Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Darkly)
  • No Skin
Collapse
Brand Logo
  1. Home
  2. Uncategorized
  3. The PAM Duress is a module designed to allow users to generate 'duress' passwords that when used in place of their normal password will execute arbitrary scripts.

The PAM Duress is a module designed to allow users to generate 'duress' passwords that when used in place of their normal password will execute arbitrary scripts.

Scheduled Pinned Locked Moved Uncategorized
securitylinuxarchdebian
28 Posts 16 Posters 69 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±D This user is from outside of this forum
    diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±D This user is from outside of this forum
    diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±
    wrote on last edited by
    #1

    The PAM Duress is a module designed to allow users to generate 'duress' passwords that when used in place of their normal password will execute arbitrary scripts.

    This functionality could be used to allow someone pressed to give a password under coercion to provide a password that grants access but in the background runs scripts to clean up sensitive data, close connections to other networks to limit lateral movement, and/or to send off a notification or alert (potentially one with detailed information like location, visible wifi hot-spots, a picture from the camera, a link to a stream from the microphone, etc). You could even spawn a process to remove the pam_duress module so the threat actor won't be able to see if the duress module was available.

    https://github.com/nuvious/pam-duress

    #security #Linux #Arch #Debian

    NazoN Howard Chu @ SymasH Tom  πŸ‡΅πŸ‡Έ πŸ‡ΊπŸ‡¦ πŸ³οΈβ€πŸŒˆ πŸ³οΈβ€βš§οΈT mikiM Diogenes PontifxD 6 Replies Last reply
    1
    0
    • diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±D diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±

      The PAM Duress is a module designed to allow users to generate 'duress' passwords that when used in place of their normal password will execute arbitrary scripts.

      This functionality could be used to allow someone pressed to give a password under coercion to provide a password that grants access but in the background runs scripts to clean up sensitive data, close connections to other networks to limit lateral movement, and/or to send off a notification or alert (potentially one with detailed information like location, visible wifi hot-spots, a picture from the camera, a link to a stream from the microphone, etc). You could even spawn a process to remove the pam_duress module so the threat actor won't be able to see if the duress module was available.

      https://github.com/nuvious/pam-duress

      #security #Linux #Arch #Debian

      NazoN This user is from outside of this forum
      NazoN This user is from outside of this forum
      Nazo
      wrote on last edited by
      #2

      @dianea Oh wow... I wish this wasn't a little advanced for me. I really truly love the idea of it.

      1 Reply Last reply
      0
      • diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±D diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±

        The PAM Duress is a module designed to allow users to generate 'duress' passwords that when used in place of their normal password will execute arbitrary scripts.

        This functionality could be used to allow someone pressed to give a password under coercion to provide a password that grants access but in the background runs scripts to clean up sensitive data, close connections to other networks to limit lateral movement, and/or to send off a notification or alert (potentially one with detailed information like location, visible wifi hot-spots, a picture from the camera, a link to a stream from the microphone, etc). You could even spawn a process to remove the pam_duress module so the threat actor won't be able to see if the duress module was available.

        https://github.com/nuvious/pam-duress

        #security #Linux #Arch #Debian

        Howard Chu @ SymasH This user is from outside of this forum
        Howard Chu @ SymasH This user is from outside of this forum
        Howard Chu @ Symas
        wrote on last edited by
        #3

        @dianea hm... just gave me an idea - I was thinking it'd be cool to have your sensitive stuff mounted on a separate filesystem from your regular home. But even with encryption it'd be easy to spot.

        How about a filesystem that's interleaved with an existing filesystem? E.g. both in one partition, but using alternating blocks, or alternating extents.

        I suppose once you create something like that, people will know to look for it.

        leruddL accelaA notsoloudN 3 Replies Last reply
        0
        • diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±D diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±

          The PAM Duress is a module designed to allow users to generate 'duress' passwords that when used in place of their normal password will execute arbitrary scripts.

