qusal/salt/sys-usb
2023-11-13 18:18:06 +00:00
..
files/admin/policy refactor: initial commit 2023-11-13 14:33:28 +00:00
clone.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
clone.top refactor: initial commit 2023-11-13 14:33:28 +00:00
create.sls chore: Fix unman copyright contact 2023-11-13 18:18:06 +00:00
create.top refactor: initial commit 2023-11-13 14:33:28 +00:00
init.top refactor: initial commit 2023-11-13 14:33:28 +00:00
install-client-cryptsetup.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
install-client-cryptsetup.top refactor: initial commit 2023-11-13 14:33:28 +00:00
install-client-fido.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
install-client-fido.top refactor: initial commit 2023-11-13 14:33:28 +00:00
install-client-proxy.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
install-client-proxy.top refactor: initial commit 2023-11-13 14:33:28 +00:00
install-client.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
install-client.top refactor: initial commit 2023-11-13 14:33:28 +00:00
install.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
install.top refactor: initial commit 2023-11-13 14:33:28 +00:00
keyboard.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
keyboard.top refactor: initial commit 2023-11-13 14:33:28 +00:00
README.md refactor: initial commit 2023-11-13 14:33:28 +00:00

sys-usb

PCI handler of USB devices in Qubes OS.

Table of Contents

Description

Setup named disposables for USB qubes. During creation, it tries to separate the USB controllers to different qubes is possible.

Installation

  • Top:
qubesctl top.enable sys-usb
qubesctl --targets=tpl-sys-usb state.apply
qubesctl top.disable sys-usb
  • State:
qubesctl state.apply sys-usb.create
qubesctl --skip-dom0 --targets=tpl-sys-usb state.apply sys-usb.install

If you use an USB keyboard, also run:

qubesctl state.apply sys-usb.keyboard

Install the proxy on the client template:

qubesctl --skip-dom0 --targets=tpl-QUBE state.apply sys-usb.install-client-proxy

If the client requires decrypting a device, install on the client template:

qubesctl --skip-dom0 --targets=tpl-QUBE state.apply sys-usb.install-client-cryptsetup

If the client requires a FIDO device, install on the client template:

qubesctl --skip-dom0 --targets=tpl-QUBE state.apply sys-usb.install-client-fido

Usage

Start a USB qube an connect a device to it. USB PCI devices will appear on the system tray icon qui-devices. From there, assign it to the intended qube.

Credits