/
guid.conf
76 lines (66 loc) · 2.97 KB
/
guid.conf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
# Default configuration file for Qubes GUI daemon
# (For syntax go http://www.hyperrealm.com/libconfig/libconfig_manual.html)
# EDITING THIS FILE WILL NOT HAVE ANY EFFECT! It is not read by the GUI daemon
# anymore, and is left here for reference only. To configure the GUI daemon,
# use qvm-features (see 'man qvm-features' for details).
global: {
# Allow full-screen access
#
# See https://www.qubes-os.org/doc/full-screen-mode/
# for discussion of risks and alternatives.
#
# allow_fullscreen = false;
# override_redirect protection
#
# You might disable this for of a VM that may create very large windows that
# have the override_redirect flag set. This flag allows a window to
# unconditionally cover all other windows and causes the window manager to
# make it impossible to minimize or hide the window in question.
#
# Qubes OS will prevent a window having the override_redirect flag set from
# covering more than 90% of the screen as a protection measure. The
# protection measure unsets this flag and lets the window manager (and hence
# the user) control the window.
#
# If this causes issues with a VM's or an application's usage, you can
# disable this protection for a specific VM.
#
# override_redirect_protection = true;
# Allow or disable the use of the override_redirect flag. You can set this to
# "disabled" to ignore this flag and render as if the flag were not set.
# The default is "allow", as "disabled" will break many applications.
# Qubes OS already provides protection against serious abuse of
# override_redirect windows.
# override_redirect = "allow";
# Forbid or allow X11 subwindows (windows with a parent other than the root
# window). None of the GUI agents included with Qubes OS create such
# windows, and future versions of the GUI agent also will not create them.
# Furthermore, subwindows were involved in one of the exploits for QSB#072.
# Therefore, the default is to disable subwindows. Applications that *use*
# subwindows are not affected and will still work.
# subwindows = "forbid";
# Allow non-ASCII UTF-8 title characters. This increases the risk of a
# vulnerability in the text rendering stack being exploited, so the default is
# false.
#
# allow_utf8_titles = false;
# Secure copy and paste keyboard shortcuts
#
# Before changing secure_(copy|paste)_sequence below because you need
# Ctrl-Shift-(c|v) for normal terminal copy&paste, please note that you can
# also use Ctrl-Ins and Shift-Ins for that (thus: no need to change). If you
# still want to change, here is a list of valid modifier key names: "Ctrl",
# "Shift", "Mod4" (Windows key)
#
# secure_copy_sequence = "Ctrl-Shift-c";
# secure_paste_sequence = "Ctrl-Shift-v";
# Limit number of windows
#
# windows_count_limit = 500;
# Set how tray icons are handled. See `man qubes-guid` for options.
#
# trayicon_mode = "border1";
# Timeout when waiting for qubes-gui-agent
#
# startup_timeout = 45;
}