-
Notifications
You must be signed in to change notification settings - Fork 46
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Qubes 4.1 installer does not create sys-usb #769
Comments
@creviera Maybe you could give some context about the scenario in which your |
Context
STR
Expected
Actual
NotesI think we should report this upstream and the workaround could be something we do depending on timeline. Since each pilot admin will be manually reinstalling Qubes 4.1 anyway, I think it would be fine to provide steps like we did for the |
In this case, I guest USB keyboard was in use - which prevents creating sys-usb by default.
This indeed looks wrong. Can you check |
@marmarek, yes, I can check on
|
Can you check if any of those found files in /run/udev/data are about USB devices? Simply check their content, there should several device properties. |
Your guess is correct @marmarek, I had a USB keyboard (and mouse) attached. Thanks for the explanation 👍 |
@marmarek, it looks like your guess that some devices get miss-categorized as a usb disk or keyboard is correct. Looking at the 4 results above where
I'm not sure the proper way to fix this? If I were to edit these incorrect entries (to what? I don't know...) and reload, would that resolve this issue? |
Ugh, I guess "RFIDeas USB Keyboard" is some internal device, right? Is there any option to disable it for the installation time? Maybe some BIOS setting? Anyway, for the current released ISO, I don't have better solution than create sys-usb manually after installation. For future ISO (maybe even including 4.1.1), I'll consider relaxing the check to allow creating sys-usb in case of USB keyboard, not hard disable it. |
That sounds good and like a nice future improvement! Thanks for looking into it @marmarek :) For now, we can just update our docs with a workaround before we release Qubes 4.1 support (so far it seems to only have happened on a T490). |
@zenmonkeykstop also tested on a T490 and did not run into this issue. I'm going to wipe and re-install Qubes 4.1 (probably not until next week) so I'll try repro'ing again. |
Just noting my workaround is to run Reboot seems to be necessary for thumb drives to be show up in the Devices menu under the |
Guessing you meant |
FYI, this will not make into 4.1.1, the failure mode (creating sys-usb, when the main keyboard is on USB) is too risky without more comprehensive USB keyboard handling. |
This was addressed in our documentation for now via freedomofpress/securedrop-workstation-docs#112. Since this is ultimately an upstream issue, I would suggest we remove it from our project board for now, but keep it open for tracking purposes. |
While understandable, do note this breaks the entire process when installing via sdw-admin on an existent Qubes 4.1 setup with a USB keyboard (such as NUC system). The result is being locked out of access first, and then all screen output once the screensaver kicks in. Not ideal. |
FWIW, 4.1.2 installer will allow creating sys-usb even if USB keyboard is present. In such case, it will list detected "keyboards" (which helps identifying if that's really a keyboard, not another device like in this issue), and then gives an option to enable |
I don't see how this is an upstream issue BTW, as the invoked command responsible for the loss of sys-usb is the Securedrop Workstation's installer own. Do you have any suggestions as to how we can work around this without making a setup inoperable? |
The original issue was about not creating sys-usb because of some device was detected as a keyboard (in that case, it was some card reader), but no actual USB keyboard was in use. The new installer feature handles this case. As for a system where you do need to use USB keyboard, that's a different story. There are two things here:
|
Agreed, although this introduces a significant amount of complexity for administrators, as you need to properly review the hardware and how the controllers are connected. In some cases there is usually two controllers (I should verify), but it isn't rare to find systems with only one (for NUCs and similar setups). I have reproduced the issue using the securedrop-workstation updater. I suspect the culprit is how the sys-usb shutdown is handled... (since they update the base template, and then restart each one of its users). So, I contest again the blame on Qubes itself. This is very much a securedrop-workstation issue. I don't have the time to test a new install right now, but 4.1 has handled USB keyboard setups fine for me. Unrelated to this is something that would be a good PR: have an UI that allows configuring one specific USB storage device for SDW, and leave the rest of them alone. The whole architecture of repeating sys-usb functionality with another qube is cumbersome and it also does not quite solve the issue (in the end all we want is to limit/assign specific USB devices to one target qube, which could be something to work on upstream, but since they are using their own sys-usb type qube they can do that on their own and contribute it to upstream if it is sound)... |
Hurray! I'll be able to test the new installer (guessing it's part of |
Agreed, and I would be happy to create a separate issue for that next week in the securedrop-workstation repo, but I first want to check with @gonzalo-bulnes and others on the SecureDrop team if that's something we care about. |
Replying to @creviera's question:
Short answer: this is a low priority IMHO. Longer answer: In the context of the SecureDrop Workstation, I do not care much about making sure the Qubes OS installer creates a
|
Parent issue: #600
Description
If you have an external keyboard or other USB device attached during installation,
sys-usb
will not be created when Qubes 4.1 is installed. If you are using a T490, Qubes 4.1 will not create asys-usb
VM because it thinks some internal hardware is an external USB device.To resolve this issue, we need to repro the T490 STR below and come up with a workaround for users who end up without a
sys-usb
VM. By default, we are recommending that the VM be disposable. To test our workaround we'll need to verify that:sd-devices
via the client.Once we publish a workaround in our docs, we can consider this issue resolved.
Context
Hardware: T490
Fresh R4.1 install with all default options:
First reported in Initial support for Qubes 4.1 #751 (comment)
STR
Expected
sys-usb
Actual
sys-usb
by defaultNotes
I think we should report this upstream and the workaround could be something we do depending on timeline. Since each pilot admin will be manually reinstalling Qubes 4.1 anyway, I think it would be fine to provide steps like we did for the
sys-net
issue (that I run into each time I reinstall Qubes on my T490): https://workstation.securedrop.org/en/stable/admin/hardware.html?highlight=pci#lenovo-thinkpad-t490-with-8th-generation-intel-core-processor. It should just be a one-step instruction to createsys-usb
manually:sudo qubesctl state.sls qvm.sys-usb
The original report below will be resolved by making sure we ask users to disconnect USB devices while running the installer (see #769 (comment)).
The text was updated successfully, but these errors were encountered: