qube you would like to enable the service. In Fedora TemplateVMs: @@ -88,7 +89,6 @@ In Debian TemplateVMs: $ sudo apt install qubes-u2f ``` -Repeat `qvm-service --enable` (or do this in VM settings -> Services in the Qube Manager) for all qubes that should have the proxy enabled. As usual with software updates, shut down the templates after installation, then restart `sys-usb` and all qubes that use the proxy. After that, you may use your U2F token (but see [Browser support] below).