Before following the guides
YubiKey | Qubes OS and
U2F proxy | Qubes OS
I wanted to try out if a Hypersec HyperFIDO
and a Feitian Tech ePass FIDO
device work at all.
So I installed chromium
and yubikey-personalization-gui
in an AppVM temporarily. After attaching the aforementioned usb-sticks to the AppVM I was not able to get them to work. yubikey-personalization-gui
can’t find a yubikey - I thought that is a standard and other vendors products would be recognized as well. chromium
does recognize the devices but can’t erase or write to them.
Does anyone have experience with alternative vendors? Do I have to take further steps like rebooting (which makes installation in the template a must) to work with U2F, OTP and challenge-response?
@arkenoi: you wrote in another thread, OTP and challenge-response are proprietary…
@sven: you wrote in another thread to write to /rw/config
of the sys-usb-template. Why does one want to run yubikey-personalization-gui
in sys-usb, anyway? I believe I understand why one wants to create keys in a disposableVM, but why in sys-usb?