Re: [Spice-devel] [virt-tools] Feature Request - Secure clipboard

2015-04-28 Thread Marc-André Lureau
Hi - Original Message - > Wouldn't it be possible to achieve something very close with "lazy" > transfer of C&P data only after paste event? In that case, when you'd > copy something in source VM, it would be available in there and in > client but it would get copied to guest's clipboard o

Re: [Spice-devel] [virt-tools] Feature Request - Secure clipboard

2015-04-28 Thread David Jaša
Wouldn't it be possible to achieve something very close with "lazy" transfer of C&P data only after paste event? In that case, when you'd copy something in source VM, it would be available in there and in client but it would get copied to guest's clipboard only if you switch to there and paste ther

Re: [Spice-devel] [virt-tools] Feature Request - Secure clipboard

2015-04-27 Thread Alex Wauck
On Mon, 27 Apr 2015 21:10:02 + gra...@ruggedinbox.com wrote: > It shouldn't conflict because the super copy paste hotkey combination to > allow a vm to read the global clipboard should come into effect only > when the VM window is in focus rather than the app running inside it. > Then when

Re: [Spice-devel] [virt-tools] Feature Request - Secure clipboard

2015-04-27 Thread gramps
On 2015-04-27 15:24, Alex Wauck wrote: On Sun, 26 Apr 2015 17:52:55 +0200 gra...@ruggedinbox.com wrote: Requires 4 stages: Ctrl-C (in the source VM) Ctrl-Shift-C (tells Qubes: copy this VM buffer into global clipboard) Ctrl-Shift-V (in the destination VM: tells Qubes: make global clipboard av

Re: [Spice-devel] [virt-tools] Feature Request - Secure clipboard

2015-04-27 Thread gramps
On 2015-04-27 10:35, Uri Lublin wrote: On 04/27/2015 11:38 AM, Frediano Ziglio wrote: A secure clipboard is nice to have becuase there's no tradeoff between convenience and safety. A vm can read the global clipboard only when you want it. The Xen based Qubes has it and I don't see why KVM's s

Re: [Spice-devel] [virt-tools] Feature Request - Secure clipboard

2015-04-27 Thread Alex Wauck
On Sun, 26 Apr 2015 17:52:55 +0200 gra...@ruggedinbox.com wrote: > Requires 4 stages: > Ctrl-C (in the source VM) > Ctrl-Shift-C (tells Qubes: copy this VM buffer into global clipboard) > Ctrl-Shift-V (in the destination VM: tells Qubes: make global clipboard > available to this VM) > Ctrl-V (in t

Re: [Spice-devel] [virt-tools] Feature Request - Secure clipboard

2015-04-27 Thread Frediano Ziglio
> > On 04/27/2015 11:38 AM, Frediano Ziglio wrote: > >> > >> A secure clipboard is nice to have becuase there's no tradeoff between > >> convenience and safety. A vm can read the global clipboard only when you > >> want it. The Xen based Qubes has it and I don't see why KVM's spice and > >> libvir

Re: [Spice-devel] [virt-tools] Feature Request - Secure clipboard

2015-04-27 Thread Uri Lublin
On 04/27/2015 11:38 AM, Frediano Ziglio wrote: A secure clipboard is nice to have becuase there's no tradeoff between convenience and safety. A vm can read the global clipboard only when you want it. The Xen based Qubes has it and I don't see why KVM's spice and libvirt can't. Here is how they d

Re: [Spice-devel] [virt-tools] Feature Request - Secure clipboard

2015-04-27 Thread Frediano Ziglio
> > A secure clipboard is nice to have becuase there's no tradeoff between > convenience and safety. A vm can read the global clipboard only when you > want it. The Xen based Qubes has it and I don't see why KVM's spice and > libvirt can't. Here is how they did it: > > > slide 10 from > > https

[Spice-devel] [virt-tools] Feature Request - Secure clipboard

2015-04-26 Thread gramps
A secure clipboard is nice to have becuase there's no tradeoff between convenience and safety. A vm can read the global clipboard only when you want it. The Xen based Qubes has it and I don't see why KVM's spice and libvirt can't. Here is how they did it: slide 10 from https://events.linuxfounda