          This functionality could be used to allow someone pressed to give a password under coercion to provide a password that grants access but in the background runs scripts to clean up sensitive data, close connections to other networks to limit lateral movement, and/or to send off a notification or alert (potentially one with detailed information like location, visible wifi hot-spots, a picture from the camera, a link to a stream from the microphone, etc). You could even spawn a process to remove the pam_duress module so the threat actor won't be able to see if the duress module was available.

          https://github.com/nuvious/pam-duress

          #security #Linux #Arch #Debian

          Tom  πŸ‡΅πŸ‡Έ πŸ‡ΊπŸ‡¦ πŸ³οΈβ€πŸŒˆ πŸ³οΈβ€βš§οΈT This user is from outside of this forum
          Tom  πŸ‡΅πŸ‡Έ πŸ‡ΊπŸ‡¦ πŸ³οΈβ€πŸŒˆ πŸ³οΈβ€βš§οΈT This user is from outside of this forum
          Tom πŸ‡΅πŸ‡Έ πŸ‡ΊπŸ‡¦ πŸ³οΈβ€πŸŒˆ πŸ³οΈβ€βš§οΈ
          wrote on last edited by
          #4

          @dianea As much as I love the idea, users contemplating it should be aware that a real forensic expert would have little trouble finding evidence of this, and it might result in additional obstruction charges.

          Jon GilbertJ diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±D 2 Replies Last reply
          0
          • Howard Chu @ SymasH Howard Chu @ Symas

            @dianea hm... just gave me an idea - I was thinking it'd be cool to have your sensitive stuff mounted on a separate filesystem from your regular home. But even with encryption it'd be easy to spot.

            How about a filesystem that's interleaved with an existing filesystem? E.g. both in one partition, but using alternating blocks, or alternating extents.

            I suppose once you create something like that, people will know to look for it.

            leruddL This user is from outside of this forum
            leruddL This user is from outside of this forum
            lerudd
            wrote on last edited by
            #5

            @hyc @dianea
            just shook a memory loose... interleaved has kindasorta been done, long ago really, circa 1983. some apple ][ games were written to disc on the half-sector to inhibit standard disc copying methodologies.

            Howard Chu @ SymasH 1 Reply Last reply
            0
            • leruddL lerudd

              @hyc @dianea
              just shook a memory loose... interleaved has kindasorta been done, long ago really, circa 1983. some apple ][ games were written to disc on the half-sector to inhibit standard disc copying methodologies.

              Howard Chu @ SymasH This user is from outside of this forum
              Howard Chu @ SymasH This user is from outside of this forum
              Howard Chu @ Symas
              wrote on last edited by
              #6

              @lerudd @dianea now that you mention it, that sounds vaguely familiar. But that was really old, with 13 sectors per track. After moving to 16 sectors per track there wasn't enough space. And then full-track copiers hit the scene anyway.

              1 Reply Last reply
              0
              • Tom  πŸ‡΅πŸ‡Έ πŸ‡ΊπŸ‡¦ πŸ³οΈβ€πŸŒˆ πŸ³οΈβ€βš§οΈT Tom πŸ‡΅πŸ‡Έ πŸ‡ΊπŸ‡¦ πŸ³οΈβ€πŸŒˆ πŸ³οΈβ€βš§οΈ

                @dianea As much as I love the idea, users contemplating it should be aware that a real forensic expert would have little trouble finding evidence of this, and it might result in additional obstruction charges.

                Jon GilbertJ This user is from outside of this forum
                Jon GilbertJ This user is from outside of this forum
                Jon Gilbert
                wrote on last edited by
                #7

                @tom @dianea ^^This, holy crap. pam_duress might save your server, resources, data, whatever from third-party agitators, but if you used this when compelled by a state actor or court of law, that's an obstruction of justice charge and you DON'T want that business.

                vampirdaddyV EdE 2 Replies Last reply
                0
                • Jon GilbertJ Jon Gilbert

                  @tom @dianea ^^This, holy crap. pam_duress might save your server, resources, data, whatever from third-party agitators, but if you used this when compelled by a state actor or court of law, that's an obstruction of justice charge and you DON'T want that business.

                  vampirdaddyV This user is from outside of this forum
                  vampirdaddyV This user is from outside of this forum
                  vampirdaddy
                  wrote on last edited by
                  #8

                  @jgilbert @tom @dianea

                  Destruction of evidence, etc.
                  Nope, that's not what you want to do.

