looking for quickest way to copy text from dom0-Terminal to another VM

126 views
Skip to first unread message

gone

unread,
Jan 25, 2019, 3:04:07 PM1/25/19
to qubes...@googlegroups.com
1st of all, I have read this:
https://www.qubes-os.org/doc/copy-from-dom0/

Maybe I just draw a mental blank but I can't find a really
quick way to copy text (not files) from dom0-Terminal to
another VM (into a post like this for instance). I thinking
of some easy and logical keyboardcshortcuts like the ones
that exist for copying text between domUs.
When I've marked some arbitrary textlines in the dom0
terminal and then use "copy" from the right-clic-menu, how
can I go on most easily?


haaber

unread,
Jan 25, 2019, 7:02:19 PM1/25/19
to qubes...@googlegroups.com
I am annoyed by the same thing, but maybe there is a security
consideration I do not know. So I copy a text with mouse, cat it in a
txt file and copy-to-vm it away in my mail-vm for example. Don't know if
there is faster. Bernhard

799

unread,
Jan 25, 2019, 7:40:38 PM1/25/19
to gone, qubes-users
Hello,

Am Fr., 25. Jan. 2019, 21:04 hat gone <su...@posteo.net> geschrieben:
1st of all, I have read this:
https://www.qubes-os.org/doc/copy-from-dom0/

Maybe I just draw a mental blank but I can't find a really
quick way to copy text (not files) from dom0-Terminal to
another VM (into a post like this for instance). I thinking
of some easy and logical keyboardcshortcuts like the ones
that exist for copying text between domUs.

Feel free to use this script, which needs xclip to be installed in dom0 and also the AppVM.

There is also a never version which can copy from/to dom0 in one command.
Haven't uploaded it to GitHub yet.
Not that nice as the qubes clipboard but it does its job and I have always a dom0 terminal open.

- O

gone

unread,
Jan 25, 2019, 8:03:27 PM1/25/19
to qubes...@googlegroups.com
haaber wrote on Sat, 26 January 2019 00:01
> --

Thanks Bernhard, that's what I also did so far, however it's
not very convenient.

gone

unread,
Jan 25, 2019, 8:10:27 PM1/25/19
to qubes...@googlegroups.com
799 wrote on Sat, 26 January 2019 00:40
> Hello,
>
> Feel free to use this script, which needs xclip to be
> installed in dom0 and
> also the AppVM.
>
> https://github.com/one7two99/my-qubes/blob/master/home/bin/q
> vm-xclip-from-vm
>
> There is also a never version which can copy from/to
> dom0 in one command.
> Haven't uploaded it to GitHub yet.
> Not that nice as the qubes clipboard but it does its job
> and I have always
> a dom0 terminal open.
> --

Thank you 799, that sounds very interesting.

Eric

unread,
Jan 25, 2019, 9:02:28 PM1/25/19
to qubes...@googlegroups.com
Personally I will not instal anything into dom0 that is not
from an ITL authorised repo.

Is a real PITA that the inter appVM cut and paste does not
work for dom0 - can there be a switch somewhere that says I
am going to be careful and do it? Feature request?

Only for package names into dom0 and error text out when
things don't work - like just recently.

Thanks, Eric

Andrew David Wong

unread,
Jan 25, 2019, 10:33:18 PM1/25/19
to Eric, qubes...@googlegroups.com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Please take a look at this issue:

https://github.com/QubesOS/qubes-issues/issues/3571

- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-----BEGIN PGP SIGNATURE-----
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=O/Ws
-----END PGP SIGNATURE-----

799

unread,
Jan 26, 2019, 3:40:02 AM1/26/19
to Andrew David Wong, Eric, qubes-users


Am Sa., 26. Jan. 2019, 04:33 hat Andrew David Wong <a...@qubes-os.org> geschrieben:

Please take a look at this issue:

https://github.com/QubesOS/qubes-issues/issues/3571


Happy to see that this topic (no clipboard from dom0) is at least known.
I don't agree that copying from dom0 is dangerous because "The user could have secrets in dom0, e.g., keyfiles".


My passwords are in a vault VM and if someone messes up handling from dom0 it is very likely that he/she didn't understand the security concept behind Qubes and therefore the user is likely the biggest attack surface NOT the clipboard.

Please offer a solution where the user can choose (free software!!) to enable/disable the clipboard (choosing means freedom).

It seems there is a workaround, can this be bound to a key (maybe also using xclip in dom0)?
echo -n dom0 > qubes-clipboard.bin.source .

