-
Notifications
You must be signed in to change notification settings - Fork 46
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Consider supporting limited copy/paste #526
Comments
Relevant upstream conversation here: QubesOS/qubes-issues#3415 (comment) where @marmarek writes:
|
We discussed this more today as part of our SecureDrop Client Sync. 1) One possible mitigation for password copy/paste mistakes is to wipe the clipboard anytime we transition from the login screen to the client window (online or offline). This is tracked in freedomofpress/securedrop-client#1051 2) Assuming we continue to prevent all copy/paste by default, we may want to provide a supported method to selectively permit it. We discussed using tags, e.g.:
In this manner, admins could be empowered to use a Vault VM, secure messaging VMs, or other select VMs, without permitting copy/paste across the whole system. 3) To support copying client messages/replies, we need to also make their content selectable in the client; this is tracked in freedomofpress/securedrop-client#1052 If we have consensus on 2 above or some variant thereof, we can use this issue to track it. |
Currently we prevent copy/paste in all VMs that are part of the project. As we enter real-world usage, we can anticipate an increasing need for copy/paste for a number of situations, e.g.:
vault
VMThrough RPC policies, we can control this permission with directionality for each VM. We should carefully consider changes to clipboard policy and behavior in the context of our overall threat model.
In particular:
sd-app
and purge the clipboard after a paste)?The text was updated successfully, but these errors were encountered: