Re: X-windows security in Gnome



Jamie:

> Owen Taylor wrote:
> > 
> > As Jim says, if you want to be secure, secure your display.
> 
> Exactly.  I hadn't thought of using XQueryKeymap for snooping, that's
> very clever!  But there were *already* so many other attacks available
> when someone can access your display that this new one doesn't really
> make much difference: even before this, "xhost +" meant the door was
> wide open.
> 
> If your display is accessible, even if the keyboard is grabbed, an
> attacker can read all the pixels off the screen.
>
> If there are any iconified terminals around, arbitrary commands can be
> executed by sending synthetic keypress events to them.
 
This is simply not true.  I was hoping not to have to type in the 
specifics of the "Security Extension Specifcation", but since there 
seems to be so much confusion, I will go into more detail.

-- paraphrase start --

Use of this extension does not just secure against keyboard attacks via
XQueryKeymap, it does the following:

A server supporting this extension modifies the handling of some core
requests in the following ways;

Resource ID Usage - If an untrusted client makes a request that specifies
  a resource ID that is not owned by another untrusted client, a protocol
  error is sent to the requesting client indicating that the specified 
  resource does not exist.  The following exceptions apply.  An untrusted
  client can
  
  1. use the QueryTree, GetGeometry, and TranslateCoordinates request 
     without restriction
  2. use colormap IDs that are returned in the default-colormap field of
     its connection setup information in any colormap requests.
  3. specify a root window in a number of situation (refer to the spec)
  
Extension Security - ListExtension will only return names of secure
  extension to untrusted clients.  If an untrusted client uses 
  QueryExtension on an insecure extension that the server supports,
  the reply will have the present field set to False and the 
  major-opcode field set to zero to indicate that the extension is not
  supported.  If an untrusted cleint successfuly guesses the major
  opcode of an insecure extension, attempts by it to execute requests
  with that major opcode will fail with a Request error.
  
Keyboard Security - This prevents untrusted applications from stealing 
  keyboard input that was meant for trusted clients and to prevent them
  from interfering with the use of the keyboard.
  
  1. The bit vector representing up/downs tate of the keys returned by
     QueryKeymap and KeymapNotify is all zeros.
  2. GrabKeyboard returns a status of AlreadyGrabbed
  3. SetInputFocus does nothing
  4. Passive grabs exstablished by GrabKey that would otherwise have
     activated do not activate.

Image Security - Makes it impossible for an untrusted client to retrieve
   the image contents of a trusted window unless a trusted client takes
   action to allow this.  The restrictions on resource ID usage listed
   above prevent untrusted clients from using GetImage directly on 
   windows not belonging to trusted clients.
   
Property Security - This is specific to the server

Miscellaneous Security - If an untrusted client attempts to use
   ChangeHosts, ListHosts, or SetAccessControl, the only effect is that
   the client receives an Access error.
   
-- paraphrase end --
  
After mentioning all that, it should now be clear that by using this
extension, the pixels on the screen and keyboard entry of secure clients
is *only* available to trusted clients.  Note that the secure program
must share its key with another program for it to be trusted.  Therefore,
any program which does not have access to the secure programs key can
not access the keyboard or pixels that coorespond to the secure program.
The key can use any protocol which is supported by the X-server
(Kerb5 or MIT-MAGIC-COOKIE).   

> I notice that on my Red Hat system with XFree86-4.1.0, the XTEST
> extension is listed as a server extension.  If that is, in fact, turned
> on, then that's a way to read keystrokes while bypassing all grabs, and
> is also a way to generate synthetic events that don't have the
> "send-event" bit set.

As Sander mentioned, the xserver can be run with the testing extension
turned off.  Also, any program using the XTEST extension is restricted
by the same security restrictions as any other client.  Therefore a
nontrusted client using the XTEST extension will not be able to access
the keyboard of a secure program via the mechanisms listed above.

Brian

_______________________________________________
gnome-hackers mailing list
gnome-hackers gnome org
http://mail.gnome.org/mailman/listinfo/gnome-hackers



[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]