On Mon, Jun 14, 2010 at 05:36:33AM -0700, Elazar Leibovich wrote:
> 1) I'm not sure sniffing your keyboard and recognizing when you type your
> password is so easy, but I might be wrong.
> 2) I believe that there's some mechanism which prevents any other software
> to mask graphically the authentication dialog, so that if you're seeing the
> real authentication dialog - you can trust what you see.

It's not about masking one. It's about faking one.

> 
> However using Vista signed executable idea, for instance none of this could
> happen, since every time a program asks for privilege leverage the dialog
> box states explicitly which executable is asking for it, and you never write
> your own password except in login, so whatever the malicious program does it
> cannot get root privileges.

"Never" is a very strong word. The main problem here is that you'll
eventually need to run "untrusted" binaries for varius reasons. And thus
you'll get used to bypassing that mechnism on a regular basis.

Not to mention that "trusted" binaries may do way to much. For instance,
/bin/bash is a trusted binary on your Linux system. It is instealled
from a signed package. Yet chmod s+u /bin/bash is not such a grand idea.
Trusting any signed binaries sounds all too much like a generic sudo
line. It might be a good solution, but not for this problem.

Again, look into the *Kit stuff, if sudo is not good enough for you.

-- 
Tzafrir Cohen         | tzaf...@jabber.org | VIM is
http://tzafrir.org.il |                    | a Mutt's
tzaf...@cohens.org.il |                    |  best
tzaf...@debian.org    |                    | friend

_______________________________________________
Linux-il mailing list
Linux-il@cs.huji.ac.il
http://mailman.cs.huji.ac.il/mailman/listinfo/linux-il

Reply via email to