                  _Regular_ shutdown mechanics (regular closing of network connections, unmounting filesystems, clearing of open cryptosystems) or plain shutdown should be argumentable, though, as that is fully reversible (if someone +cough+ would be willing to).

                  One problem, though: the module won't help if one's asked to unlock the lock screen.

                  EdE AMSA 2 Replies Last reply
                  0
                  • Howard Chu @ SymasH Howard Chu @ Symas

                    @dianea hm... just gave me an idea - I was thinking it'd be cool to have your sensitive stuff mounted on a separate filesystem from your regular home. But even with encryption it'd be easy to spot.

                    How about a filesystem that's interleaved with an existing filesystem? E.g. both in one partition, but using alternating blocks, or alternating extents.

                    I suppose once you create something like that, people will know to look for it.

                    accelaA This user is from outside of this forum
                    accelaA This user is from outside of this forum
                    accela
                    wrote on last edited by
                    #9

                    @hyc @dianea
                    There's the so-called deniable encryption. Layers of encrypted data packed in a single entity. A key unlocks specific layer.

                    https://en.wikipedia.org/wiki/Deniable_encryption

                    1 Reply Last reply
                    0
                    • Howard Chu @ SymasH Howard Chu @ Symas

                      @dianea hm... just gave me an idea - I was thinking it'd be cool to have your sensitive stuff mounted on a separate filesystem from your regular home. But even with encryption it'd be easy to spot.

                      How about a filesystem that's interleaved with an existing filesystem? E.g. both in one partition, but using alternating blocks, or alternating extents.

                      I suppose once you create something like that, people will know to look for it.

                      notsoloudN This user is from outside of this forum
                      notsoloudN This user is from outside of this forum
                      notsoloud
                      wrote on last edited by
                      #10

                      @hyc
                      https://en.wikipedia.org/wiki/StegFS
                      @dianea

                      1 Reply Last reply
                      0
                      • vampirdaddyV vampirdaddy

                        @jgilbert @tom @dianea

                        Destruction of evidence, etc.
                        Nope, that's not what you want to do.

                        _Regular_ shutdown mechanics (regular closing of network connections, unmounting filesystems, clearing of open cryptosystems) or plain shutdown should be argumentable, though, as that is fully reversible (if someone +cough+ would be willing to).

                        One problem, though: the module won't help if one's asked to unlock the lock screen.

                        EdE This user is from outside of this forum
                        EdE This user is from outside of this forum
                        Ed
                        wrote on last edited by
                        #11

                        @vampirdaddy GrapheneOS has a duress unlock option. I believe it works on screen unlock.

                        @jgilbert @tom @dianea

                        diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±D 1 Reply Last reply
                        0
                        • Jon GilbertJ Jon Gilbert

                          @tom @dianea ^^This, holy crap. pam_duress might save your server, resources, data, whatever from third-party agitators, but if you used this when compelled by a state actor or court of law, that's an obstruction of justice charge and you DON'T want that business.

                          EdE This user is from outside of this forum
                          EdE This user is from outside of this forum
                          Ed
                          wrote on last edited by
                          #12

                          @jgilbert @tom @dianea thats why you hide the duress password where it can be found. Hopefully the first cop on the scene types it in and you didn't do it.

                          Tom  πŸ‡΅πŸ‡Έ πŸ‡ΊπŸ‡¦ πŸ³οΈβ€πŸŒˆ πŸ³οΈβ€βš§οΈT gnateG 2 Replies Last reply
                          0
                          • Tom  πŸ‡΅πŸ‡Έ πŸ‡ΊπŸ‡¦ πŸ³οΈβ€πŸŒˆ πŸ³οΈβ€βš§οΈT Tom πŸ‡΅πŸ‡Έ πŸ‡ΊπŸ‡¦ πŸ³οΈβ€πŸŒˆ πŸ³οΈβ€βš§οΈ

                            @dianea As much as I love the idea, users contemplating it should be aware that a real forensic expert would have little trouble finding evidence of this, and it might result in additional obstruction charges.

