xpra icon
Bug tracker and wiki

This bug tracker and wiki are being discontinued
please use https://github.com/Xpra-org/xpra instead.

Opened 9 years ago

Closed 9 years ago

Last modified 9 months ago

#274 closed enhancement (fixed)

advanced clipboard filtering

Reported by: Antoine Martin Owned by: alas
Priority: major Milestone: 0.9
Component: core Version:
Keywords: clipboard security Cc:

Description (last modified by Antoine Martin)

At the moment, the only restrictions we have on clipboard data transfers are:

  • size check:

Any clipboard zlib-compressed data larger than 256KB is simply dropped with a log warning. Maybe this limit is too low? We can raise it with #275

  • some data types we drop rather than trying to handle (mostly picture formats, see #273)
  • some targets we refuse to handle:
    discard_targets = ("SAVE_TARGETS", "COMPOUND_TEXT")

It would be nice if we could inject more filters, say:

  • a regex filter for strings (client-side interpretation of encodings can make this very tricky)
  • an external filter (virus scanner, etc)
  • clipboard direction: #276

Attachments (1)

clipboard-no.png (1.7 KB) - added by Antoine Martin 9 years ago.
icon we could use to flash the system tray when content is blocked

Download all attachments as: .zip

Change History (12)

comment:1 Changed 9 years ago by Antoine Martin

Description: modified (diff)
Status: newassigned

comment:2 Changed 9 years ago by Antoine Martin

Description: modified (diff)

comment:3 Changed 9 years ago by Antoine Martin

Description: modified (diff)

Here is a hardcoded regular expression filter which will block any string containing the word "virii":

--- src/xpra/platform/clipboard_base.py	(revision 2850)
+++ src/xpra/platform/clipboard_base.py	(working copy)
@@ -123,6 +123,10 @@
             ints = struct.unpack(binfmt, data)
             return "integers", ints
         elif dformat == 8:
+            import re
+            if re.match("virii", data):
+                log.info("virii string blocked: %s", data)
+                return None, None
             return "bytes", data
             log.error("unhandled format %s for clipboard data type %s" % (dformat, dtype))

This is just an example, but it shows how trivial it would be to pattern match the keyboard data and discard data.
It only filters on the way out, but I don't think we really care about the way in: if you connect to a malicious server, surely you have bigger problems?
We'll need to check every possible (..) clipboard transfer to make sure that data isn't transferred using some other encoding which would defeat the filter. Does it work with "utf8" and "latin1", what about other encodings?

Now, I'm not sure how we can make this customizable by the user, maybe:


With a list of regular expressions stored in this file? And maybe we could ship a default file too, maybe in /etc/xpra/clipboard-filter.re

Or maybe we want to have different actions (one per file, or specified for each regex): drop (just harmless stuff that we want to ignore), alert (dangerous stuff that we want to warn about), ..

The python regular expression module is documented here and supports all standard regex constructs.

Last edited 9 years ago by Antoine Martin (previous) (diff)

comment:4 Changed 9 years ago by Antoine Martin

PoC in r2957 + r2958 - as per the man page update:

Name of a file containing regular expressions, any clipboard data 
that matches one of these regular expressions will be dropped. 
Note: at present this only applies to copying from the machine where 
this option is used, not to it. 

This is only hooked for the server: copy from server is filtered, copy from client is not. It probably makes sense to do that too?

Here's how to test:

echo virii > clipboard-filter.re
xpra start :10 --start-child=xterm --clipboard-filter-file=./clipboard-filter.re
  • attach from a client
  • type "virii" in the xterm
  • select "virii" with the mouse
  • try to paste in the client
  • you will see this message in the server log output:
    clipboard buffer contains blacklisted pattern 'virii' and has been dropped!

That's assuming that you have a client with good clipboard support (ie: Linux) - if testing with win32, the ongoing bugs may interfere with the testing.

I think that we also need to look at filtering clipboard targets (similar to #273) or at the very least verify that the targeted applications cannot avoid the filtering simply by transferring the text using rtf/utf16/whatever.

Last edited 9 years ago by Antoine Martin (previous) (diff)

comment:5 Changed 9 years ago by Antoine Martin

Owner: changed from Antoine Martin to alas

comment:6 Changed 9 years ago by alas

With an ubuntu (12.04) client the clipboard filter seems to work, but there is an element of confusion as attempts to paste yield nothing and no message. (For a few minutes I thought the linux clipboard was broken too.) For a user without a server display handy, you can imagine the reaction.

  1. One other interesting point- copying something including the element will also result in a drop. I copied viriibn and got nothing back out. Whether this is the behavior we're hoping for should be decided.

With a windows client, aside from the "expected" clipboard issues, the filter seems to drop copies from a browser window (chrome, whatever) but doesn't seem to catch/drop anything coming in from an xterm. (More headaches. Be sure to filter data transferring from Primary as well as Clipboard. (Is there a mysterious win client clipboard mechanism that is using different procedures that need to be found when getting data from Primary?) )

comment:7 Changed 9 years ago by Antoine Martin

  • we may want to notify users - though it is tricky to get the balance right between annoying users with balloon messages and not showing anything at all: applications can choose when copying their data to the clipboard and there is technically nothing stopping them from copying 10 times per second or more (and maybe this can even be done via scripting?) and this would not be a pleasant experience for the user.
  • as for substrings, the filter file contains regular expressions, so you can choose what it matches and where it matches (though generally "bad" strings should be matched anywhere). For more information on specifying regular expressions see re

I don't see much point in specifying "^virii$" to match the lone word exactly, but feel free to try it.

  • as for the windows client, the "expected" issues are meant to be resolved see #272, note that we simply do not copy PRIMARY or SECONDARY to/from the server at all now, so the fact that those are not filtered is expected behaviour: the data stays on the server - xterm selection goes to PRIMARY and stays there. We are not going to be filtering that, doing so would be ridiculously difficult since we would need to monitor the clipboard when we do not own it and "force clear" it when we do not own it - not good behaviour, not one that is expected to work well or reliably.

comment:8 Changed 9 years ago by alas

With a windows client, you can paste from an xterm's primary to the client. I'm not sure if that's a copy that I or anyone should really worry about filtering (as opposed to copying from browsers). I brought it up in case anyone else could (probably) think of a reason why it should be filtered.

If no one can think of a reason, then I guess this filter is functional, and remains only for everyone to try to maintain a file of all the things they'd like to filter from clipboard use.

comment:9 Changed 9 years ago by Antoine Martin

If you can copy anything from PRIMARY then this is a bug that I cannot explain (and cannot reproduce) and it should go under #272 not here (this ticket is about filtering).
If that's the case and filtering does work as intended, then please close this one and follow up there.

Plase follow the simple steps below to see if it still copies data from PRIMARY, and if so, post the client clipboard debug output log by running both ends with XPRA_CLIPBOARD_DEBUG=1.

Here is how I test:

  • on a windows client: connect xpra to a server and launch an xterm inside it, then also launch gtk_view_clipboard.py from this xterm
  • copy something (say CLIENTSIDE) to the client clipboard using a native windows application (any text editor will do)
  • select some text in the xterm (say SERVERSIDE) - do not copy (not that there is a way with a plain xterm?)
  • using the gtk_view_clipboard.py tool, verify that the selection has been copied to PRIMARY but not CLIPBOARD (using the "GetString" button for each type of clipboard)
  • try to paste in the windows client, the original content (CLIENTSIDE) should be pasted and nothing else

Extra tests:

  • repeat the instructions but use a text editor (or browser) on the server-side, then you can also select "COPY" from its menu and pasting on the client-side should now show the updated contents (SERVERSIDE)

Changed 9 years ago by Antoine Martin

Attachment: clipboard-no.png added

icon we could use to flash the system tray when content is blocked

comment:10 Changed 9 years ago by alas

Resolution: fixed
Status: assignedclosed

I can still copy from xterms to windows client. I've commented that in 272. The clipboard filter seems to work as advertised though, so I will close this as resolved.

comment:11 Changed 9 months ago by migration script

this ticket has been moved to: https://github.com/Xpra-org/xpra/issues/274

Note: See TracTickets for help on using tickets.