1. Find a free USB controller. I didn't want to use the same one as my keyboard or mouse. Your board specs and the lsusb utility are your friends in the hunt. Check out the Qubes document "Assigning Devices to VMs" for the gory details of discovering the PCI device assignments to your USB controllers.
2. In the VM you plan to use the key, you'll want to assign the PCI device for your free hub to that VM. That's accomplished by firing up Qube settings for the VM and selecting the devices tab. Scroll down to the available device and move it to the selected box.
3. You might have to configure strict reset (or disable strict reset) for the USB controller.
4. Start the VM.
One gotcha: the VM won't run in PVH mode once you make this assignment. But, my Yubikey lights up when Gmail or Facebook need the second factor, and it works as advertised.
--
You received this message because you are subscribed to the Google Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscribe@googlegroups.com.
To post to this group, send email to qubes...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7e00edc7-3c2a-462e-98c6-443dd1af7d36%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
--
You received this message because you are subscribed to the Google Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscribe@googlegroups.com.
To post to this group, send email to qubes...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/bc3da3a6-2568-40ac-b018-beb6facfb1fa%40googlegroups.com.
> Looks like the X server in target VM cannot access the device. SeeThis doesn't appear to be the issued. The only relevant messages I'm seeing in both the sys-usb VM & the one I'm attaching it to (personal in this case) is the following:
> ~/.local/share/xorg/X.0.log there for lines like this:
>
> [247082.612] (EE) xf86OpenSerial: Cannot open device /dev/input/event1
> Permission denied.
> [247082.612] (II) event1: opening input device '/dev/input/event1' failed (Permission denied).
> [247082.612] (II) event1 - failed to create input device '/dev/input/event1'.
> In Fedora there is "ykpers" package, which ships appropriate udev rules
> to fix permissions.
> [ 684.323] (II) config/udev: Adding input device Yubico Yubikey 4 OTP+CCID (/dev/input/event8)
> [ 684.323] (II) No input driver specified, ignoring this device.
> [ 684.323] (II) This device may have been added with another device file.This appears in the sys-usb ~/.local/xorg/Xorg.0.log upon plugging in the Yubikey however the Yubikey functions as usual. When attaching the device to another VM the local ~/.local/xorg/Xorg.0.log shows the same message as above however it does not work.Just to remove the udev rules being the potential culprit I added both ykpers / ykpers-devel to the fedora template and rebooted. The same behavior persists.
A U2F Yubikey has a single USB "interface" that provides the U2F functionality. Yubikey NEOs/4s out of the box are setup to provide three USB "interfaces": U2F, classic Yubikey (two slots, HID based) and CCID (smart card) "interfaces". Discussion of USB "interfaces" can be found here: https://stackoverflow.com/questions/33103711/whats-difference-between-configuration-and-interface-in-usb-device
As I read it, if the device works in sys-usb but doesn't work in other VMs using the same template, perhaps the qubes/xen code that handles reassigning USB devices doesn't handle multi-interface USB devices well?
Perhaps try temporarily configuring your Yubikey 4 to disable OTP and CCID (leaving only the U2F interface enabled) using the Yubikey NEO Manager and see if that allows the U2F to function when the USB device is assigned to a VM. IF that works, see if other combinations (U2F+CCID, U2F+OTP) work or don't.
Brendan