Skip to content

Custom MacBook login screen and pam modules using multipeer connectivity and usb hardware checks with iOS app for sign in.

License

Notifications You must be signed in to change notification settings

exopacket/a_plus_plus

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

27 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

update coming soon

new GUI with most todo's done & vulnerabilities fixed coming soon!

a_plus_plus

Custom MacBook login screen and pam modules using multipeer connectivity and usb hardware checks with iOS app for sign in.

//TODO:

// shutdown, reboot, and sleep from login screen

// Actual Login Screen implementation for loginwindow (other than pam module for sudo, su, etc)

// Screensaver implementation

// Better documentation

// Multiple devices with matching keys

// Install script/Installer

The files are not commented very well, so I apologize for that.

All .so files for pam on macos are for arm64.

Wrote this in about a week or so; originally tried a bluetooth only solution. That would be why you see Bluetooth everywhere.

features

  • uuid ("hardware") check for iPhone; must be plugged in to authenticate successfully. (optional)
  • random pin that is encrypted (hashed) & used for key generation/encryption on one device and decrypted on another using multipeer. The pin is never transferred via multipeer, rather verified by user input through creating a unique service id on the mac and iphone. After successfully connecting (and ultimately verifiying the PIN), the key generated is used to encrypt the payload going from the phone to the Mac.
  • 10 second delay to prevent unwanted authentication, brute force, and to notify the user of a login attempt.
  • app written in swift to control authentication, as well as full screen login screen that cannot be exited until delay is complete.

known vulnerabilities

  • Application could be called from within a loop causing the login screen and authentication system to be called repeatedly.
  • Unwanted calls to the pam module has no mechanism for prevention. (No macOS GUI verification)
  • No overall logging system within the pam module. Very important for tracking & tracing the unwanted calls.

license note

This software and intellecutal property cannot be sold. You may use it for your personal computer and modify it / do whatever you wish to do with the code. If you pass it on, all that is required is that you leave me in the comments (ryanfitzgerald).

About

Custom MacBook login screen and pam modules using multipeer connectivity and usb hardware checks with iOS app for sign in.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published