qubes-doc/user/common-tasks/copy-paste.md
Andrew David Wong f5cb15d1a3
Fix typo
2020-11-16 04:54:31 -08:00

4.0 KiB

layout title permalink redirect_from
doc Copying and pasting text between qubes /doc/copy-paste/
/en/doc/copy-paste/
/doc/CopyPaste/
/wiki/CopyPaste/

Copying and pasting text between qubes

This page is about copying and pasting plain text. If you wish to copy more complex data, such as rich text or images, see copying and moving files between qubes. For dom0, see copying from (and to) dom0.

Qubes OS features a secure inter-qube clipboard that allows you to copy and paste text between qubes.

In order to copy text from qube A to qube B:

  1. Select text from the source app in qube A, then copy it normally (e.g., by pressing Ctrl+C).

  2. With the source app in qube A still in focus, press Ctrl+Shift+C. This copies the text from qube A's clipboard to the inter-qube clipboard.

  3. Select the target app in qube B and press Ctrl+Shift+V. This copies the text from the inter-qube clipboard to qube B's clipboard and clears the inter-qube clipboard, ensuring that only qube B will have access to the copied text.

  4. Paste the text in the target app in qube B normally (e.g., by pressing Ctrl+V).

This process might look complicated at first glance, but in practice it is actually very easy and fast once you get used to it. At the same time, it provides you with full control over exactly which qube receives the content of the inter-qube clipboard every time.

Security

The inter-qube clipboard system is secure because it doesn't allow any qube other than your selected target to steal any contents from the inter-qube clipboard. Without such a system in place, any password you were to copy from the password manager in your vault qube to another qube, for example, would immediately be leaked to every other running qube in the system, including qubes that are untrusted by default, such as sys-net. By giving you precise control over exactly which qube receives the inter-qube clipboard content, then immediately wiping the inter-qube clipboard afterward, Qubes OS protects the confidentiality of the text being copied.

However, one should keep in mind that performing a copy and paste operation from less trusted to more trusted qube is always potentially insecure, since the data that we copy could exploit some hypothetical bug in the target qube. For example, the seemingly-innocent link that we copy from an untrusted qube could turn out to be a large buffer of junk that, when pasted into the target qube's word processor, could exploit a hypothetical bug in the undo buffer. This is a general problem and applies to any data transfer from less trusted to more trusted qubes. It even applies to copying files between physically separate (air-gapped) machines. Therefore, you should always copy clipboard data only from more trusted to less trusted qubes.

See also this article for more information on this topic, and some ideas of how we might solve this problem in some future version of Qubes, as well as this message from qubes-devel.

Clipboard automatic policy enforcement

The Qubes clipboard RPC policy is configurable in:

/etc/qubes-rpc/policy/qubes.ClipboardPaste

You may wish to configure this policy in order to prevent user error. For example, if you are certain that you never wish to paste into your "vault" AppVM (and it is highly recommended that you do not), then you should edit the policy as follows:

@anyvm  vault   deny
@anyvm  @anyvm  ask

Shortcut configuration

The copy/paste shortcuts are configurable in:

/etc/qubes/guid.conf

If you edit a line in this file, you must uncomment it (by removing the initial # character), or else it will have no effect.

VMs need to be restarted in order for changes in /etc/qubes/guid.conf to take effect.