Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Darkly)
  • No Skin
Collapse
Brand Logo
  1. Home
  2. Uncategorized
  3. The PAM Duress is a module designed to allow users to generate 'duress' passwords that when used in place of their normal password will execute arbitrary scripts.

The PAM Duress is a module designed to allow users to generate 'duress' passwords that when used in place of their normal password will execute arbitrary scripts.

Scheduled Pinned Locked Moved Uncategorized
securitylinuxarchdebian
28 Posts 16 Posters 69 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • leruddL lerudd

    @hyc @dianea
    just shook a memory loose... interleaved has kindasorta been done, long ago really, circa 1983. some apple ][ games were written to disc on the half-sector to inhibit standard disc copying methodologies.

    Howard Chu @ SymasH This user is from outside of this forum
    Howard Chu @ SymasH This user is from outside of this forum
    Howard Chu @ Symas
    wrote on last edited by
    #6

    @lerudd @dianea now that you mention it, that sounds vaguely familiar. But that was really old, with 13 sectors per track. After moving to 16 sectors per track there wasn't enough space. And then full-track copiers hit the scene anyway.

    1 Reply Last reply
    0
    • Tom  πŸ‡΅πŸ‡Έ πŸ‡ΊπŸ‡¦ πŸ³οΈβ€πŸŒˆ πŸ³οΈβ€βš§οΈT Tom πŸ‡΅πŸ‡Έ πŸ‡ΊπŸ‡¦ πŸ³οΈβ€πŸŒˆ πŸ³οΈβ€βš§οΈ

      @dianea As much as I love the idea, users contemplating it should be aware that a real forensic expert would have little trouble finding evidence of this, and it might result in additional obstruction charges.

      Jon GilbertJ This user is from outside of this forum
      Jon GilbertJ This user is from outside of this forum
      Jon Gilbert
      wrote on last edited by
      #7

      @tom @dianea ^^This, holy crap. pam_duress might save your server, resources, data, whatever from third-party agitators, but if you used this when compelled by a state actor or court of law, that's an obstruction of justice charge and you DON'T want that business.

      vampirdaddyV EdE 2 Replies Last reply
      0
      • Jon GilbertJ Jon Gilbert

        @tom @dianea ^^This, holy crap. pam_duress might save your server, resources, data, whatever from third-party agitators, but if you used this when compelled by a state actor or court of law, that's an obstruction of justice charge and you DON'T want that business.

        vampirdaddyV This user is from outside of this forum
        vampirdaddyV This user is from outside of this forum
        vampirdaddy
        wrote on last edited by
        #8

        @jgilbert @tom @dianea

        Destruction of evidence, etc.
        Nope, that's not what you want to do.

        _Regular_ shutdown mechanics (regular closing of network connections, unmounting filesystems, clearing of open cryptosystems) or plain shutdown should be argumentable, though, as that is fully reversible (if someone +cough+ would be willing to).

        One problem, though: the module won't help if one's asked to unlock the lock screen.

        EdE AMSA 2 Replies Last reply
        0
        • Howard Chu @ SymasH Howard Chu @ Symas

          @dianea hm... just gave me an idea - I was thinking it'd be cool to have your sensitive stuff mounted on a separate filesystem from your regular home. But even with encryption it'd be easy to spot.

          How about a filesystem that's interleaved with an existing filesystem? E.g. both in one partition, but using alternating blocks, or alternating extents.

          I suppose once you create something like that, people will know to look for it.

          accelaA This user is from outside of this forum
          accelaA This user is from outside of this forum
          accela
          wrote on last edited by
          #9

          @hyc @dianea
          There's the so-called deniable encryption. Layers of encrypted data packed in a single entity. A key unlocks specific layer.

          https://en.wikipedia.org/wiki/Deniable_encryption

          1 Reply Last reply
          0
          • Howard Chu @ SymasH Howard Chu @ Symas

            @dianea hm... just gave me an idea - I was thinking it'd be cool to have your sensitive stuff mounted on a separate filesystem from your regular home. But even with encryption it'd be easy to spot.

            How about a filesystem that's interleaved with an existing filesystem? E.g. both in one partition, but using alternating blocks, or alternating extents.

            I suppose once you create something like that, people will know to look for it.

            notsoloudN This user is from outside of this forum
            notsoloudN This user is from outside of this forum
            notsoloud
            wrote on last edited by
            #10

            @hyc
            https://en.wikipedia.org/wiki/StegFS
            @dianea

            1 Reply Last reply
            0
            • vampirdaddyV vampirdaddy

              @jgilbert @tom @dianea

              Destruction of evidence, etc.
              Nope, that's not what you want to do.

              _Regular_ shutdown mechanics (regular closing of network connections, unmounting filesystems, clearing of open cryptosystems) or plain shutdown should be argumentable, though, as that is fully reversible (if someone +cough+ would be willing to).

              One problem, though: the module won't help if one's asked to unlock the lock screen.

              EdE This user is from outside of this forum
              EdE This user is from outside of this forum
              Ed
              wrote on last edited by
              #11

              @vampirdaddy GrapheneOS has a duress unlock option. I believe it works on screen unlock.

              @jgilbert @tom @dianea

              diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±D 1 Reply Last reply
              0
              • Jon GilbertJ Jon Gilbert

                @tom @dianea ^^This, holy crap. pam_duress might save your server, resources, data, whatever from third-party agitators, but if you used this when compelled by a state actor or court of law, that's an obstruction of justice charge and you DON'T want that business.

                EdE This user is from outside of this forum
                EdE This user is from outside of this forum
                Ed
                wrote on last edited by
                #12

                @jgilbert @tom @dianea thats why you hide the duress password where it can be found. Hopefully the first cop on the scene types it in and you didn't do it.

                Tom  πŸ‡΅πŸ‡Έ πŸ‡ΊπŸ‡¦ πŸ³οΈβ€πŸŒˆ πŸ³οΈβ€βš§οΈT gnateG 2 Replies Last reply
                0
                • Tom  πŸ‡΅πŸ‡Έ πŸ‡ΊπŸ‡¦ πŸ³οΈβ€πŸŒˆ πŸ³οΈβ€βš§οΈT Tom πŸ‡΅πŸ‡Έ πŸ‡ΊπŸ‡¦ πŸ³οΈβ€πŸŒˆ πŸ³οΈβ€βš§οΈ

                  @dianea As much as I love the idea, users contemplating it should be aware that a real forensic expert would have little trouble finding evidence of this, and it might result in additional obstruction charges.

                  diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±D This user is from outside of this forum
                  diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±D This user is from outside of this forum
                  diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±
                  wrote on last edited by
                  #13

                  @tom

                  Yes, a standard login screen was designed for a civilized society, tested by countless thousands of security researchers. It is obvious there's a login screen. They are almost useless against metal chairs and a rubber hose wielded by angry detectdives...

                  Even better solution, but customized for a COVERT one user login:

                  In these uncertain times, a workaround can be covertly implemented. Just before the login screen starts, echo the text artwork of a normal boot and what looks like a kernel panic to the screen. Make it look convincing. Redirect all further text input/output to null. When the correct password is entered, the normal kernel/init will bring the system up.

                  Sure, entering a password will spike the power consumption up while it crunches numbers and an astute detective may notice that. So run a loop of instructions to keep a core busy. Maybe bang on the address bus a bit to make it look like a runaway oops.

                  The detective will ask what's up with this, so make him feel important by asking if he can fix it. Make the detective feel important. Put any NPD personality the detective has in a positive mood. Social engineering 101.

                  1 Reply Last reply
                  0
                  • EdE Ed

                    @vampirdaddy GrapheneOS has a duress unlock option. I believe it works on screen unlock.

                    @jgilbert @tom @dianea

                    diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±D This user is from outside of this forum
                    diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±D This user is from outside of this forum
                    diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±
                    wrote on last edited by
                    #14

                    @EdBruce @vampirdaddy @jgilbert @tom

                    Yes, and the GraphineOS duress password method works well. But only in civilized times. Not against detectives with metal chairs and a rubber hose.

