/srv/irclogs.ubuntu.com/2023/04/17/#ubuntu-security.txt

=== chris14_ is now known as chris14
tewardwho's alive on the security team19:44
tewardand can tell me if https://launchpad.net/bugs/2016436 was issued a CVE or not?19:44
-ubottu:#ubuntu-security- Launchpad bug 2016436 in calamares-settings-ubuntu (Ubuntu) "Calamares will let you set up a user account with no password" [Critical, Fix Released]19:44
tewardbecause i think it PROBABLY should have been issued one, as empty or missing passwords are in the CWE19:44
teward*pokes sarnold because it's Community, but this is found hard in Lubuntu at least*19:46
EickmeyerFound hard in Ubuntu Studio as well.19:59
Eickmeyerteward, sarnold: confirmed issue on 22.04.20:19
tewardor is someone else on Security around?  mdeslaur maybe?20:19
mdeslaurwhat's up teward 20:24
tewardmdeslaur: see above.  shouldn't that have a CVE issued since it was discovered in one of the Ubuntu flavors?  Or should I go through the full MITRE process?20:25
EickmeyerCorrection: TWO of the Ubuntu flavors.20:25
tewardnote: tsimonq2 believes this shouldn't be a security bug, but others on Security are against that and the bug is a public sec bug now20:25
teward(i'm surprised this didn't get a CVE if it's such a security concern)20:25
mdeslaurnot sure that is CVE worthy20:26
tewardack20:26
tewardbut it's *definitely* a security flaw wrt Ubuntu, yes?20:26
mdeslaurdid anything ship with it?20:26
tewardLubuntu and others going back I think to 22.0420:27
EickmeyerIt's in 22.04 Lubuntu and Ubuntu Studio, as well as 22.10 Lubuntu and Ubuntu Studio.20:27
EickmeyerSo, yes.20:27
tewardfound in STudio, and Eickmeyer confirmed it's present in 22.04 as well20:27
mdeslaurif the user wrote a password, and ended up with a blank one, that would be a flaw.20:27
sarnold*sigh* i'm getting nothing but timeouts on that bug :(20:27
mdeslaurnot enforcing a sane default is probably not considered a flaw20:27
tewardmdeslaur: but the inverse of "user entering no password and that being acceptable" is not considered a flaw?20:27
mdeslaurif it's documented it could be20:28
Eickmeyersarnold: TL;DR: Calamares isn't enforcing passwords (at all) in Lubuntu or Ubuntu Studio 22.04 or 22.10.20:28
mdeslaurelse it's just hardening and wouldn't satisfy the requirements for a CVE20:28
mdeslaurbut sarnold gets to decide20:28
tewardEickmeyer: it's also not setting "empty passwords" *as* empty passwords and hashing empty passwords if i'm reading jbicha's notes right20:28
Eickmeyerteward: That's correct, but it's acting as if it's an empty password as far as sudo and others are concerned.20:29
EickmeyerBasically, it's allowing passwordless escalation.20:29
tewardwhich is what sudo does when a user can be logged into but has no password IIRC20:29
EickmeyerCorrect.20:30
tewardEickmeyer: that's not a cala issue nor a CVE then20:30
tewardthat's just a user reducing security of their system by being autologin and passwordless i'd think20:30
teward(I hate passwordless as much as the next guy just saying)20:30
EickmeyerBut it's not autologin either.20:30
EickmeyerEscalation would still require a password in autologin.20:31
mdeslaur passwordRequirements:20:31
mdeslaur+    nonempty: true20:31
mdeslaur     minLength: 020:31
mdeslaur     maxLength: 020:31
Eickmeyermdeslaur: That's the fix.20:31
mdeslaurusers can still use a 1 letter password, right?20:31
Eickmeyermdeslaur: Looks like it.20:32
Eickmeyer(not that I'm a fan)20:32
tewardmdeslaur: do we know what the standard Desktop installer's requirements are for PW?  Or does that also allow empty passwords?20:32
sarnoldI don't think this is a CVE -- I'm not even sure I like the "nonempty: true", if a user wants a passwordless login, how else would they get it?20:32
tewardsarnold: see my take is20:33
tewardcala should check if it's empty and then throw a notice that user can accept the risk for20:33
tewardthereby *allowing* for a user to choose it and making it "User Choice" to accept the risks20:33
EickmeyerUbiquity nor ubuntu-desktop-installer allow for an empty password.20:33
tewardnot sure if the standard Gnome installers have that though20:33
sarnoldteward: that sounds kinder, yeah20:33
tewardif they don't permit an empty password then we should *I THINK* have that as a standard20:33
tewardand then consider that being added as a feature later in whatever install suite is in use20:34
tewardbut for 23.04 i think a standard requirement should be chosen for now, no?20:34
mdeslaurwhile less than ideal, I think this is a hardening issue, not a flaw per se20:34
tewardafter discussion here I would agree so no CVE required.  That still leaves the question of "sane defaults" which would be a Security decision I think20:35
tewardat least, until the feature is avaiable to throw a warn like sarnold says would be kinder20:35
mdeslauris that during the install only, or is it an applet in some sort of control panel too?20:36
tewardarraybolt3: Eickmeyer: ^20:36
EickmeyerI think so as well. I think those defaults *should* be based on what Ubiquity and ubuntu-desktop-installer enforce now.20:36
arraybolt3I know it happens during installation, unsure if the Users app lets you do that.20:36
* arraybolt3 checks20:36
Eickmeyermdeslaur: There's a KDE Control Module in Plasma's System Settings that allows the user to change their password.20:37
mdeslaurI believe the gnome control panel users app enforces password strength20:37
arraybolt3Also I missed the whole start of the conversation because it took me ~10 minutes to figure out I wasn't in this channel :P20:37
tewardarraybolt3: you has failed.  i'll pull you logs20:37
arraybolt3The "Users and Group" app in Lubuntu does allow you to make a passwordless account, but it also warns if you do so.20:38
Eickmeyermdeslaur: It enforces a minimum password length of 1 character. *facepalm*20:38
arraybolt3Or at least, the app tries to let you do that. The underlying `passwd` application it uses then forbids it.20:38
arraybolt3(I actually use one-characcter passwords all the time in testing :D)20:38
arraybolt3And for VMs.20:38
arraybolt3mdeslaur: The installer in Ubuntu allows you to make a one-character password. It just also tells you that it's a weak password.20:39
arraybolt3(That's the installer in Ubuntu Desktop I mean.)20:41
arraybolt3sarnold: If a user wants a passwordless *login*, there's an autologin box they can check. If they want passwordless *sudo*, there's a config file they can change. If they want "really truly no password", there's a command they can use (passwd -d). So this doesn't restrict the user's freedom, it only enforces a (more) sane default.20:42
mdeslaurwe definitely should turn on password strength meters and such in all the installers and control panel applets20:42
sarnold*nod* a nice little ⚠ NONE  / weak / okay  meter would be ideal20:43
EickmeyerSo, conclusion: Not a CVE, just a really bad idea.20:43
EickmeyerRight now, Calamares gives a friendly green checkmark if there's no password. *facepalm*20:44
arraybolt3Calamares has some more hardening options related to password strength, see https://github.com/calamares/calamares/blob/calamares/src/modules/users/users.conf#L11820:44
EickmeyerI mean Calamares as we have it configured prior to 23.0420:45
arraybolt3So "allowWeakPasswords: true, allowWeakPasswordsDefault: false" might be handy.20:45
arraybolt3(That way there's a box the user has to (un?)check in order to allow them to use a weak password.)20:46
arraybolt3Might be a bit late in the cycle to do that though, since that's a feature of Calamares that hasn't gotten extensive testing.20:46
arraybolt3(In Ubuntu.)20:46
arraybolt3Due to XScreenSaver's handling of an empty password, though, I think we should still require *some* password, just like Ubiquity/Ubuntu Desktop Installer.20:47
mdeslaurlooks like it was fixed in lunar?20:48
arraybolt3True. But it affects Jammy and needs SRU'd there.20:48
arraybolt3(Kinetic we intend to skip since we can't respin that one so there's no point.)20:48
mdeslaurah, ok, yeah, we'd definitely sponsor an update to -security for that so that it's available on the next respin for jammy20:49
Eickmeyermdeslaur: The point of this discussion was more to do with the effect on Jammy.20:49
mdeslaurI think it can wait for the next jammy point release20:50
arraybolt3Agreed.20:50
Eickmeyermdeslaur: Do you need the regular SRU paperwork?20:50
Eickmeyer(my uploads don't need sponsoring)20:50
mdeslaurno, file it as a security bug and subscribe ubuntu-security-sponsors to it20:50
EickmeyerWill do.20:50
mdeslaurand we will release it as a security update20:51
* Eickmeyer gets on it20:51
arraybolt3Should I be prepping a package or is that something the security team will do too?20:51
Eickmeyerarraybolt3: Since it's in Jammy, you don't have upload privs.20:51
EickmeyerI'll do it.20:51
mdeslaurwe'd want debdiffs in the bug to sponsor20:52
arraybolt3Eickmeyer: Pretty sure I can upload to jammy (I've done it on accident before).20:52
mdeslaurwe need to build it in the security ppa, so don't upload it to -proposed20:52
arraybolt3And on purpose for SRUs.20:52
Eickmeyermdeslaur: ack.20:52
Eickmeyerarraybolt3: Let me take this.20:52
arraybolt3Eickmeyer: +120:52
Eickmeyermdeslaur: Done21:12
JanCwhat is XScreenSaver's problem with empty passwords?22:55
sarnoldI didn't go looking but I assumed it was something like an input box 'submit' thing that wouldn't be hooked up until there was some input22:56
arraybolt3JanC: I think it's something with PAM or some such. Basically Calamares hashes the blank password rather than just setting a deleted password, and so the system behaves like there's a password even though the password is blank. Some programs work with this odd setup, but XScreenSaver will just tell you that your password is wrong even though you're inputting a blank password.23:05
arraybolt3And since you can't unlock the screen without a password that XScreenSaver will accept, it makes it so that you are essentially locked out.23:05
arraybolt3(Until you either log into a TTY to circumvent things, or you just force-poweroff the system, which is what a less experienced user is more likely to do)23:06
JanCoh, that would be a problem indeed23:06
JanCmight be good to fix XScreenSaver too  :)23:07
arraybolt3JanC: Yeah but it uses PAM to do the password checking AFAICT.23:07
arraybolt3(And the XScreenSaver code is... dense and confusing.)23:07
JanCso you think the problem is in PAM?23:08
JanCOTOH, maybe it shouldn't set an empty password like that23:08
JanC(calamares)23:08
JanCthere might be some POSIX or other standard about this too...23:09
arraybolt3I think it's probably Calamares' fault for doing a blank password like that.23:09
arraybolt3Either that or else it's a bug in PAM.23:09
arraybolt3Or maybe it's in XScreenSaver, in which case someone's going to have to sign up for a migrain in order to fix it...23:10
JanCwell, depends on whether that is allowed (and thus applications & libraries should expect it) or not allowed (then undefined behaviour is somewhat expected)23:10
JanCwhat calamares does23:11
arraybolt3I personally didn't even know you *could* hash empty data until just recently :P23:11
JanCmost likely there is some standard that says that the password has to be filled with NULLs until the total allowed length or so?23:13
arraybolt3Hmm... a quick look at Unix & Linux SE suggests that Calamares' behavior is valid.23:14
JanCfor unused bytes, I mean23:14
arraybolt3There's a difference between an empty password and no password.23:14
arraybolt3https://unix.stackexchange.com/questions/705037/whats-the-difference-between-empty-password-and-no-password23:14
arraybolt3(btw this might be a conversation that would be better had in #ubuntu-devel?)23:14
JanCwell, I really only wanted to know what the XScreenSaver issue was  :)23:15
UnivrslSuprBoxAlex mentioned an SBOM spec in the latest podcast -- is there any public discussion or documentation of this project?23:39

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!