Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upprovide GUI mechanism (Qubes Manager, Settings, etc) for enabling USB keyboard #2329
Comments
mfc
added
enhancement
help wanted
C: qubes-manager
P: minor
UX
labels
Sep 20, 2016
andrewdavidwong
added this to the Far in the future milestone
Dec 24, 2016
jpouellet
referenced this issue
Apr 2, 2017
Open
Auto-detect how keyboard is attached (USB or not) #2736
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
jpouellet
Apr 2, 2017
Contributor
Here's some more wishful thinking:
Even better would be to detect how the keyboard is attached during install and set this automatically. I have had friends reinstall without sys-usb because they were unable to enable it without a working keyboard with which to do so.
Additionally, some informative message could be shown during install or on first boot stating that this is the case on your system, and pointing them to the security warning in the docs about usb keyboards making sys-usb more trusted (or perhaps duplicate the warning directly in a message rather than point them at the docs).
Yes, input from sys-usb is not without danger, but I believe it's in people's best interest to have a system with a high-liability sys-usb (and be informed of that) than to have their initial Qubes install not have any way of giving input to dom0. See also #2736
|
Here's some more wishful thinking: Even better would be to detect how the keyboard is attached during install and set this automatically. I have had friends reinstall without sys-usb because they were unable to enable it without a working keyboard with which to do so. Additionally, some informative message could be shown during install or on first boot stating that this is the case on your system, and pointing them to the security warning in the docs about usb keyboards making sys-usb more trusted (or perhaps duplicate the warning directly in a message rather than point them at the docs). Yes, input from sys-usb is not without danger, but I believe it's in people's best interest to have a system with a high-liability sys-usb (and be informed of that) than to have their initial Qubes install not have any way of giving input to dom0. See also #2736 |
jpouellet
referenced this issue
in QubesOS/qubes-app-linux-input-proxy
Apr 2, 2017
Merged
Move security warning to qubes-doc #4
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
I would make that a separate ticket. |
mfc commentedSep 20, 2016
I couldn't find a ticket tracking this. The options available to the user for enabling USB keyboard should be available to the user through a GUI, with appropriate warning.