[prev in list] [next in list] [prev in thread] [next in thread] 

List:       kde-devel
Subject:    Re: KLineEdit Security
From:       Josh Berry <des () condordes ! net>
Date:       2009-05-21 15:50:04
Message-ID: 2feea0a0905210850m2000524ayde8346578a28e02d () mail ! gmail ! com
[Download RAW message or body]

On Thu, May 21, 2009 at 08:05, Andreas Pakulat <apaku@gmx.de> wrote:
> On 21.05.09 06:17:21, dantti85-dev@yahoo.com.br wrote:
>> PolicyKit allows a better "containment" than using sudo
>> since it can only do predefined tasks, but when the problems
>> comes to key logging what the user is typing there not
>> much that we can do to prevent it from becoming root.
>> Well actually in my idea there is, i didn't get deep into details
>> but i believe this could really work.
>>
>> The idea is quite simple, when some application request
>> a policy-kit authorization dialog for you prompting any
>> password PolicyKit-kde would put some trash keys
>> into the user password. For example
>> The user pass is "banana";
>> When he types b we fake type "@#FfDssfd3$",
>> then a and we again "dfsdflk"
>> ....
>> Then the "banana" password
>> would be somehow lost in a very VERY long string.
>
> Well, first of all you'd have to make sure that your somehow creating real
> X11 events - at least - because a keylogger would sit at the X11 level
> looking for Keyboard Events. This could be possible with the XTest library,
> but I'm not sure wether those events really don't provide a way to find out
> they're generated and not "original" events from the keyboard. Not sure if
> that would really be enough, as it might be possible to directly read
> events from the interfaces that the kernel provides and you're not going to
> be able to fake those I think (unless the kernel provides an interface to
> do that)..

Yeah. The keylogger could just be loaded as a kernel driver (or worse,
a rootkit that sits below the kernel).

IMO the only way to do this right is to fool the *entire* computer
into thinking those keystrokes are being pressed, in which case
PolicyKit gets fooled also and you can't enter your password... ;)

So no, I don't think this would actually add any security.  IMO the
best way to protect against a keylogger is to prevent someone from
installing one in the first place.

-- Des
 
>> Visit http://mail.kde.org/mailman/listinfo/kde-devel#unsub to unsubscribe <<
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic