Hello Qubes community ,
I’m trying to enable copy/paste functionality to and from dom0 on a test machine for faster workflow iterations during development/experimentation. I know this is highly insecure and not recommended for production use—I’m fully aware of the risks like potential clipboard-based attacks or data leakage—but this is strictly for a non-critical test setup.
I attempted to create a policy file in /etc/qubes/policy.d/ named 30-allow-dom0-copypaste.policy with the following content:
qubes.ClipboardCopy dom0 @anyvm allow
qubes.ClipboardPaste dom0 @anyvm allow
qubes.ClipboardCopy @anyvm dom0 allow
qubes.ClipboardPaste @anyvm dom0 allow
However, this doesn’t seem to work—copy/paste still isn’t enabled. Did I miss something in the syntax, file naming, or do I need to restart a service/reload policies? Is there another way to force-enable this (via config files or commands)?
Any solutions or tips would be greatly appreciated.
Thanks!