                            diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±D This user is from outside of this forum
                            diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±D This user is from outside of this forum
                            diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±
                            wrote on last edited by
                            #13

                            @tom

                            Yes, a standard login screen was designed for a civilized society, tested by countless thousands of security researchers. It is obvious there's a login screen. They are almost useless against metal chairs and a rubber hose wielded by angry detectdives...

                            Even better solution, but customized for a COVERT one user login:

                            In these uncertain times, a workaround can be covertly implemented. Just before the login screen starts, echo the text artwork of a normal boot and what looks like a kernel panic to the screen. Make it look convincing. Redirect all further text input/output to null. When the correct password is entered, the normal kernel/init will bring the system up.

                            Sure, entering a password will spike the power consumption up while it crunches numbers and an astute detective may notice that. So run a loop of instructions to keep a core busy. Maybe bang on the address bus a bit to make it look like a runaway oops.

                            The detective will ask what's up with this, so make him feel important by asking if he can fix it. Make the detective feel important. Put any NPD personality the detective has in a positive mood. Social engineering 101.

                            1 Reply Last reply
                            0
                            • EdE Ed

                              @vampirdaddy GrapheneOS has a duress unlock option. I believe it works on screen unlock.

                              @jgilbert @tom @dianea

                              diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±D This user is from outside of this forum
                              diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±D This user is from outside of this forum
                              diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±
                              wrote on last edited by
                              #14

                              @EdBruce @vampirdaddy @jgilbert @tom

                              Yes, and the GraphineOS duress password method works well. But only in civilized times. Not against detectives with metal chairs and a rubber hose.

                              You'll need to hide the login screen with the artwork of a kernel panic. Make it look convincing. Make the detective feel important, ask him if he can fix it. Butter that NPD personality up he surely has. You might not get your phone or computer back, but you'll live another day.

                              1 Reply Last reply
                              0
                              • EdE Ed

                                @jgilbert @tom @dianea thats why you hide the duress password where it can be found. Hopefully the first cop on the scene types it in and you didn't do it.

                                Tom  πŸ‡΅πŸ‡Έ πŸ‡ΊπŸ‡¦ πŸ³οΈβ€πŸŒˆ πŸ³οΈβ€βš§οΈT This user is from outside of this forum
                                Tom  πŸ‡΅πŸ‡Έ πŸ‡ΊπŸ‡¦ πŸ³οΈβ€πŸŒˆ πŸ³οΈβ€βš§οΈT This user is from outside of this forum
                                Tom πŸ‡΅πŸ‡Έ πŸ‡ΊπŸ‡¦ πŸ³οΈβ€πŸŒˆ πŸ³οΈβ€βš§οΈ
                                wrote on last edited by
                                #15

                                @EdBruce @jgilbert @dianea πŸ˜‚πŸ˜Ž

                                1 Reply Last reply
                                0
                                • vampirdaddyV vampirdaddy

                                  @jgilbert @tom @dianea

                                  Destruction of evidence, etc.
                                  Nope, that's not what you want to do.

                                  _Regular_ shutdown mechanics (regular closing of network connections, unmounting filesystems, clearing of open cryptosystems) or plain shutdown should be argumentable, though, as that is fully reversible (if someone +cough+ would be willing to).

                                  One problem, though: the module won't help if one's asked to unlock the lock screen.

                                  AMSA This user is from outside of this forum
                                  AMSA This user is from outside of this forum
                                  AMS
                                  wrote on last edited by
                                  #16

                                  @vampirdaddy @jgilbert @tom @dianea pam does the check for screen unlock too so it'll work there. The duress password is what you put on the post-it. And you make it cry for help (send network notif), wipe keys, snapshot and backup, and shutdown.

                                  Zfs can send incrementals of encrypted volumes without having the key. The data is not destroyed, just locked by a key that is no longer on the device.

                                  Luna LacteaJ 1 Reply Last reply
                                  0
                                  • diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±D diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±

                                    The PAM Duress is a module designed to allow users to generate 'duress' passwords that when used in place of their normal password will execute arbitrary scripts.

                                    This functionality could be used to allow someone pressed to give a password under coercion to provide a password that grants access but in the background runs scripts to clean up sensitive data, close connections to other networks to limit lateral movement, and/or to send off a notification or alert (potentially one with detailed information like location, visible wifi hot-spots, a picture from the camera, a link to a stream from the microphone, etc). You could even spawn a process to remove the pam_duress module so the threat actor won't be able to see if the duress module was available.

                                    https://github.com/nuvious/pam-duress

                                    #security #Linux #Arch #Debian

                                    mikiM This user is from outside of this forum
                                    mikiM This user is from outside of this forum
                                    miki
                                    wrote on last edited by
                                    #17

                                    @dianea One useful addition to this would be a password that does an immediate wipe.

                                    There are situations where that is indeed what you want, while that is extremely conspicuous, if the wipe is irreversible, there isn't much that your captors can do about it afterwards, and it's an option that should be available to users.

                                    For systems that store their disk encryption key in a TPM, you could do this by just destroying the key (though I'm not sure whether PAM would even run in an encrypted disk scenario, I know far too little about how this works on Linux specifically).

                                    1 Reply Last reply
                                    0
                                    • R ActivityRelay shared this topic on
                                    • diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±D diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±

                                      The PAM Duress is a module designed to allow users to generate 'duress' passwords that when used in place of their normal password will execute arbitrary scripts.

                                      This functionality could be used to allow someone pressed to give a password under coercion to provide a password that grants access but in the background runs scripts to clean up sensitive data, close connections to other networks to limit lateral movement, and/or to send off a notification or alert (potentially one with detailed information like location, visible wifi hot-spots, a picture from the camera, a link to a stream from the microphone, etc). You could even spawn a process to remove the pam_duress module so the threat actor won't be able to see if the duress module was available.

                                      https://github.com/nuvious/pam-duress

                                      #security #Linux #Arch #Debian

                                      Diogenes PontifxD This user is from outside of this forum
                                      Diogenes PontifxD This user is from outside of this forum
                                      Diogenes Pontifx
                                      wrote on last edited by
                                      #18

                                      @dianea I would like to see devices with fingerprint ID provide for a duress finger. And for devices with FaceID to support a duress face. Perhaps sticking out your tongue could wipe the device and trigger a factory reset.

                                      1 Reply Last reply
                                      0
                                      • EdE Ed

                                        @jgilbert @tom @dianea thats why you hide the duress password where it can be found. Hopefully the first cop on the scene types it in and you didn't do it.

                                        gnateG This user is from outside of this forum
                                        gnateG This user is from outside of this forum
                                        gnate
                                        wrote on last edited by
                                        #19

                                        @EdBruce
                                        One password for them that destroys data, one password for you that doesn't.
                                        @jgilbert @tom @dianea

                                        1 Reply Last reply
                                        0
                                        • AMSA AMS

                                          @vampirdaddy @jgilbert @tom @dianea pam does the check for screen unlock too so it'll work there. The duress password is what you put on the post-it. And you make it cry for help (send network notif), wipe keys, snapshot and backup, and shutdown.

                                          Zfs can send incrementals of encrypted volumes without having the key. The data is not destroyed, just locked by a key that is no longer on the device.

                                          Luna LacteaJ This user is from outside of this forum
                                          Luna LacteaJ This user is from outside of this forum
                                          Luna Lactea
                                          wrote last edited by
                                          #20

                                          @AMS @vampirdaddy @jgilbert @tom @dianea If only OpenZFS encryption was stableπŸ’”
                                          That's really cool & something I would really like to have once OpenZFS no longer has issues with losing encrypted datasets.

                                          vampirdaddyV 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups