Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upChange default screen locker to physlock #1917
Comments
mfc
added
enhancement
UX
labels
Apr 18, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
gutsle
Apr 18, 2016
Indeed there have been quite a few problems with the alternatives in the past
https://www.jwz.org/blog/2015/04/i-told-you-so-again/
gutsle
commented
Apr 18, 2016
|
Indeed there have been quite a few problems with the alternatives in the past |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
mfc
Apr 19, 2016
Member
is there any setting in xscreensaver to have it look like the XFCE log-in screen, rather than the default screensaver screen? having them look the same would be a step forward in UX, and the XFCE log-in screen certainly looks better.
|
is there any setting in xscreensaver to have it look like the XFCE log-in screen, rather than the default screensaver screen? having them look the same would be a step forward in UX, and the XFCE log-in screen certainly looks better. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Apr 19, 2016
Member
I'm not aware of any, unfortunately. There are settings for screen saver
itself, but not for password prompt.
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
|
I'm not aware of any, unfortunately. There are settings for screen saver Best Regards, |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
cfcs
Apr 30, 2016
XScreensaver is a security disaster.
There is a long discussion / evaluation here:
#963
It's my personal opinion that spending time on prettifying a lock screen is great, but the work should be done on a screenlocking solution that we actually want to use. Please have a look at the two suggestions below:
- https://github.com/the-cavalry/light-locker/
physlock(terminal-only, so no fancy bells and whistles).
cfcs
commented
Apr 30, 2016
|
XScreensaver is a security disaster. It's my personal opinion that spending time on prettifying a lock screen is great, but the work should be done on a screenlocking solution that we actually want to use. Please have a look at the two suggestions below:
|
mfc
referenced this issue
May 24, 2016
Open
[XFCE] locked xscreensaver displays sensitive notifications #2026
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
confirmed: #2026 |
andrewdavidwong
added
P: minor
C: desktop-linux
labels
May 25, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
cfcs
Jun 11, 2016
I'm going to be bold and suggest that the KDE lock screen, apart from issues with random crashes, has similar issues related to stuff popping up on top, especially at times when you (or an attacker) attaches/detaches VGA/HDMI/whatever cables, or rotates monitors and so on.
Physlock is the way to go.
cfcs
commented
Jun 11, 2016
|
I'm going to be bold and suggest that the KDE lock screen, apart from issues with random crashes, has similar issues related to stuff popping up on top, especially at times when you (or an attacker) attaches/detaches VGA/HDMI/whatever cables, or rotates monitors and so on. Physlock is the way to go. |
andrewdavidwong
added
the
C: desktop-linux-xfce4
label
Jul 30, 2016
andrewdavidwong
changed the title from
change default lock screen in XFCE
to
Change default screen locker to physlock
Dec 24, 2016
andrewdavidwong
added
P: major
security
and removed
P: minor
labels
Dec 24, 2016
andrewdavidwong
added this to the Release 4.1 milestone
Dec 24, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
Dec 24, 2016
Member
XScreensaver is a security disaster.
There is a long discussion / evaluation here:
#963
No, that's a discussion of the KDE screen locker, which (as you know) is different. The only thing about XScreenSaver in that thread is a link to a problem with suspend. XScreenSaver is actually one of the more secure screen lockers available (which perhaps isn't saying much). At any rate, it does sound like physlock would be better.
XScreensaver is a security disaster.
confirmed: #2026
This, however, appears to be a legitimate security issue with XScreenSaver.
No, that's a discussion of the KDE screen locker, which (as you know) is different. The only thing about XScreenSaver in that thread is a link to a problem with suspend. XScreenSaver is actually one of the more secure screen lockers available (which perhaps isn't saying much). At any rate, it does sound like physlock would be better.
This, however, appears to be a legitimate security issue with XScreenSaver. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
cfcs
Jan 20, 2017
@andrewdavidwong I kind of disagree, did you read the discussion? Anyway, the most important link in there, which I'd like to repost, is this one (by a KDE developer) who explains why the KDE screen locker is not sufficient, and why Xorg-based screen lockers are inherently insecure: http://blog.martin-graesslin.com/blog/2015/01/why-screen-lockers-on-x11-cannot-be-secure/
So, I restate my opinion about physlock and would like to hear some arguments against it. :)
cfcs
commented
Jan 20, 2017
|
@andrewdavidwong I kind of disagree, did you read the discussion? Anyway, the most important link in there, which I'd like to repost, is this one (by a KDE developer) who explains why the KDE screen locker is not sufficient, and why Xorg-based screen lockers are inherently insecure: http://blog.martin-graesslin.com/blog/2015/01/why-screen-lockers-on-x11-cannot-be-secure/ So, I restate my opinion about physlock and would like to hear some arguments against it. :) |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
Jan 20, 2017
Member
I kind of disagree,
You kind of disagree with what?
did you read the discussion?
Yes. I would not have said what I did if I had not.
Anyway, the most important link in there, which I'd like to repost, is this one (by a KDE developer) who explains why the KDE screen locker is not sufficient, and why Xorg-based screen lockers are inherently insecure: http://blog.martin-graesslin.com/blog/2015/01/why-screen-lockers-on-x11-cannot-be-secure/
What does this have to do with anything I said?
So, I restate my opinion about physlock and would like to hear some arguments against it. :)
What did I say that requires an argument against physlock or your opinion about physlock?
You kind of disagree with what?
Yes. I would not have said what I did if I had not.
What does this have to do with anything I said?
What did I say that requires an argument against physlock or your opinion about physlock? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
cfcs
Feb 6, 2017
No, that's a discussion of the KDE screen locker, which (as you know) is different.
@andrewdavidwong I kind of disagree, did you read the discussion?
You kind of disagree with what?
That the discussion is about the KDE screen locker [and all other Xorg-based screen lockers] is irrelevant to discussion of XScreenSaver security. The link provided in my comment above highlights why XScreenSaver (and the KDE screen locker, and all the other ones) is an attempt to solve the problem using an inherently insecure approach.
So, I restate my opinion about physlock and would like to hear some arguments against it. :)
What did I say that requires an argument against physlock or your opinion about physlock?
Nothing, except that XScreenSaver was one of the more secure projects around. That remark was meant for everyone, including @marmarek and people who can decide what goes into Qubes. I realize physlock is not very pretty, but perhaps it could be an optional thing? :)
PS: XScreenSaver nostalgia: http://insecure.org/sploits/xscreensaver.html ;)
cfcs
commented
Feb 6, 2017
That the discussion is about the KDE screen locker [and all other Xorg-based screen lockers] is irrelevant to discussion of XScreenSaver security. The link provided in my comment above highlights why XScreenSaver (and the KDE screen locker, and all the other ones) is an attempt to solve the problem using an inherently insecure approach.
Nothing, except that XScreenSaver was one of the more secure projects around. That remark was meant for everyone, including @marmarek and people who can decide what goes into Qubes. I realize PS: XScreenSaver nostalgia: http://insecure.org/sploits/xscreensaver.html ;) |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
Feb 6, 2017
Member
That the discussion is about the KDE screen locker [and all other Xorg-based screen lockers] is irrelevant to discussion of XScreenSaver security. The link provided in my comment above highlights why XScreenSaver (and the KDE screen locker, and all the other ones) is an attempt to solve the problem using an inherently insecure approach.
You specifically said "XScreensaver is a security disaster," so, naturally, I thought you were referring specifically to... XScreenSaver. If your comment was supposed to be about all Xorg-based screen lockers, then of course I agree. This is a point I raised about Qubes years ago:
https://groups.google.com/d/topic/qubes-devel/G_wVSL9WtEk/discussion
Nothing, except that XScreenSaver was one of the more secure projects around.
I said it's "one of the more screen lockers available (which perhaps isn't saying much). At any rate, it does sound like physlock would be better." As far as Xorg-based screen lockers go, I think it does better than most, but I also agree that Xorg-based screen lockers as a whole are problematic (again, this is all in the old thread linked above).
That remark was meant for everyone, including @marmarek and people who can decide what goes into Qubes. I realize
physlockis not very pretty, but perhaps it could be an optional thing? :)
When it comes to security-critical components, I don't think prettiness should matter much, and I don't think a significantly more secure solution should be merely optional. It should be the default.
You specifically said "XScreensaver is a security disaster," so, naturally, I thought you were referring specifically to... XScreenSaver. If your comment was supposed to be about all Xorg-based screen lockers, then of course I agree. This is a point I raised about Qubes years ago: https://groups.google.com/d/topic/qubes-devel/G_wVSL9WtEk/discussion
I said it's "one of the more screen lockers available (which perhaps isn't saying much). At any rate, it does sound like physlock would be better." As far as Xorg-based screen lockers go, I think it does better than most, but I also agree that Xorg-based screen lockers as a whole are problematic (again, this is all in the old thread linked above).
When it comes to security-critical components, I don't think prettiness should matter much, and I don't think a significantly more secure solution should be merely optional. It should be the default. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Feb 6, 2017
Member
|
What about light-locker? It spawns a second X server and switch to it for
the locking. There are some technical difficulties with running a second
X server in dom0, but I think it should be manageable.
…--
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
|
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
jpouellet
Feb 7, 2017
Contributor
We are in a unique position to be able to solve this once and for all in a more robust way than any other X-based system I am aware of.
We should be able to just kill and restart the entire dom0 X session (or s/dom0/GuiVM/ when we get there). This would not rely on your system not accidentally killing the screen locker, or accidentally making VTs available.
I've had this idea for a while, but implementation is blocked on not some issue reconnecting to already-running gui-daemons that I haven't gotten around to debugging. The same thing needs to be fixed to be able to log out and log back in (which happens sometimes, like when restoring a large VM backup and the OOM killer gets triggered in dom0 and decides X looks like the best candidate... sigh) instead of needing to reboot your whole machine.
|
We are in a unique position to be able to solve this once and for all in a more robust way than any other X-based system I am aware of. We should be able to just kill and restart the entire dom0 X session (or s/dom0/GuiVM/ when we get there). This would not rely on your system not accidentally killing the screen locker, or accidentally making VTs available. I've had this idea for a while, but implementation is blocked on not some issue reconnecting to already-running gui-daemons that I haven't gotten around to debugging. The same thing needs to be fixed to be able to log out and log back in (which happens sometimes, like when restoring a large VM backup and the OOM killer gets triggered in dom0 and decides X looks like the best candidate... sigh) instead of needing to reboot your whole machine. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
jpouellet
Feb 7, 2017
Contributor
The important thing to note is that we could do this without losing state about the currently logged-in session, because the AppVM X sessions stay alive but can be rendered inaccessible in a fail-closed manner unlike on other systems with a single X session connected to both the display and the apps you wish to protect needs to stay alive.
|
The important thing to note is that we could do this without losing state about the currently logged-in session, because the AppVM X sessions stay alive but can be rendered inaccessible in a fail-closed manner unlike on other systems with a single X session connected to both the display and the apps you wish to protect needs to stay alive. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Feb 7, 2017
Member
Killing dom0 X session is not harmless. GUI daemon tries its best to recover what's possible but not everything is possible. For example:
- desktop assigned to windows will be lost (everything will appear on the same desktop)
- tray icons will get undocked, which is most cases require restarting an application to get them back
- restarting gui-daemon mean creating windows (at dom0 side) again, and window manager may decide to rearrange them
Some of those probably could be solved somehow, but in general touching anything around X11 handling is very risky. There are so many different toolkits, or even custom implementations that almost every change here breaks some application...
|
Killing dom0 X session is not harmless. GUI daemon tries its best to recover what's possible but not everything is possible. For example:
Some of those probably could be solved somehow, but in general touching anything around X11 handling is very risky. There are so many different toolkits, or even custom implementations that almost every change here breaks some application... |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
cfcs
Feb 7, 2017
@andrewdavidwong Cool, I think we're on the same page then!
@marmarek I think light-locker seems really promising. Someone (well, multiple independent people!) would have to investigate how well it manages in crash situations.
I think that killing the dom0 session to lock the screen is a bit over the top - you don't want that to happen in the middle of a dom0 update, or when doing any sort of maintenance. I usually keep a dom0 terminal window around at all times, I would hate if that was killed every time the screen went idle.
Also window placement, and everything else, would be totally fucked for users who use custom configurations for the window manager, or use their own window managers.
cfcs
commented
Feb 7, 2017
•
|
@andrewdavidwong Cool, I think we're on the same page then! @marmarek I think light-locker seems really promising. Someone (well, multiple independent people!) would have to investigate how well it manages in crash situations. I think that killing the dom0 session to lock the screen is a bit over the top - you don't want that to happen in the middle of a dom0 update, or when doing any sort of maintenance. I usually keep a dom0 terminal window around at all times, I would hate if that was killed every time the screen went idle. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
jpouellet
Feb 7, 2017
Contributor
@cfcs If your only reason for wanting to retain a dom0 terminal is to ease disaster recovery in case of updates gone wrong (or other system-messed-up-ness), you can always just switch to a non-X VT (Ctrl+Alt+F2) and login there.
|
@cfcs If your only reason for wanting to retain a dom0 terminal is to ease disaster recovery in case of updates gone wrong (or other system-messed-up-ness), you can always just switch to a non-X VT (Ctrl+Alt+F2) and login there. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
ideologysec
Apr 7, 2017
I'm sure this is buried in the issues or docs somewhere, but - at what point does Qubes envision transitioning to Wayland? (which would solve a heck of a lot of these "X11 lockscreens suck by design" problems.
Also, does physlock support YuibKey 2FA unlock? Wasn't able to dig up anything that said so (because while X11+YubiKey might be actually less secure than physlock, YubiKey+an actually secure screensaver would be dynamite).
ideologysec
commented
Apr 7, 2017
•
|
I'm sure this is buried in the issues or docs somewhere, but - at what point does Qubes envision transitioning to Wayland? (which would solve a heck of a lot of these "X11 lockscreens suck by design" problems. Also, does physlock support YuibKey 2FA unlock? Wasn't able to dig up anything that said so (because while X11+YubiKey might be actually less secure than physlock, YubiKey+an actually secure screensaver would be dynamite). |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
ksoona
Jan 20, 2018
Can I at least set a screensaver instead of just the black screen? I can't install xscreensaver-extras or anything.
ksoona
commented
Jan 20, 2018
|
Can I at least set a screensaver instead of just the black screen? I can't install xscreensaver-extras or anything. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
cfcs
Jan 20, 2018
@ksoona This thread is about making Qubes stop using an insecure screensaver, not about making the insecure screensaver prettier; you should probably file a new issue if that is what you want.
cfcs
commented
Jan 20, 2018
|
@ksoona This thread is about making Qubes stop using an insecure screensaver, not about making the insecure screensaver prettier; you should probably file a new issue if that is what you want. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
h01ger
Mar 16, 2018
FWIW, I just gave physlock a try and it worked great :) Is physlock available in fedora 25?
I also like its secure design, as opposed to other unsecure-by-design xscreenlockers... ;)
h01ger
commented
Mar 16, 2018
|
FWIW, I just gave physlock a try and it worked great :) Is physlock available in fedora 25? I also like its secure design, as opposed to other unsecure-by-design xscreenlockers... ;) |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
TBK
May 2, 2018
Apparently it is a hopeless cause on X11 - http://blog.martin-graesslin.com/blog/2015/01/why-screen-lockers-on-x11-cannot-be-secure/ the only way to solve it is to switch to Wayland (#3366).
I experienced this scenario for the first time a couple of days ago:
And yes that is the case: opening a context menu on any window prevents the screen locker from activating. - source: the link above
Luckily it happened at home and only gone for a short while.
Since then I have conducted several test on several machines and it is the same, context menu blocks the screensaver from activating.
TBK
commented
May 2, 2018
|
Apparently it is a hopeless cause on X11 - http://blog.martin-graesslin.com/blog/2015/01/why-screen-lockers-on-x11-cannot-be-secure/ the only way to solve it is to switch to Wayland (#3366). I experienced this scenario for the first time a couple of days ago: Luckily it happened at home and only gone for a short while. Since then I have conducted several test on several machines and it is the same, context menu blocks the screensaver from activating. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
cfcs
May 2, 2018
@TBK I posted that link last year: #1917 (comment)
if you would care to read 10% the comments in the thread before replying you would have noticed that there is another way, physlock.
cfcs
commented
May 2, 2018
|
@TBK I posted that link last year: #1917 (comment) if you would care to read 10% the comments in the thread before replying you would have noticed that there is another way, |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
TBK
commented
May 2, 2018
|
@cfcs My bad, should not have posted in the middle of the night. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
cfcs
May 3, 2018
@TBK No worries. You were completely right that it's hopeless on X11, and that this is a security flaw that is even documented in the FAQ of xscreensaver.
