Skip to content

Commit de76e43

Browse files
authored
Merge pull request #4 from codewhitesec/feat/extend-faq
Extend the FAQ
2 parents 8df38dd + 128024b commit de76e43

File tree

1 file changed

+26
-2
lines changed

1 file changed

+26
-2
lines changed

README.md

Lines changed: 26 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -83,8 +83,10 @@ this did not work during our tests.
8383
Hidden=true
8484
```
8585

86-
After restarting the `vault` VM again, the `gnome-keyring-daemon` should no longer start up and you can enable the *Secret
87-
Service* integration in the *KeePassXC* Tools settings.
86+
After restarting the `vault` VM again, `gnome-keyring-daemon` should no longer start up and you can enable the *Secret
87+
Service* integration in the *KeePassXC* Tools settings. If `gnome-keyring-daemon` is still running, reboot your system
88+
and make sure that you start your `vault` VM by requesting it to execute *KeePassXC* directly. If this does also not work
89+
read the [FAQ](#FAQ) section.
8890

8991
Additionally, you need to expose the credentials you want to use with *qubes-keepass* to the *Secret Service* within the
9092
database specific security settings. If you simply want to use your entire database with *qubes-keepass*, allow access
@@ -211,3 +213,25 @@ If you are really concerned about the DBus access, you can configure Keepass to
211213
but it could still allow to exfiltrate data from your `vault` into an *online* VM. That being said, the same is true for other Qubes mechanisms like
212214
[split-SSH](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/split-ssh.md). If having a malicious process in your `vault` VM that
213215
exfiltrates data using your clipboard is something you worry about, you should use `ask`. If you like things more comfortable, you should use `allow` instead.
216+
217+
**Q**: I don't know how to stop `gnome-keyring-daemon`!?\
218+
**A**: Apparently, no one knows. We observed several different behaviors on exactly the same template VMs. As the ultima ratio you can remove the
219+
executable bit from your `gnome-keyring-daemon`. This method is pretty rough and could potentially break other functionality, but it seemed to work
220+
quite reliably on our test systems. Just create a [binddir](https://www.qubes-os.org/doc/bind-dirs/) for `gnome-keyring-daemon` and remove the executable
221+
bit by running `chmod -x /usr/bin/gnome-keyring-daemon`.
222+
223+
**Q**: rofi does not start up, what can I do?\
224+
**A**: For troubleshooting, you can try to launch `qubes-keepass.py` and `qubes-keepass-dom0.sh` manually. Just run `python3 qubes-keepass.py office` in a terminal
225+
on your `vault` VM and replace `office` by a qube name you configured credentials for. You should see *rofi* startup or get an error messaghe within the terminal
226+
that can help you debugging. If everything worked, open a `dom0` terminal and execute something like `sleep 5 && qubes-keepass-dom0.sh`. Within the sleep timeout,
227+
move the cursor to a qube you configured credentials for. If something goes wrong, you should see an error message within the `dom0` terminal.
228+
229+
**Q**: Credentials are not copied to the clipboard, what can I do?\
230+
**A**: Make sure that the *qrexec* service in `/etc/qubes-rpc/custom.QubesKeepass` is present and executable in the desired *AppVM*. Also make sure that `xclip` is
231+
installed. You can test whether the service is working by running `echo -n test | /etc/qubes-rpc/custom.QubesKeepass`. After executing this command, the clipboard of the
232+
*AppVM* should contain the string `test`.
233+
234+
**Q**: I tried to installed *qubes-kepass* and now everything is broken!\
235+
**A**: Keep calm, you probably have a typo within one of your policy files. When Qubes encounters a malformed policy, it blocks all *RPC* communication. Run
236+
`sudo journalctl -b` and check for error messages indicating a malformed policy file. If you do not find it this way, just check the policy files you have edited
237+
while installing *qubes-keepass*. Also make sure that you changed the qube names used in the example setup to the names used by your environment.

0 commit comments

Comments
 (0)