desktop sharing, capturing and screenshoting

52 views
Skip to first unread message

Ray Brainer

unread,
Nov 19, 2016, 4:30:44 AM11/19/16
to qubes-users
I am having hard time to make desktop sharing in Qubes.
Within VM I see white screen.
Installing software on dom0 and using it in broadcast is denied.
What should I do?

pixel fairy

unread,
Nov 19, 2016, 6:17:53 AM11/19/16
to qubes-users

what are you trying to do? dom0 has no internet, so it cant share. you could, in theory, run a vncserver attached to a unix domain socket and then pipe that to an appvm to share it, but then you completely break qubes security model. the only app i know that actually runs a vnc server on a unix socket is qemu, so youd probably have to patch your vnc server to do this.

you could run a desktop sharing app in an appvm, and yea, most of it would be blank. its an x server with only app windows drawn. if you dont like that, you could make an hvm and share that.

either way, the incoming connection would have to get past the netvm. so, either make a port forward in netvm (and possibly in firewallvm), or initiate the connection from your appvm. something vnc can do. or use ssh -R to make a reverse tunnel to somewhere the viewer can reach.

if you have a server you and the viewer can both reach, you could also run a remote desktop there. or, if all you need is a terminal session, screen or tmux, which will be faster than sharing any gui desktop. in either of these cases, you get a persistent session. either or both of you can detach and leave it running and come back to it at leisure.

Manuel Amador (Rudd-O)

unread,
Nov 19, 2016, 6:21:24 AM11/19/16
to qubes...@googlegroups.com
On 11/19/2016 09:30 AM, Ray Brainer wrote:
> I am having hard time to make desktop sharing in Qubes.
> Within VM I see white screen.

X server in VM does not allow screengrabs at all. Security measure.

> Installing software on dom0 and using it in broadcast is denied.
> What should I do?
>

dom0 does not allow networking.

You may be able to hook some sort of bridge using qvm-run --pass-io and
socat, but it sounds like a bad idea.

Qubes OS is intended to be a highly-secure OS. Sharing the screen of
dom0 with other machines defeats that purpose entirely.


--
Rudd-O
http://rudd-o.com/

Reply all
Reply to author
Forward
0 new messages