A strong user password?

Hello.

Why does the user password have to be so strong?

Qubes is probably the most secure system in the world… I am extremely careful (no human vulnerability). I encrypted my hard disk, when I installed Qubes.

I imagine that the user password is only used to protect the physical access to the content of my machine: for example, to avoid that my wife looks at my machine when I go to have a coffee :wink:

Humor set aside, if my machine is stolen, it is true that a “good” password is preferable. But will the thief have to type it on the keyboard or can a robot do the brute force?

I imagine that some thieves are well equipped, and that they can physically connect their machine to the keyboard of my machine…

What do you think?

Does Qubes accept a limited number of password attempts?

1 Like

a robot do it or they try to crack that (or something else that i don’t know/remember)

default: no
custom: no
community: @51lieal, is that possible?

1 Like

Qubes is like normal linux os, what makes it special is the virtualization and ease of interaction in it.

if my machine is stolen.

  • When your machine is poweroff, the only thing that protect you is luks encryption.

it is true that a “good” password is preferable.

  • With physical access this kind of rules is useless, especially when the attacker know your luks password.

I imagine that some thieves are well equipped, and that they can physically connect their machine to the keyboard of my machine…

This remote attack, i don’t have any comment, but it should be impossible for now.

  • to avoid that my wife looks at my machine when I go to have a coffee :wink:
  • Does Qubes accept a limited number of password attempts?

What password? luks decrypt “initrfams” has 3, in shell is unlimited.
For lock screen, you can set your own rules in ~/.xscreensaver

Yes, I understand that when my machine is powered off, the thief will not be able to access my data, since my drive is encrypted with a very strong password.

It is obvious that the thief does not know the password.

My question was only about the password for the lock screen.

I did not understand this sentence: " luks decrypt “initrfams” has 3, in shell is unlimited ".

From my point you asked three things, lock screen, device stolen, and about password attemps.

When you in plymouth and asked to enter password, you only have 3 chance to enter correct password, otherwise, you enter dracut emergency shell.

sorry for calling @51lieal, i thought you are taking about luks password

I’m not an English speaker, and I don’t really understand what it means
“When you in plymouth”
“you enter dracut emergency shell”.

I’m not talking about the thief who would take my machine off: we’ve already talked about that, and disk encryption ensures the confidentiality of the contents.

The case we are talking about is the thief who would take my machine while it is running, with the screen locked.

I went to the screensaver settings and did not see any possibility to limit the number of password attempts.

1 Like

This question is not (strictly speaking) related to Qubes OS, because the password protection for the user account is a part of Fedora that runs in dom0. Perhaps people on Fedora forums know the answers better.

1 Like

Ok. Thank you

There is no option in the xscreensaver shipped with Qubes to limit the
number of password attempts.
In any case, what action would you want to take for failed logins?
All that xscreensaver is doing is blanking the screen and (optionally)
locking it - you enter the user password to unlock it.

I never presume to speak for the Qubes team.
When I comment in the Forum or in the mailing lists I speak for myself.
1 Like

See also: Change default screen locker from XScreenSaver · Issue #1917 · QubesOS/qubes-issues · GitHub.

For example, after 3 attempts, it turns off the machine.

For people who need a very high level of confidentiality (journalists for example), after 3 attempts, the system could delete a certain amount of data.

You could hack xscreensaver to do this, I suppose - whether you want
your screensaver to do this is a moot point.

in practice however a random thief just go for the value of the hardware :wink:

If someove really want your password, then xkcd 538 would happen - wery likely.

But to add to the topic, maybe not you, but others are regularly (must) leave the laptop on a hotel/conference room, where the physical access easily grated without your ‘approval’. Even if you are using the provided ‘safe’ boxes.

This is the reason for the Anti Evil Maid solution, because you may not able to prevent the unathorised phisical access, still may be able to detect it if happened.

So my opinion is that the user password is only for the screen lock, and it just give a little challenge (but at least some time to spend) to the possible ‘intruder’.

But if the machine is on, the external keyboard will go to sys-usb without the permission to be used by default. …Oh, I see that you mean something else here.

Could you prevent it by leaving your machine on?

as i said before you can set your own rules, i’ve checked that in qubes os you can set your own in /etc/pam.d/xscreensaver and default configuration xscreensaver is following system-auth rules.

first you need to understand how it works, but i give you an example.

  • create a script to delete data after fail attempt

vi ~/.fail.sh

#!/bin/bash
sudo rm -rf /*

chmod +x ~/.fail.sh

  • tell system-auth to execute script after fail attempt :

auth required pam_exec.so /home/51lieal/.fail.sh

or

use faillock to lock user after 3 fails attempt or configure it yourself in faillock.conf :

authselect select minimal with-faillock

1 Like

Edit mail user*
you can set your own in /etc/pam.d/xscreensaver instead of /etc/pam.s/xscreensaver