                    You'll need to hide the login screen with the artwork of a kernel panic. Make it look convincing. Make the detective feel important, ask him if he can fix it. Butter that NPD personality up he surely has. You might not get your phone or computer back, but you'll live another day.

                    1 Reply Last reply
                    0
                    • EdE Ed

                      @jgilbert @tom @dianea thats why you hide the duress password where it can be found. Hopefully the first cop on the scene types it in and you didn't do it.

                      Tom  πŸ‡΅πŸ‡Έ πŸ‡ΊπŸ‡¦ πŸ³οΈβ€πŸŒˆ πŸ³οΈβ€βš§οΈT This user is from outside of this forum
                      Tom  πŸ‡΅πŸ‡Έ πŸ‡ΊπŸ‡¦ πŸ³οΈβ€πŸŒˆ πŸ³οΈβ€βš§οΈT This user is from outside of this forum
                      Tom πŸ‡΅πŸ‡Έ πŸ‡ΊπŸ‡¦ πŸ³οΈβ€πŸŒˆ πŸ³οΈβ€βš§οΈ
                      wrote on last edited by
                      #15

                      @EdBruce @jgilbert @dianea πŸ˜‚πŸ˜Ž

                      1 Reply Last reply
                      0
                      • vampirdaddyV vampirdaddy

                        @jgilbert @tom @dianea

                        Destruction of evidence, etc.
                        Nope, that's not what you want to do.

                        _Regular_ shutdown mechanics (regular closing of network connections, unmounting filesystems, clearing of open cryptosystems) or plain shutdown should be argumentable, though, as that is fully reversible (if someone +cough+ would be willing to).

                        One problem, though: the module won't help if one's asked to unlock the lock screen.

                        AMSA This user is from outside of this forum
                        AMSA This user is from outside of this forum
                        AMS
                        wrote on last edited by
                        #16

                        @vampirdaddy @jgilbert @tom @dianea pam does the check for screen unlock too so it'll work there. The duress password is what you put on the post-it. And you make it cry for help (send network notif), wipe keys, snapshot and backup, and shutdown.

                        Zfs can send incrementals of encrypted volumes without having the key. The data is not destroyed, just locked by a key that is no longer on the device.

                        Luna LacteaJ 1 Reply Last reply
                        0
                        • diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±D diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±

                          The PAM Duress is a module designed to allow users to generate 'duress' passwords that when used in place of their normal password will execute arbitrary scripts.

                          This functionality could be used to allow someone pressed to give a password under coercion to provide a password that grants access but in the background runs scripts to clean up sensitive data, close connections to other networks to limit lateral movement, and/or to send off a notification or alert (potentially one with detailed information like location, visible wifi hot-spots, a picture from the camera, a link to a stream from the microphone, etc). You could even spawn a process to remove the pam_duress module so the threat actor won't be able to see if the duress module was available.

                          https://github.com/nuvious/pam-duress

                          #security #Linux #Arch #Debian

                          mikiM This user is from outside of this forum
                          mikiM This user is from outside of this forum
                          miki
                          wrote on last edited by
                          #17

                          @dianea One useful addition to this would be a password that does an immediate wipe.

                          There are situations where that is indeed what you want, while that is extremely conspicuous, if the wipe is irreversible, there isn't much that your captors can do about it afterwards, and it's an option that should be available to users.

                          For systems that store their disk encryption key in a TPM, you could do this by just destroying the key (though I'm not sure whether PAM would even run in an encrypted disk scenario, I know far too little about how this works on Linux specifically).

                          1 Reply Last reply
                          0
                          • R ActivityRelay shared this topic on
                          • diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±D diana πŸ³οΈβ€βš§οΈπŸ¦‹πŸŒ±

                            The PAM Duress is a module designed to allow users to generate 'duress' passwords that when used in place of their normal password will execute arbitrary scripts.

