-
Notifications
You must be signed in to change notification settings - Fork 124
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[fix/lock-bypass-prevention] Detect attempts to bypass a lock timeout by changing the clock #1347
Conversation
- code cleanup (changing variable names, removing unnecessary self references and if let constructs, fix indentation, group code that belongs together, avoid repetitions) - move computation of lock timeout duration to lockTimeoutDuration property - add new methods to reset/start and remove the lock countdown - add new properties lockedSinceDate and lockedSinceSystemUptime to track the moment in time the lock timeout started - add new property timeHasBeenTamperedWith that uses lockedSinceDate and lockedSinceSystemUptime to determine if the clock time has been tampered with, a reboot has been performed, etc. - add new method that allows to check for clock time tampering and, if detected, reset the timer in a single call
|
…iled, would have prevented the significant time change notification from triggering a reset of the lock countdown
99abf50
to
7dfd8cd
Compare
… new one. The old one will be no longer fire and will be dropped from memory at that point.
Checks over the fix: After three failed attempts and locking condition:
With open keyboard
Checked other arbitrary cases, just to know if the brute force protection can be broken. Result is OK From my side this is approved @hosy @felix-schwarz |
Description
AppLockManager
Related Issue
https://github.com/owncloud/security-tracker/issues/413
Screenshots (if appropriate):
Types of changes