[LightDM] light-locker security

Dodier-Lazaro, Steve s.dodier-lazaro.12 at ucl.ac.uk
Fri Feb 14 11:25:03 CET 2014


The previous email contained a stupid copy/paste error. Here is the version for which we're looking to have comments. Apologies to whomever had read the first email already.


Kind regards,

--
Light-locker Threat Model Draft
Forward replies to:
  Steve Dodier-Lazaro <s.dodier-lazaro at cs.ucl.ac.uk>
  Simon Steinbeiss <simon at xfce.org>
  Peter de Ridder <peter at xfce.org>

Version information:
  Draft 1.1
  2014-10-14

### Policy of sessions ###
Principals: current user, other logged in and logged out users
Assets: each user's data and sessions, and their authentication data, access to [capture] hardware
Properties: Session integrity, availability, confidentiality, Data integrity and confidentiality (DAC, only owner can read/write session and only relevant *NIX DAC+LSM MAC users can read/write data)

Purpose of light-locker: implementating authentication for access to the session, preventing an unguarded session from being used to interact with any other asset


### Input space for user and adversary, relevant to light-locker ###
Greeter UI
Greeter-locker IPC channel
Other greeter IPC channels
Hardware plugs of any kind, causing plug-n-play reactions
Input devices


### Threat model ###
Adversary 1: physical attacker with restricted time (less than to copy your HDD or execute a Evil Maid attack if FDE) and no willingness to carry out attacks involving theft
Caps:    - log in normally through brute force or password guessing
         - log in by causing memory corruptions and code injection in the auth form
         - insert hardware to exploit a kernel bug
         - insert hardware to exploit a bug in whatever desktop environment code reacts to it
         - interact with IPC protocols between greeter and music player, a11y apps, locker and login greeter

Threats: - successful login from adversary
         - RCE with root privilege (kernel bugs)
         - RCE with user privilege in one of the user's X11 sessions (kernel+DE bugs)
         - crashing the greeter/locker through misformed input on any available interface

Adversary 2: attacker who controls an app run by the current user (previously compromised, or malware installed by user)
Caps:    - read and write virtually any data on the user's session
         - modify environment variables or config keys relevant to locker
         - replace user's apps with own malware by prioritising own malware in the PATH
         - any IPC with any other user-run app
         - potentially, knowledge of zero-day in lightdm/light-locker/the kernel/PAM modules
         - interact with greeter as a fake locker on the main VT
         - using the capture hardware (webcam, microphone)

Threats: - privilege escalation to root account or lightdm account
         - spying on the user when ACPI reports the user is away
         - replacing the locker with a fake and stealing the password when it's typed
         - intrusion into locker/greeter through any code vulnerability
         - through IPC channels with greeter/locker, crashing them to prevent them from enforcing whatever restrictions they may enforce on the session



### Useful reads ###
https://plus.google.com/106086509626546157534/posts/VbcxrUaxQ35
http://www.webupd8.org/2013/07/light-locker-new-session-locker-for.html
http://theinvisiblethings.blogspot.co.uk/2011/04/linux-security-circus-on-gui-isolation.html
http://www.x.org/releases/X11R7.5/doc/security/XACE-Spec.html
http://seclists.org/oss-sec/2014/q1/327
https://bugs.launchpad.net/ubuntu/+source/lxsession/+bug/1205384




--
Steve Dodier-Lazaro
PhD student in Information Security
University College London
Dept. of Computer Science
Malet Place Engineering, 6.07
Gower Street, London WC1E 6BT
OpenPGP : 1B6B1670
________________________________
From: Dodier-Lazaro, Steve <s.dodier-lazaro.12 at ucl.ac.uk>
Sent: 14 February 2014 00:58
To: simon at xfce.org; peter at xfce.org; lightdm at lists.freedesktop.org; oss-security at lists.openwall.com
Cc: s.dodier-lazaro at cs.ucl.ac.uk
Subject: light-locker security

Dear all,

This is in reply to a request for audit that was notified to me by Simon. Apologies for the separate post but I couldn't reply to original ones as I was not on any relevant ML (see <http://seclists.org/oss-sec/2013/q2/613)> http://seclists.org/oss-sec/2013/q2/613). Any review/amend is greatly appreciated.

When replying, please make sure to cc. the LightDM ML and myself.

Kind regards,?

--
Light-locker Threat Model Draft
Forward replies to:
  Steve Dodier-Lazaro <s.dodier-lazaro at cs.ucl.ac.uk>
  Simon Steinbeiss <simon at xfce.org>
  Peter de Ridder <peter at xfce.org>

Version information:
  Draft 1.0
  2014-10-14

[...]
?
--
Steve Dodier-Lazaro
PhD student in Information Security
University College London
Dept. of Computer Science
Malet Place Engineering, 6.07
Gower Street, London WC1E 6BT
OpenPGP : 1B6B1670?

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freedesktop.org/archives/lightdm/attachments/20140214/16ad2dbb/attachment.html>


More information about the LightDM mailing list