Email or username:

Password:

Forgot your password?
Top-level
Lennart Poettering

… and continue with their nefarious deeds.

With systemd v257 we added support for an alternative SAK implementation that should not suffer by these limitations: logind will now watch input devices for the Ctrl+Alt+Shift+Esc key combination, continously, regardless which session is in the foreground. Once it sees the combination being hit, it fires off a D-Bus signal.

The idea is then that the display manager sees this signal, and switches back to the the login screen in a reliable manner.

6 comments
Lennart Poettering

This should be a much friendlier SAK implementation: the original session is not terminated, but just switched away, taking away control of the keyboard, mouse and screen, without chance for the unprivileged code to interfere.

Note that before this actually becomes useful the display managers of the various desktop environments need to be updated to watch for the SAK signal. But the groundwork is laid now.

And that's it for today.

Anselm Schüler

@pid_eins Can I define a custom key combination? How are alternate keyboard layouts handled (e.g. Mac)?

marius

@pid_eins is DBus robust enough for this kind of security mechanism? I would have thought that systemd can do something more drastic like freezing all sessions and switching to a "login" target :D (speaking as someone very far out the sidelines)

Lennart Poettering

@mariusor well, if dbus is hosed, systemd is pretty much hosed, too. SAK is probably the least of you problems then.

marius

@pid_eins I understand, I think I was asking more in the idea of this SAK message having to be secured some way against being intercepted by malicious listeners. I guess I don't really know enough about the situation to actually form a pertinent question, sorry. :)

Go Up