-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
On Mon, Aug 08, 2016 at 09:14:25PM -0700, Andrew David Wong wrote:
> On 2016-08-08 13:16,
0mn1...@gmail.com wrote:
> > As the title suggests. Is it even possible to have a dedicated USB VM and
> > still manage a Qubes setup where the bootloader and keyfile are stored on
> > an external USB drive? Or are these two currently mutually exclusive?
> >
>
> If I understand your question correctly, I think it should be possible by
> unhiding your USB controller from dom0.
>
> Go here:
https://www.qubes-os.org/doc/usb/
>
> And read the section: "Hide all USB controllers from dom0"
>
> Then undo that procedure, i.e., remove "rd.qubes.hide_all_usb", then
> regenerate grub.cfg.
Yes, it should be possible (the way Andrew described), but keep in mind
it will be a little inconvenient:
- updates of kernel/xen will require you to somehow transfer updated
files there, are /boot will inaccessible to dom0
- it's better to disconnect that usb drive as soon as system boots, to
not expose it to potentially compromised sys-usb
The later can be eased by using Anti Evil Maid - where startup scripts
explicitly will ask you to remove the USB stick.
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
iQEcBAEBCAAGBQJXqiPOAAoJENuP0xzK19csdZQH/1pKm4bXB4wRlkMZIX1eCddj
mneHqZRikcRg7GZgGYv2WoqAYvflPUK/65auyOmb9CKKRH3KvfY+UPewDm9p5k26
1y4PPqlAzFBeITkfz1S6WdMmjY/6JdWAA4ApvhLwDSJO87/+RXoQWrhu/G/Qtjvo
VWafYTP56svAxrLqjnp7NRnuCvjDwTrHL0SlxPYlTarhrHXyAs21ogGovuflYnwT
YrpHf6/qtrwSyEOWpkoGztqRkWAHU9tXlK8MK63pDGBjgD2uHl/oLFIFQLrw1Cl2
/7rAOnUTeFeCdWTPtPGJI1fwKonCiLMQ2OCRqejOjVuYTHghvvOCpecaCX63iAQ=
=ZUjP
-----END PGP SIGNATURE-----