Bug#305600: [Pkg-shadow-devel] Wait a second. This bug is not fixed

Alexander Gattin Alexander Gattin <arg@online.com.ua>, 305600@bugs.debian.org
Sun, 8 May 2005 23:00:10 +0300


Hi!

On Sun, May 08, 2005 at 08:42:40PM +0200, Martin Quinson wrote:
> > Ha, on my system if you can do Alt-SysRq-K, you can do
> > Alt-SysRq-U, Alt-SysRq-B, Alt-SysRq-O and so on.
> > 
> > I didn't try to restrict this and don't know whether
> > there's a way to do it.

Appears that there are two ways for SAK. The second way
does not require "magic SysRq key" and is preferred:
> echo "control alt keycode 101 = SAK" | /bin/loadkey

You can find this information in kernel sources in
Documentation/SAK.txt (as I've done right now ;)).

> My opinion is that we could do the following:
> 
>  - document in login man page that those keys are the only way to secure the
>    login when other users have a physical access to the box (with or without
>    an idea about how to exploit this)

This is OK. And this would better be fixed upstream.

>  - reassign this bug to kernel image for not activating this by default in
>    debian kernels (or buy me a brain so that I can use it with a official
>    built kernel)

This is not OK, because magic SysRq will allow other
[nasty] things besides SAK, and there's a second way
for SAK, which works with standard Debian kernels
(? -- need to check).

Actually, I don't use standard Debian kernels for a
very long time...

>  - maybe change the login program so that it gets mad when it receives the
>    Alt+SysRq+k key, saying someting like:
>    
>    Security issue: Got the Alt+SysRq+k key. Magic SysRq keys are not
>    compiled into the kernel. You cannot make sure that login is not pished...

There's a problem implementing this, because SAK
through Alt-SysRq is not the preferred way, and the
preferred way does not use a fixed key combination.

-- 
WBR,
xrgtn