This three year old comment by @nvesely has a proposed fix to this security flaw in Qubes in case you want to secure your system (I don't think the Qubes upstream has made it clear by now that they don't consider screenlocking a security measure): #963 (comment)
cfcs
commented
May 3, 2018
•
|
@TBK No worries. You were completely right that it's hopeless on X11, and that this is a security flaw that is even documented in the FAQ of This three year old comment by @nvesely has a proposed fix to this security flaw in Qubes in case you want to secure your system (I don't think the Qubes upstream has made it clear by now that they don't consider screenlocking a security measure): #963 (comment) |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
TBK
May 3, 2018
@cfcs Thanks, I will look into that.
Qubes OS is not the easiest project to to get a clear image of the state of things.
TBK
commented
May 3, 2018
•
|
@cfcs Thanks, I will look into that. Qubes OS is not the easiest project to to get a clear image of the state of things. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
nvesely
May 3, 2018
I haven't used qubes in a while, but the services in this repo were working as of 3 years ago.
nvesely
commented
May 3, 2018
•
|
I haven't used qubes in a while, but the services in this repo were working as of 3 years ago. |
andrewdavidwong
referenced this issue
May 14, 2018
Open
Open Xfce4 Applications Menu prevents XScreenSaver lock on lid close and suspend #3898
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
dylangerdaly
Jul 8, 2018
I'm hitting errors using physlock (muennich/physlock#44 (comment))
Issue looks to be related to PAM.
How are you guys using physlock? I want to stop relying on xscreensaver...
dylangerdaly
commented
Jul 8, 2018
|
I'm hitting errors using physlock (muennich/physlock#44 (comment)) Issue looks to be related to PAM. How are you guys using physlock? I want to stop relying on xscreensaver... |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
dylangerdaly
Jul 9, 2018
Rebuilding with SESSION=systemd and setting up the PAM module fixed it for me.
dylangerdaly
commented
Jul 9, 2018
|
Rebuilding with SESSION=systemd and setting up the PAM module fixed it for me. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Aekez
Jul 22, 2018
It may not be feasible/desireable, but what are the prospects of using something like firejail on the various of different screensavers being considered, in order to minimize (make harder) bypassing with security exploits?
Firejail can sandbox any type of processes: servers, graphical applications, and even user login sessions.
- Quote source: https://firejail.wordpress.com/
Presumably, it could help increase the isolation layers within dom0 itself (or future stub-domain where lock-screen resides)?
Aekez
commented
Jul 22, 2018
|
It may not be feasible/desireable, but what are the prospects of using something like firejail on the various of different screensavers being considered, in order to minimize (make harder) bypassing with security exploits?
Presumably, it could help increase the isolation layers within dom0 itself (or future stub-domain where lock-screen resides)? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
cfcs
Jul 22, 2018
@Aekez Using firejail on xscreensaver and the other X-based screensavers actually increases the likelihood that they will crash, meaning that it increases the attack surface for someone looking to bypass your lock screen. For physlock I don't think it would make much of a difference, but wouldn't hurt.
EDIT: What they mean by user login sessions in the highlighted part of the quote above is that it can sandbox a "user session," ie you can attempt to separate multiple processes running under the same PID (in Linux that is pretty hard to do effectively; if you allow those sessions to access X you largely lose the benefit of the sandboxing).
cfcs
commented
Jul 22, 2018
•
|
@Aekez Using firejail on EDIT: What they mean by |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Aekez
Jul 22, 2018
@cfcs ah, that's unfortunate if it can make it even worse. Thanks for sharing the insight though.
Aekez
commented
Jul 22, 2018
|
@cfcs ah, that's unfortunate if it can make it even worse. Thanks for sharing the insight though. |
mfc commentedApr 18, 2016
Qubes OS version (e.g.,
R3.1): R3.1Expected behavior:
lock screen looks like log-in screen
Actual behavior:
lock screen looks wacky-different. also ugly.
Steps to reproduce the behavior:
lock screen in XFCE
General notes:
see this Ask Ubuntu for reasons why this is a bad lockscreen: https://askubuntu.com/questions/216323/ugly-lock-screen-in-xubuntu
perhaps switch to gnome-screensaver as suggested in the Ask Ubuntu thread.