The guide does not work on 4.1.
Tests with original Marmarek 4.1. Alpha iso from last year and today clean install with latest 4.1. Alpha weekly iso and it just will not work.
Tests were done with a clone from a clean fedora-33 Template (ssh-client & vault-ssh AppVms) which comes with installed libnotify.
Without or with mate-notification-daemon no dice.
Test were done with Stable dom0 and current-testing update and reboot.
Would love to help pinpoint the problem but not sure where to look.
After taking a break from 4.1 testing i did find what the split-ssh guide on github is missing.
The vault vm template /etc/qubes-rpc/qubes.SshaAgent file needs to be made executable, chmod +x /etc/qubes-rpc/qubes.SshAgent
Made a new clean install of 4.1 rc1 restored my AppVMs and templates and noticed that i wasnât able to get ssh split to work after creating the dom0 policy file.
Turns out i had to press ENTER after ssh-client vault ask and create a new line for it to work, might want to add this into the howto section about dom0 /etc/qubes-rpc/policy/qubes.SshAgent
As far as I am aware, nothing about this guide is Qubes-4.1-ready (yet) and itâs awesome to hear from you that it is working (almost) flawlessly. For me personally, Qubes 4.1 is currently not working on my private device and therefore, I canât test it.
I expect that the guide requires a few updates once someone gets their hands on a Qubes 4.1 installation due to the new Qubes policy file format (Qubes Architecture Next Steps: The New Qrexec Policy System | Qubes OS).
Note that, as the linked article says, the old file format is still supported but should be considered legacy. So we should migrate to the new format in due time.
I know the GitHub guide. In fact, I helped writing it .
Thatâs why I am happy that it more or less worked for you. As far as I know, and I havenât heard anything else from @whoami and @santorihelix (the other main co-authors, not to forget @deeplow), this guide has not âofficiallyâ been tested on 4.1.
As I said, apparently most of it can be migrated but I consider a legacy policy file format to be an intermediate solution at best. The ultimate goal should be to adapt the guide to the new policy file format for Qubes 4.1.
I didnât dive into it at all so far, so maybe there is not much to do for us.
I am still here but I didnât update to 4.1, I will wait for the final release. Currently, there is too much other work to do and I need a working system. Sorry.
Updated from fedora 36 templates to fedora 38 for my ssh qube and run into this odd new behavior which probably has an easy solution if i only knew where to look.
First, split-ssh âworks as expectedâ but after pressing enter on the pop up window my ssh window is out of focus and needs either alt tab or mouse click to get back to focus.
This can get annoying pretty fast. Anyone else experience this?
EDIT: To fix this behavior go to Q > System Tools > Window Manager > Focus > and uncheck Automatically give Focus to newly created windows.
Iâm trying to setup Split SSH for git on a fresh installation of Qubes OS 4.2, but having trouble getting it to work. Like @haaber in #19443 and @mono in comment #38 of this topic, when executing ssh-add -L in the ssh-client VM I click the accept button in the dom0 Operation execution popup for qubes.SshAgent, but the ssh-client VM console prints error fetching identities: communication with agent failed regardless. Both the vault and the ssh-client VMs share the same fedora-38-xfce template that was installed when I installed the OS. First I followed the Split SSH setup guide and then tried virtually any combination of:
Plain setup vs. KeePassXC
@anyvm vs. real VM names in dom0 /etc/qubes-rpc/policy/qubes.SshAgent
ask vs. ask,default_target=vault-VM-name in dom0 /etc/qubes-rpc/policy/qubes.SshAgent
socat vs. ncat in TemplateVM /etc/qubes-rpc/qubes.SshAgent and ssh-client VM /rw/config/rc.local
Trailing newline (comment #48 of this thread) in dom0 /etc/qubes-rpc/policy/qubes.SshAgent
& character before or after the " character in ssh-client VM /rw/config/rc.local
Renaming SSH_AUTH_SOCKET to SSH_SOCKET (to mirror the variable names used in other parts of the guide) in TemplateVM /etc/qubes-rpc/qubes.SshAgent and ssh-client VM ~/.bashrc
I suspect that Iâm missing something, so I would like to know if someone got Split SSH working on Qubes OS 4.2.
The next issue is that git push seems to invoke gnome-ssh-askpass on fedora-38-xfce. I donât know much about distros, but is gnome in xfce supposed to happen?
$ git push
error: unable to read askpass response from '/usr/libexec/openssh/gnome-ssh-askpass'
Username for 'https://...': <empty>
error: unable to read askpass response from '/usr/libexec/openssh/gnome-ssh-askpass'
Password for 'https://...': <empty>
remote: No anonymous write access.
fatal: Authentication failed.
Sorry for not linking to the topics and comments, new forum users are only allowed to post 2 links per post.
it worked for me on the reinstall a few weeks ago, did you try to press enter at the end of line in the dom0 policy file you created?
With the newline it suddenly worked for me when i encountered the problem, posted that above back then.
Thanks for the quick reply - yes, that is what I meant in step 5 of my previous post. But if it works for you, then itâs not the OS stopping me, but me doing something wrong. Iâll try to come up with more things to test.