>which may or may not be *detected* by a sharply observant user, but could 
>still not be *prevented* by one

Um, that is incorrect.  I'm not sure you understand at all what I'm talking 
about here so let's go over it step by step:

A. User visits a site associated with a pre-stored password and presses a 
special key combination.
B.  Dom0 polls the active window title repeatedly over let's say one full 
second. Attentive users may at this point glance briefly at the window title to 
make sure it matches what the website is.  (This isn't *really* necessary given 
how infeasible an attack would be, but a single glance at the title during the 
polling period is all you need. You don't need to stare at it. I often glance 
at the HTTPS when I visit sites, don't you? Why not glance at the window title?)
C. At the end of the polling period, Dom0 copies your password to the clipboard 
of the VM associated with the active window.
D. If the window title did something odd, DON'T PASTE YOUR PASSWORD IN THE 
PASSWORD FIELD.  And definitely don't paste your password in the password field 
and then hit submit. 

It's as simple as that. 

Since we're talking about non-compromised VMs only here, the attacker will be 
unable to retrieve the clipboard and your password will thus be safe.

You might do something like write a browser extension to automatically paste 
the password in the password field as browser password managers typically do. 
Such an extension could and should, of course, take additional measures to 
ensure the password is the correct one intended (I can think of a couple 
mechanisms offhand.) This is preferable, and it's also something that would 
take more effort.  

>Your argument appears to reduce to "This may be theoretically
exploitable, but the ease of implementation and additional convenience
is more important to me"

Uh, yes.  That's Joanna's philosophy, too. Everything is a tradeoff. I'm not 
claiming that she would agree with me that this tradeoff is a good idea, but 
the perfectionist stance you appear to be taking, as embodied by this 
statement, is antithetical to everything I've seen in the Qubes philosophy.  

Qubes is about reasonable security (citation: the Qubes motto / tag line) with 
reasonable usability. If security always trumped usability, surely there 
wouldn't be a GUI at all.  (If I'm not mistaken, that's pretty much the 
approach the OpenBSD people used to justify their superlative claims.)

>hold, passwordless sudo is *not* a theoretical weakness

What rubbish. Yes it is.  

>The key difference between this and the passwordless sudo argument you bring 
>up is that the qubes security model explicitly assumes that user->root 
>privilege escalation within a VM is possible

The 'Qubes security model' depends on user behavior to support it.  It actually 
puts a far greater burden on the user to not be stupid (e.g. use banking VM for 
all kinds of other stuff) than this password tool would.  If you insist there's 
no theoretical security loss with passwordless sudo, then there surely is no 
theoretical security loss with a password tool such as this.

Heck, we don't even need to consider remote attacks to see how usage entirely 
determines the security implications of a passwordless sudo: a person walking 
by can compromise your un-screenlocked machine. And this is already a threat 
model that Qubes takes seriously, as demonstrated by their anti-evil maid 
packages. Obviously, a passwordless sudo in Dom0 or the VMs is a major 
vulnerability whenever physical security cannot be guaranteed. You are not just 
relying on the user to properly use screen lockers, but you are also relying on 
the screen locker software to not fail. 

An uncompromisingly strict obedience to the security in depth principle, with 
no regard for user convenience, would surely frown on such a single point of 
failure, no?

But I repeat, I mostly agree that the convenience of passwordless sudo 
outweighs the risks, and even I would go a step further and say that this could 
be an example of an inverse of the password post-it note effect: when a secure 
tool (such as Qubes) becomes significantly easier to use with a very small 
additional risks incurred, it results in a REAL WORLD SECURITY GAIN, at the 
cost of some additional minor theoretical security risks.

This is exactly as it is with a password manager such as I describe, except the 
risk is even more negligible because the attack would have to be conducted 
completely blind and could be easily spotted and foiled by an aware user. Such 
a tradeoff should be acceptable for the first iteration of a password manager. 
Later iterations could use browser extensions or multiple VMs doing fancy 
tricks or whatever long term solution is best.

And as far as my using phrases like "attentive users" goes, another analogous 
situation can be found with something else that's already shipping with Qubes: 
Whonix. In many situations, Tor can be more dangerous than no proxy at all, 
even if you fully understand how it works. For a noob who understands nothing 
but a magical gateway that makes everything private, Tor is a liability.

Let me end by stressing that there could easily be good arguments against such 
a tool... it might be harder to implement than I imagined, or it could be that 
I'm the only crazy person copy-pasting passwords from offline VMs thus no one 
else would care because this tool would be a bit more cumbersome to use than a 
browser password manager, or perhaps there's a much better solution that's 
already in the works.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5264d207-7053-4a8e-a38c-8afffe5ff7bc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to