On Monday, March 27, 2017 at 1:16:10 AM UTC-4, Shane Optima wrote:
> >which may or may not be *detected* by a sharply observant user, but could 
> >still not be *prevented* by one
> 
> Um, that is incorrect.  I'm not sure you understand at all what I'm talking 
> about here so let's go over it step by step:
> 
> A. User visits a site associated with a pre-stored password and presses a 
> special key combination.
> B.  Dom0 polls the active window title repeatedly over let's say one full 
> second. Attentive users may at this point glance briefly at the window title 
> to make sure it matches what the website is.  (This isn't *really* necessary 
> given how infeasible an attack would be, but a single glance at the title 
> during the polling period is all you need. You don't need to stare at it. I 
> often glance at the HTTPS when I visit sites, don't you? Why not glance at 
> the window title?)
> C. At the end of the polling period, Dom0 copies your password to the 
> clipboard of the VM associated with the active window.
> D. If the window title did something odd, DON'T PASTE YOUR PASSWORD IN THE 
> PASSWORD FIELD.  And definitely don't paste your password in the password 
> field and then hit submit. 
> 
> It's as simple as that. 
> 
> Since we're talking about non-compromised VMs only here, the attacker will be 
> unable to retrieve the clipboard and your password will thus be safe.
> 
> You might do something like write a browser extension to automatically paste 
> the password in the password field as browser password managers typically do. 
> Such an extension could and should, of course, take additional measures to 
> ensure the password is the correct one intended (I can think of a couple 
> mechanisms offhand.) This is preferable, and it's also something that would 
> take more effort.  
> 
> >Your argument appears to reduce to "This may be theoretically
> exploitable, but the ease of implementation and additional convenience
> is more important to me"
> 
> Uh, yes.  That's Joanna's philosophy, too. Everything is a tradeoff. I'm not 
> claiming that she would agree with me that this tradeoff is a good idea, but 
> the perfectionist stance you appear to be taking, as embodied by this 
> statement, is antithetical to everything I've seen in the Qubes philosophy.  
> 
> Qubes is about reasonable security (citation: the Qubes motto / tag line) 
> with reasonable usability. If security always trumped usability, surely there 
> wouldn't be a GUI at all.  (If I'm not mistaken, that's pretty much the 
> approach the OpenBSD people used to justify their superlative claims.)
> 
> >hold, passwordless sudo is *not* a theoretical weakness
> 
> What rubbish. Yes it is.  
> 
> >The key difference between this and the passwordless sudo argument you bring 
> >up is that the qubes security model explicitly assumes that user->root 
> >privilege escalation within a VM is possible
> 
> The 'Qubes security model' depends on user behavior to support it.  It 
> actually puts a far greater burden on the user to not be stupid (e.g. use 
> banking VM for all kinds of other stuff) than this password tool would.  If 
> you insist there's no theoretical security loss with passwordless sudo, then 
> there surely is no theoretical security loss with a password tool such as 
> this.
> 
> Heck, we don't even need to consider remote attacks to see how usage entirely 
> determines the security implications of a passwordless sudo: a person walking 
> by can compromise your un-screenlocked machine. And this is already a threat 
> model that Qubes takes seriously, as demonstrated by their anti-evil maid 
> packages. Obviously, a passwordless sudo in Dom0 or the VMs is a major 
> vulnerability whenever physical security cannot be guaranteed. You are not 
> just relying on the user to properly use screen lockers, but you are also 
> relying on the screen locker software to not fail. 
> 
> An uncompromisingly strict obedience to the security in depth principle, with 
> no regard for user convenience, would surely frown on such a single point of 
> failure, no?
> 
> But I repeat, I mostly agree that the convenience of passwordless sudo 
> outweighs the risks, and even I would go a step further and say that this 
> could be an example of an inverse of the password post-it note effect: when a 
> secure tool (such as Qubes) becomes significantly easier to use with a very 
> small additional risks incurred, it results in a REAL WORLD SECURITY GAIN, at 
> the cost of some additional minor theoretical security risks.
> 
> This is exactly as it is with a password manager such as I describe, except 
> the risk is even more negligible because the attack would have to be 
> conducted completely blind and could be easily spotted and foiled by an aware 
> user. Such a tradeoff should be acceptable for the first iteration of a 
> password manager. Later iterations could use browser extensions or multiple 
> VMs doing fancy tricks or whatever long term solution is best.
> 
> And as far as my using phrases like "attentive users" goes, another analogous 
> situation can be found with something else that's already shipping with 
> Qubes: Whonix. In many situations, Tor can be more dangerous than no proxy at 
> all, even if you fully understand how it works. For a noob who understands 
> nothing but a magical gateway that makes everything private, Tor is a 
> liability.
> 
> Let me end by stressing that there could easily be good arguments against 
> such a tool... it might be harder to implement than I imagined, or it could 
> be that I'm the only crazy person copy-pasting passwords from offline VMs 
> thus no one else would care because this tool would be a bit more cumbersome 
> to use than a browser password manager, or perhaps there's a much better 
> solution that's already in the works.

read your last paragraph.  no you're not crazy, that is what most Qubes users 
do I believe.  copy and paste passwords from their offline vault vm using 
keepasx.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f419523b-9396-4753-bfaa-6a0b2479b1fe%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to