Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upVM started via qubes.VMShell has qubes-guid running as root, breaks Qubes clipboard #1768
Comments
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Feb 21, 2016
Member
How do you start your main VM? Is it set to autostart? Does it happen
too if you start it manually (for example from Qubes Manager)?
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
|
How do you start your Best Regards, |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
mattmccutchen
Feb 21, 2016
Indeed, my main VM is set to autostart. If I restart main using Qubes Manager, stop research and start it again via qubes.VMShell, then the clipboard works (after I delete the existing root-owned /var/run/qubes/qubes-clipboard* files). Perhaps the difference is that qrexec-daemon appears to run as root for autostarted VMs but as the dom0 user for VMs started with Qubes Manager.
mattmccutchen
commented
Feb 21, 2016
|
Indeed, my |
andrewdavidwong
added
bug
C: core
P: minor
labels
Apr 6, 2016
marmarek
added this to the Release 3.0 updates milestone
May 15, 2016
marmarek
self-assigned this
May 15, 2016
marmarek
closed this
in
marmarek/old-qubes-gui-daemon@cc648e4
May 18, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
May 25, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Jun 7, 2016
added a commit
to QubesOS/qubes-gui-daemon
that referenced
this issue
Jun 25, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Jun 25, 2016
Member
Automated announcement from builder-github
The package qubes-gui-dom0-3.1.4-1.fc20 has been pushed to the r3.1 testing repository for dom0.
To test this update, please install it with the following command:
sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing
|
Automated announcement from builder-github The package
|
marmarek
added
the
r3.1-dom0-cur-test
label
Jun 25, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Jul 25, 2016
Member
Automated announcement from builder-github
The package qubes-gui-dom0-3.1.4-1.fc20 has been pushed to the r3.1 stable repository for dom0.
To install this update, please use the standard update command:
sudo qubes-dom0-update
Or update dom0 via Qubes Manager.
|
Automated announcement from builder-github The package
Or update dom0 via Qubes Manager. |
mattmccutchen commentedFeb 21, 2016
From my
mainAppVM, I ran a command withqvm-run research ..., which automatically started theresearchAppVM and left itsqubes-guidin dom0 running as root. Then I tried to copy and paste some text fromresearchtomain, but nothing happened when I pressed the secure paste key. Looks like the problem was that the/var/run/qubes/qubes-clipboard*files were created with root as owner and couldn't be read byqubes-guidfor themainAppVM. Something should change so that this sequence of operations works correctly.(I don't want to hear heckling about my usage of qubes.VMShell; it's consistent with my current security model, and I presume the same problem would affect restricted inter-AppVM RPC services.)