New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

provide GUI mechanism (Qubes Manager, Settings, etc) for enabling USB keyboard #2329

Open
mfc opened this Issue Sep 20, 2016 · 2 comments

Comments

@mfc
Member

mfc commented Sep 20, 2016

I couldn't find a ticket tracking this. The options available to the user for enabling USB keyboard should be available to the user through a GUI, with appropriate warning.

@jpouellet

This comment has been minimized.

Show comment
Hide comment
@jpouellet

jpouellet Apr 2, 2017

Contributor

Here's some more wishful thinking:

Even better would be to detect how the keyboard is attached during install and set this automatically. I have had friends reinstall without sys-usb because they were unable to enable it without a working keyboard with which to do so.

Additionally, some informative message could be shown during install or on first boot stating that this is the case on your system, and pointing them to the security warning in the docs about usb keyboards making sys-usb more trusted (or perhaps duplicate the warning directly in a message rather than point them at the docs).

Yes, input from sys-usb is not without danger, but I believe it's in people's best interest to have a system with a high-liability sys-usb (and be informed of that) than to have their initial Qubes install not have any way of giving input to dom0. See also #2736

Contributor

jpouellet commented Apr 2, 2017

Here's some more wishful thinking:

Even better would be to detect how the keyboard is attached during install and set this automatically. I have had friends reinstall without sys-usb because they were unable to enable it without a working keyboard with which to do so.

Additionally, some informative message could be shown during install or on first boot stating that this is the case on your system, and pointing them to the security warning in the docs about usb keyboards making sys-usb more trusted (or perhaps duplicate the warning directly in a message rather than point them at the docs).

Yes, input from sys-usb is not without danger, but I believe it's in people's best interest to have a system with a high-liability sys-usb (and be informed of that) than to have their initial Qubes install not have any way of giving input to dom0. See also #2736

@jpouellet jpouellet referenced this issue in QubesOS/qubes-app-linux-input-proxy Apr 2, 2017

Merged

Move security warning to qubes-doc #4

@mfc

This comment has been minimized.

Show comment
Hide comment
@mfc

mfc Apr 3, 2017

Member

I would make that a separate ticket.

Member

mfc commented Apr 3, 2017

I would make that a separate ticket.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment