Secure attention Key: Login and GkSudo

staticd staticd.growthecommons at gmail.com
Mon Oct 31 05:50:42 UTC 2011


On Mon, Oct 31, 2011 at 12:07 AM, Reinhard Tartler <siretart at ubuntu.com>wrote:

> On So, Okt 30, 2011 at 15:11:04 (CET), staticd wrote:
>
> >> Windows NT is designed so that, unless system security is already
> >> compromised in some other way, only the Winlogon process, a trusted
> >> system process, can receive notification of this keystroke
> >> combination. This is because the kernel remembers the process ID of
> >> the Winlogon process, and allows only that process to receive the
> >> notification.
> >>
> >> So says Wikipedia.
> >>
> >> Interestingly, VMWare catches the sequence as well.
> >>
> >>
> > I was thinking of a Alt+Sysrq combination capturable only by the kernel.
> > (Ctrl+Alt+Sysrq ?)
>
> The SAK for Linux systems is Alt+Sysrq+k
>
> While this SAK can be disabled, Ubuntu ships with this functionality
> enabled. It safely and uncatchably terminates your running X11 session,
> returning back to your login manager.
>
> Cheers,
> Reinhard.
>
> --
> Gruesse/greetings,
> Reinhard Tartler, KeyID 945348A4
>
> --
> Ubuntu-devel-discuss mailing list
> Ubuntu-devel-discuss at lists.ubuntu.com
> Modify settings or unsubscribe at:
> https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss
>

Reinhard,
doesn't pressing Alt+Sysrq+k kill the current X session?
Is there a secure way of getting the login manager without disrupting other
users who are also working in the background? (a switch user functionality
that cannot be spoofed)

Do you know how i could go about implementing this?
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ubuntu.com/archives/ubuntu-devel-discuss/attachments/20111031/f3db19e3/attachment.html>


More information about the Ubuntu-devel-discuss mailing list