You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+26-2Lines changed: 26 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -83,8 +83,10 @@ this did not work during our tests.
83
83
Hidden=true
84
84
```
85
85
86
-
After restarting the `vault` VM again, the `gnome-keyring-daemon` should no longer start up and you can enable the *Secret
87
-
Service* integration in the *KeePassXC* Tools settings.
86
+
After restarting the `vault` VM again, `gnome-keyring-daemon` should no longer start up and you can enable the *Secret
87
+
Service* integration in the *KeePassXC* Tools settings. If `gnome-keyring-daemon` is still running, reboot your system
88
+
and make sure that you start your `vault` VM by requesting it to execute *KeePassXC* directly. If this does also not work
89
+
read the [FAQ](#FAQ) section.
88
90
89
91
Additionally, you need to expose the credentials you want to use with *qubes-keepass* to the *Secret Service* within the
90
92
database specific security settings. If you simply want to use your entire database with *qubes-keepass*, allow access
@@ -211,3 +213,25 @@ If you are really concerned about the DBus access, you can configure Keepass to
211
213
but it could still allow to exfiltrate data from your `vault` into an *online* VM. That being said, the same is true for other Qubes mechanisms like
212
214
[split-SSH](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/split-ssh.md). If having a malicious process in your `vault` VM that
213
215
exfiltrates data using your clipboard is something you worry about, you should use `ask`. If you like things more comfortable, you should use `allow` instead.
216
+
217
+
**Q**: I don't know how to stop `gnome-keyring-daemon`!?\
218
+
**A**: Apparently, no one knows. We observed several different behaviors on exactly the same template VMs. As the ultima ratio you can remove the
219
+
executable bit from your `gnome-keyring-daemon`. This method is pretty rough and could potentially break other functionality, but it seemed to work
220
+
quite reliably on our test systems. Just create a [binddir](https://www.qubes-os.org/doc/bind-dirs/) for `gnome-keyring-daemon` and remove the executable
221
+
bit by running `chmod -x /usr/bin/gnome-keyring-daemon`.
222
+
223
+
**Q**: rofi does not start up, what can I do?\
224
+
**A**: For troubleshooting, you can try to launch `qubes-keepass.py` and `qubes-keepass-dom0.sh` manually. Just run `python3 qubes-keepass.py office` in a terminal
225
+
on your `vault` VM and replace `office` by a qube name you configured credentials for. You should see *rofi* startup or get an error messaghe within the terminal
226
+
that can help you debugging. If everything worked, open a `dom0` terminal and execute something like `sleep 5 && qubes-keepass-dom0.sh`. Within the sleep timeout,
227
+
move the cursor to a qube you configured credentials for. If something goes wrong, you should see an error message within the `dom0` terminal.
228
+
229
+
**Q**: Credentials are not copied to the clipboard, what can I do?\
230
+
**A**: Make sure that the *qrexec* service in `/etc/qubes-rpc/custom.QubesKeepass` is present and executable in the desired *AppVM*. Also make sure that `xclip` is
231
+
installed. You can test whether the service is working by running `echo -n test | /etc/qubes-rpc/custom.QubesKeepass`. After executing this command, the clipboard of the
232
+
*AppVM* should contain the string `test`.
233
+
234
+
**Q**: I tried to installed *qubes-kepass* and now everything is broken!\
235
+
**A**: Keep calm, you probably have a typo within one of your policy files. When Qubes encounters a malformed policy, it blocks all *RPC* communication. Run
236
+
`sudo journalctl -b` and check for error messages indicating a malformed policy file. If you do not find it this way, just check the policy files you have edited
237
+
while installing *qubes-keepass*. Also make sure that you changed the qube names used in the example setup to the names used by your environment.
0 commit comments