-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[XFCE] locked xscreensaver displays sensitive notifications #2026
Comments
just checked KDE lock screen and it does not leak these same notifications. |
also a note that split-gpg notifications of private key access are pushed through the lock screen. This is on R3.2. |
This would be (hopefully) fixed by changing the default screen locker to physlock (#1917). |
@mfc KDE has the same problems, as outlined by @nvesely in #963 (comment) (also, this bug is still a problem in Q3.2) |
I've found that this is not a Qubes-specific issue. I see popup notifications display through xscreensaver all the time on multiple physically distinct machines running an unrelated Linux distro. In light of this, @marmarek, should this issue be closed as |
@andrewdavidwong It's a bug that we expose our users to by the choice of software we include, and by choice, since there are solutions available that does not have these security flaws (things leaking, bypassing authentication when the application crashes). Notably Saying that it's |
It's not entirely "by choice." If we could wave a magic wand and switch to
No, it's not. Closing this issue as
No. We issue QSBs to notify users of security-critical bugs and how to patch them (among other reasons). Given the nature of Qubes, most bugs (e.g., web browser bugs) are not security critical for Qubes, so we don't publish QSBs about them. As you know, most QSBs are about Xen bugs, because Xen is security critical. The fact that the Qubes team does not maintain Xen (the main project) is irrelevant to whether we issue QSBs for security-critical Xen bugs that affect Qubes. |
It is my understanding that your argument for refraining from noticing people about bugs in browsers, or the recent LibreOffice exploit (that still works?) is that they expose AppVMs, but not dom0, to danger, and you don't care about what runs in people's AppVMs. The screen locker runs in dom0 and protects the whole system, so I don't see how that argument intuitively extends to mean that screenlocking is not security-critical.
XScreenSaver in particular has had a few "exciting" bugs that allowed bypassing the lock screen: But this is not exclusive to XScreenSaver (see #963 for the exact same issue in KDE's screenlocker, also on Qubes; and here @marmarek also reports that it's broken); building an X11 screensaver application is a design flaw in itself. Originally screensavers were meant to - save the screen from burning a permanent image, not to act as a security-critical component. The latter part was bolted onto the solutions as an afterthought, and it kind of shows.
|
BTW, found this other related thread (now closed for some reason) where @rootkovska and @marmarek also discuss screen locking: #2120 |
Was closing the tabs from yesterday when I spotted this quote from the author of XScreenSaver regarding his apparent frustration with the situation (which is that you cannot write a secure X11-based screensaver):
I really don't want to sound too bitter or accusatory, please don't read any of this as an attack. I'm just a little weary of having discussed this in Github threads for 3 years now, and it seems like it is very unintuitive to people that |
A secure screen locker is a high priority for us. We care about the security of Qubes OS as a whole, not just Xen. It just happens to be the case that many QSBs have been about Xen because many of the security-critical bugs that have affected Qubes have been in Xen.
It sounds like the proper place to communicate such information is in the documentation, release notes, or in the installer. GitHub issues are meant for tracking issues, not for notifying users about things. If the crux of this issue is that users need to be informed about it, then it should be turned into a documentation issue (or similar), and closed once the documentation (or announcement or whatever) is done. The fact that people should be aware of something is not a good argument for leaving a GitHub issue about that thing open, since many users never see the issue tracker, and those who do can easily search through both open and closed issues. More importantly, leaving issues open when they aren't actionable makes the entire issue tracking system less efficient, which hinders our developers from doing their work. |
@andrewdavidwong I think it would be very good if this was detailed in the documentation (I guess release notes are more for information specific to a certain release), and/or in the installer indeed. It is an actionable issue; the fix is simple: Use physlock instead. |
Please read my comment above again. Specifically: "If the crux of this issue is that users need to be informed about it, then it should be turned into a documentation issue (or similar), and closed once the documentation (or announcement or whatever) is done."
That's precisely what #1917 is about. |
@andrewdavidwong Ah, sorry: This thread is about the glitching, and #1917 is about the fix. |
This issue is being closed because:
If anyone believes that this issue should be reopened, please let us know in a comment here. |
This issue should be reopened since:
|
Edit: I didn't thoroughly looked into the code. Please see @marmarek's comment below.
|
Detect a screensaver window by override_redirect, map state (an inactive window is unmapped), and window class. Use XRestackWindows to put newly appearing windows below such a window. To test: 1. run in VM: while true; do notify-send "hey"; sleep 1; done 2. lock screen and check if notifications appear. The problem doesn't seem to appear on i3lock. I haven't checked KDE. See QubesOS/qubes-issues#5908. (cherry picked from commit 2607198) Notes from origin: Fixes QubesOS/qubes-issues#5908 Fixes QubesOS/qubes-issues#2026
Automated announcement from builder-github The package
|
Automated announcement from builder-github The package
|
Automated announcement from builder-github The package
Or update dom0 via Qubes Manager. |
Automated announcement from builder-github The package
Or update dom0 via Qubes Manager. |
Automated announcement from builder-github The package
|
Qubes OS version (e.g.,
R3.1
):R3.1
Affected TemplateVMs (e.g.,
fedora-23
, if applicable):xscreensaver on XFCE
Expected behavior:
sensitive notifications are not displayed when the screen is locked.
Actual behavior:
sensitive notifications are displayed when the screen is locked.
Steps to reproduce the behavior:
Use Signal Desktop, receive a message. The message will be pushed through xscreensaver and display to the user even if they have locked the screen.
Related issues:
#888
#963
#1917
The text was updated successfully, but these errors were encountered: