cprise:
>
> On 12/19/13 18:42, adrelanos wrote:
>> Hi,
>>
>> how important is it to use a strong password for the operating system
>> user account? (The thing used at login.)
>>
>> Which disadvantages would one have for using a weak one?
>>
>> Would it matter if root password = user password?
>>
>> Cheers,
>> adrelanos
>>
>
> The only important function for the dom0 user password I can think of is
> the screen lock.
>
Agreed.
> "Weak" depends on the context. IMHO, the threat model for a screen lock
> is less demanding in terms of length/complexity (its only going to be
> used to guard against an attacker on a keyboard, with input severely
> limited by the unlock screen's constraints).
>
Yes, but in order to make a decision about how long and complex the
screen locker password should be (and this is an important decision,
since many users will be typing that password dozens of times every
day), we must know what kind of security the screen locker provides.
Obviously, the screen locker is only relevant to attackers with physical
access to the system. But physical access comes in degrees. For example,
if it's a desktop computer, the keyboard and mouse might be freely
accessible while the tower is locked in a metal box. In this case,
attacks which require access to internal components of the computer
(like cold boot attacks) are significantly more difficult (the degree of
difficulty depends on things like how hard it is to cut through the
metal box or break/pick/bump the lock). In this scenario, the screen
locker might be very useful *if* there really is no way to gain access
without the correct password. If it's easy to bypass the screen locker,
then the owner of the computer will probably have a false sense of
security (and have wasted money and effort on putting the tower in a
locked metal box!).
> If this were a normal system (not Qubes) the threat model for the user
> password is greatly expanded to brute force attempts via multiple
> interfaces, and malware running as unprivileged trying to get admin
> access. In Qubes, those attackers just hit the vm wall and don't get any
> chance to even try a dom0 user password.
>
(Unless, of course, the attacker can break out of the VM.)
> Adding a root password and making it the same as the normal dom0 user
> sounds like it would keep casual users with physical access to the
> system from making changes to the system.
The key word here being "casual." Even then, I would hesitate to say
this, as we really don't want to give anyone the impression that someone
with access to dom0 doesn't effectively own the system.
> I haven't tried it but if you
> have other people using the system it may be worth trying. However,
> since the passwords are the same, anyone who knows how to unlock the
> screen would also know the password for superuser functions (i.e.
> freedom to change the core system).
The problem with this is that Qubes is not intended to be a multi-user
system, and as soon as you introduce multiple users, you also introduce
a whole slew of complicated security issues that it would take us
forever to even begin to cover.
> Side note: Discussing this make me think that adding an option in Qubes
> to require a password to change vm settings would be useful for certain
> situations.
See above. This will only be useful against the most casual of people
with physical access. Only if they really have no idea what they're
doing (or have no desire to subvert your system) would a measure like
this be at all effective. And, even then, as a point of human
psychology, you probably shouldn't assume that someone who conveys the
appearance of ignorance or harmlessness can be trusted and isn't
secretly a smart, evil adversary.