blob: 260e1d3687bdcdc374df2fa9ea83f1af91176045 [file] [log] [blame]
Mauro Carvalho Chehab22731942017-05-17 07:45:57 -03001=========================================
2Linux Secure Attention Key (SAK) handling
3=========================================
4
5:Date: 18 March 2001
6:Author: Andrew Morton
Linus Torvalds1da177e2005-04-16 15:20:36 -07007
8An operating system's Secure Attention Key is a security tool which is
9provided as protection against trojan password capturing programs. It
10is an undefeatable way of killing all programs which could be
11masquerading as login applications. Users need to be taught to enter
12this key sequence before they log in to the system.
13
14From the PC keyboard, Linux has two similar but different ways of
15providing SAK. One is the ALT-SYSRQ-K sequence. You shouldn't use
16this sequence. It is only available if the kernel was compiled with
17sysrq support.
18
19The proper way of generating a SAK is to define the key sequence using
Mauro Carvalho Chehab22731942017-05-17 07:45:57 -030020``loadkeys``. This will work whether or not sysrq support is compiled
Linus Torvalds1da177e2005-04-16 15:20:36 -070021into the kernel.
22
23SAK works correctly when the keyboard is in raw mode. This means that
24once defined, SAK will kill a running X server. If the system is in
25run level 5, the X server will restart. This is what you want to
26happen.
27
28What key sequence should you use? Well, CTRL-ALT-DEL is used to reboot
29the machine. CTRL-ALT-BACKSPACE is magical to the X server. We'll
30choose CTRL-ALT-PAUSE.
31
Mauro Carvalho Chehab22731942017-05-17 07:45:57 -030032In your rc.sysinit (or rc.local) file, add the command::
Linus Torvalds1da177e2005-04-16 15:20:36 -070033
34 echo "control alt keycode 101 = SAK" | /bin/loadkeys
35
36And that's it! Only the superuser may reprogram the SAK key.
37
38
Mauro Carvalho Chehab22731942017-05-17 07:45:57 -030039.. note::
Linus Torvalds1da177e2005-04-16 15:20:36 -070040
Mauro Carvalho Chehab22731942017-05-17 07:45:57 -030041 1. Linux SAK is said to be not a "true SAK" as is required by
42 systems which implement C2 level security. This author does not
43 know why.
Linus Torvalds1da177e2005-04-16 15:20:36 -070044
45
Mauro Carvalho Chehab22731942017-05-17 07:45:57 -030046 2. On the PC keyboard, SAK kills all applications which have
47 /dev/console opened.
Linus Torvalds1da177e2005-04-16 15:20:36 -070048
Mauro Carvalho Chehab22731942017-05-17 07:45:57 -030049 Unfortunately this includes a number of things which you don't
50 actually want killed. This is because these applications are
51 incorrectly holding /dev/console open. Be sure to complain to your
52 Linux distributor about this!
Linus Torvalds1da177e2005-04-16 15:20:36 -070053
Mauro Carvalho Chehab22731942017-05-17 07:45:57 -030054 You can identify processes which will be killed by SAK with the
55 command::
Linus Torvalds1da177e2005-04-16 15:20:36 -070056
57 # ls -l /proc/[0-9]*/fd/* | grep console
58 l-wx------ 1 root root 64 Mar 18 00:46 /proc/579/fd/0 -> /dev/console
59
Mauro Carvalho Chehab22731942017-05-17 07:45:57 -030060 Then::
Linus Torvalds1da177e2005-04-16 15:20:36 -070061
62 # ps aux|grep 579
63 root 579 0.0 0.1 1088 436 ? S 00:43 0:00 gpm -t ps/2
64
Mauro Carvalho Chehab22731942017-05-17 07:45:57 -030065 So ``gpm`` will be killed by SAK. This is a bug in gpm. It should
66 be closing standard input. You can work around this by finding the
67 initscript which launches gpm and changing it thusly:
Linus Torvalds1da177e2005-04-16 15:20:36 -070068
Mauro Carvalho Chehab22731942017-05-17 07:45:57 -030069 Old::
Linus Torvalds1da177e2005-04-16 15:20:36 -070070
71 daemon gpm
72
Mauro Carvalho Chehab22731942017-05-17 07:45:57 -030073 New::
Linus Torvalds1da177e2005-04-16 15:20:36 -070074
75 daemon gpm < /dev/null
76
Mauro Carvalho Chehab22731942017-05-17 07:45:57 -030077 Vixie cron also seems to have this problem, and needs the same treatment.
Linus Torvalds1da177e2005-04-16 15:20:36 -070078
Mauro Carvalho Chehab22731942017-05-17 07:45:57 -030079 Also, one prominent Linux distribution has the following three
80 lines in its rc.sysinit and rc scripts::
Linus Torvalds1da177e2005-04-16 15:20:36 -070081
82 exec 3<&0
83 exec 4>&1
84 exec 5>&2
85
Mauro Carvalho Chehab22731942017-05-17 07:45:57 -030086 These commands cause **all** daemons which are launched by the
87 initscripts to have file descriptors 3, 4 and 5 attached to
88 /dev/console. So SAK kills them all. A workaround is to simply
89 delete these lines, but this may cause system management
90 applications to malfunction - test everything well.
Linus Torvalds1da177e2005-04-16 15:20:36 -070091