- O

Stuart Perkins

unread,
Jan 26, 2019, 8:32:41 AM1/26/19
to qubes...@googlegroups.com
Since dom0 exists to do the sole job of managing the other VM's, one must question why the text you wish to insert into another domain is "in" dom0 to begin with. The less you do with dom0 the better. Everything you do in dom0 which is NOT simply managing the other domains is a potential security hole.

Stuart - Qubes 3.2 user on a Ghosted Lenovo T520.

gone

unread,
Jan 26, 2019, 9:45:41 AM1/26/19
to qubes...@googlegroups.com
Stuart Perkins wrote on Sat, 26 January 2019 13:32
> On Sat, 26 Jan 2019 01:01:44 +0100
> Since dom0 exists to do the sole job of managing the
> other VM's, one must question why the text you wish to
> insert into another domain is "in" dom0 to begin with.
> --

That's completely right and also the reason why I would not
want to create my questions about qubesOS to this board
somehow in dom0. But when I have a question about dom0 I
often have to quote several lines of text from a dom0
terminal and get those to an www- or mailagent in an appVM.
In order to avoid frustration, I think this should not be
too laborious to handle.

Andrew David Wong

unread,
Jan 26, 2019, 4:54:41 PM1/26/19
to 799, qubes-users
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 26/01/2019 2.39 AM, 799 wrote:
> Am Sa., 26. Jan. 2019, 04:33 hat Andrew David Wong
> <a...@qubes-os.org> geschrieben:
>
>>
>> Please take a look at this issue:
>>
>> https://github.com/QubesOS/qubes-issues/issues/3571
>
>
>
> Happy to see that this topic (no clipboard from dom0) is at least
> known. I don't agree that copying from dom0 is dangerous because
> "The user could have secrets in dom0, e.g., keyfiles".
>
>
> My passwords are in a vault VM and if someone messes up handling
> from dom0 it is very likely that he/she didn't understand the
> security concept behind Qubes and therefore the user is likely the
> biggest attack surface NOT the clipboard.
>

There are legitimate uses for secrets in dom0. For example, the
Qubes backup system requires the encryption secret for the backup to
be in dom0.

> Please offer a solution where the user can choose (free
> software!!) to enable/disable the clipboard (choosing means
> freedom).
>

Well, "free software" doesn't mean that anyone else is forced to
implement whichever features you personally want for you in order to
give you all the choices you want. Rather, it means that you're free
to modify the software yourself in order to use it the way you want:

https://en.wikipedia.org/wiki/Free_software

- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlxM1wMACgkQ203TvDlQ
MDC0JA//e3LtdyTqodBJypPxispE2136xpCXZzB6olKJ7Ylz2wTxZG1VUSvKjiQR
rb3QOZzIJpebcNkBLd4cQzNJmDEYL9uUK+FkvsvDbhO08wk7MYcKSzwfCRfjWMuP
7six9Aag4n7Iiov5dSjoD/y7MMIyudfOW7PEN7CG5mmgVYGWgtUD3VVas/xp6wE+
JygAe1Y78xQo9rs9LQTPU0VT2O1IDIpcJ+qgZpdIlHmEqPLqqJKp9IHviKjhqceX
I8apkxdkfE8jPZ7CQm8QIcKmCv1mxGfpztKDFD3UwQG8m8xOr5EyzUasJUp3pYk8
vUHHpa/y2kGLTJOmYlCLqMoHhaOvmtr2slScv6qbN4NvUCQksJUYdkfHNwoNqhV+
8eeuJG6Bk0KtahWdk2hMvFD4xv3UzaveC6wuzX9GcjVlT/XURJlt2oFeHRAasMCD
8emT4zcIUR5V+2oiwWUspLISW+0GD2+OtibhiyXKfrJcvnIe8N6MDBm0WjAvK5lE
c9gEAFfZdW38Fl+Q6trnWDahzOCLdL1H84nLYUUz4GHaF1CJRPt8rz29R0U21C8E
8/cHz1W5ILLe4VNdvDMri3fVz4jN9ScK+doRZTW6F4d7g9z0ZRFHUM55MsK2sLC1
wlGRemCQTY7tNHE4ilw92AUYK4k7Fx0zRphyfJX3uHQ/dsAybsI=
=CIzB
-----END PGP SIGNATURE-----

unman

unread,
Jan 26, 2019, 7:58:46 PM1/26/19
to qubes-users
Of course there's a workaround:
<some command> | tee file
qvm-copy-to-vm <qube> file

You can script this and create a key binding yourself.
Reply all
Reply to author
Forward
0 new messages