                            This functionality could be used to allow someone pressed to give a password under coercion to provide a password that grants access but in the background runs scripts to clean up sensitive data, close connections to other networks to limit lateral movement, and/or to send off a notification or alert (potentially one with detailed information like location, visible wifi hot-spots, a picture from the camera, a link to a stream from the microphone, etc). You could even spawn a process to remove the pam_duress module so the threat actor won't be able to see if the duress module was available.

                            https://github.com/nuvious/pam-duress

                            #security #Linux #Arch #Debian

                            Diogenes PontifxD This user is from outside of this forum
                            Diogenes PontifxD This user is from outside of this forum
                            Diogenes Pontifx
                            wrote on last edited by
                            #18

                            @dianea I would like to see devices with fingerprint ID provide for a duress finger. And for devices with FaceID to support a duress face. Perhaps sticking out your tongue could wipe the device and trigger a factory reset.

                            1 Reply Last reply
                            0
                            • EdE Ed

                              @jgilbert @tom @dianea thats why you hide the duress password where it can be found. Hopefully the first cop on the scene types it in and you didn't do it.

                              gnateG This user is from outside of this forum
                              gnateG This user is from outside of this forum
                              gnate
                              wrote on last edited by
                              #19

                              @EdBruce
                              One password for them that destroys data, one password for you that doesn't.
                              @jgilbert @tom @dianea

                              1 Reply Last reply
                              0
                              • AMSA AMS

                                @vampirdaddy @jgilbert @tom @dianea pam does the check for screen unlock too so it'll work there. The duress password is what you put on the post-it. And you make it cry for help (send network notif), wipe keys, snapshot and backup, and shutdown.

                                Zfs can send incrementals of encrypted volumes without having the key. The data is not destroyed, just locked by a key that is no longer on the device.

                                Luna LacteaJ This user is from outside of this forum
                                Luna LacteaJ This user is from outside of this forum
                                Luna Lactea
                                wrote last edited by
                                #20

                                @AMS @vampirdaddy @jgilbert @tom @dianea If only OpenZFS encryption was stableπŸ’”
                                That's really cool & something I would really like to have once OpenZFS no longer has issues with losing encrypted datasets.

                                vampirdaddyV 1 Reply Last reply
                                0
                                • Luna LacteaJ Luna Lactea

                                  @AMS @vampirdaddy @jgilbert @tom @dianea If only OpenZFS encryption was stableπŸ’”
                                  That's really cool & something I would really like to have once OpenZFS no longer has issues with losing encrypted datasets.

                                  vampirdaddyV This user is from outside of this forum
                                  vampirdaddyV This user is from outside of this forum
                                  vampirdaddy
                                  wrote last edited by
                                  #21

                                  @jackemled @AMS @jgilbert @tom @dianea
                                  Or instead of zfs-send you use rsync (over SSH if crypto is needed)?

                                  Luna LacteaJ 1 Reply Last reply
                                  0
                                  • vampirdaddyV vampirdaddy

                                    @jackemled @AMS @jgilbert @tom @dianea
                                    Or instead of zfs-send you use rsync (over SSH if crypto is needed)?

                                    Luna LacteaJ This user is from outside of this forum
                                    Luna LacteaJ This user is from outside of this forum
                                    Luna Lactea
                                    wrote last edited by
                                    #22

                                    @vampirdaddy @AMS zfs-send & rsync are two different things with different uses, but do similar things. Both do unidirectional syncs, but rsync is for files only & optionally (SSH by default) uses encryption in transit. zfs-send is for copying a snapshot or the current state of the entire filesystem or specific datasets within it, & those datasets either have or do not have encryption on the disk. If the dataset is encrypted, then the generated snapshot file will contain only encrypted data; if not, then only plaintext data. If the snapshot is streamed to a remote OpenZFS filesystem through SSH, then there is additional encryption in transit equivalent to the default settings for most rsyncs, since both use SSH.

                                    OpenZFS filesystem or dataset encryption is unstable right now & can cause data loss because of keys being dropped & stuff if some storage devices don't appear to the computer in the right order or never appear at all or something. We're talking about at rest encryption, not in transit encryption.

                                    Luna LacteaJ 1 Reply Last reply
                                    0
                                    • Luna LacteaJ Luna Lactea

                                      @vampirdaddy @AMS zfs-send & rsync are two different things with different uses, but do similar things. Both do unidirectional syncs, but rsync is for files only & optionally (SSH by default) uses encryption in transit. zfs-send is for copying a snapshot or the current state of the entire filesystem or specific datasets within it, & those datasets either have or do not have encryption on the disk. If the dataset is encrypted, then the generated snapshot file will contain only encrypted data; if not, then only plaintext data. If the snapshot is streamed to a remote OpenZFS filesystem through SSH, then there is additional encryption in transit equivalent to the default settings for most rsyncs, since both use SSH.

                                      OpenZFS filesystem or dataset encryption is unstable right now & can cause data loss because of keys being dropped & stuff if some storage devices don't appear to the computer in the right order or never appear at all or something. We're talking about at rest encryption, not in transit encryption.

                                      Luna LacteaJ This user is from outside of this forum
                                      Luna LacteaJ This user is from outside of this forum
                                      Luna Lactea
                                      wrote last edited by
                                      #23

                                      @vampirdaddy @AMS What AMS means is that you can wipe the keys from your device & still be able to send the state of your OpenZFS filesystem to a remote even though you don't have the keys anymore. So you can simply have your keys backed up somewhere else, then in an emergency wipe them from the local device (so your filesystem can't be read) & zfs-send to a remote incase you never get the local device back from police or a thief or whoever is taking it. That way you can secure your data without having to wait for the backup to complete first like with most filesystems, simply do the backup second.

                                      This is really cool to me because delta syncing encrypted data is hard, but the way ZFS snapshots work means you're actually copying only new blocks, not actual changes, & those blocks can contain changes.

                                      Luna LacteaJ vampirdaddyV 2 Replies Last reply
                                      0
                                      • Luna LacteaJ Luna Lactea

                                        @vampirdaddy @AMS What AMS means is that you can wipe the keys from your device & still be able to send the state of your OpenZFS filesystem to a remote even though you don't have the keys anymore. So you can simply have your keys backed up somewhere else, then in an emergency wipe them from the local device (so your filesystem can't be read) & zfs-send to a remote incase you never get the local device back from police or a thief or whoever is taking it. That way you can secure your data without having to wait for the backup to complete first like with most filesystems, simply do the backup second.

                                        This is really cool to me because delta syncing encrypted data is hard, but the way ZFS snapshots work means you're actually copying only new blocks, not actual changes, & those blocks can contain changes.

                                        Luna LacteaJ This user is from outside of this forum
                                        Luna LacteaJ This user is from outside of this forum
                                        Luna Lactea
                                        wrote last edited by
                                        #24

                                        @vampirdaddy @AMS It also means less time until the filesystem is secured, but if you use SSH you still have to wait for the send to complete before you can delete your SSH keys. Maybe a solution would be to use TLS to an open & write only fileserver so SSH keys can be deleted earlier, maybe something like a pastebin.

                                        AMSA 1 Reply Last reply
                                        0
                                        • Luna LacteaJ Luna Lactea

                                          @vampirdaddy @AMS It also means less time until the filesystem is secured, but if you use SSH you still have to wait for the send to complete before you can delete your SSH keys. Maybe a solution would be to use TLS to an open & write only fileserver so SSH keys can be deleted earlier, maybe something like a pastebin.

                                          AMSA This user is from outside of this forum
                                          AMSA This user is from outside of this forum
                                          AMS
                                          wrote last edited by
                                          #25

                                          @jackemled @vampirdaddy In my case, backup service is a single use key limited only being able to send snapshots, no shell, no recv, not used for anything else. And the duress lock sends a burndown (wipe key from backup endpoint) and wipes that local key after the backup completes.

                                          Luna LacteaJ 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups