
Login Security


This page provides detailed information about the Kicksecure login screen, how to configure it, and how to log in securely.
Login Security Concepts[edit]
By default, Kicksecure provides a user account, user
, with graphical user interface (GUI) autologin enabled if applicable, and no password set. When using a system with a GUI, Kicksecure will boot directly into a graphical desktop when powered on. For many users and situations, this configuration is not a security hazard because:
- Single-user machines: Desktop and laptop systems are generally single-user machines and do not need to authenticate multiple human users. Users of a single-user machine are expected to keep their machine physically secure from in-person attackers.
- Multi-user configuration: For machines that aren't single-user, the system administrator will generally be the first person to use the machine after installation and will have the opportunity to configure the system's user accounts to meet the needs of all users.
- Weak login screen protection: The login screen is usually only a weak security barrier. If Full Disk Encryption (FDE) is not used, a malicious individual can gain access to the machine's data by simply booting a live ISO or stealing the system's storage drive. Even if FDE is used, a sophisticated attacker with sufficient time can likely bypass the login screen if they gain physical access to the device while it is powered on.
- FDE makes login screen redundant: If using the Kicksecure ISO to install Kicksecure onto a machine, FDE is enabled by default. This requires the user to authenticate before the system will boot, thus making the login screen redundant in most single-user scenarios. Auententcation is done during initramfs (initramfs-tools or dracut) Based Encryption Password Prompt.
- Virtual machines and host security: If using Kicksecure in a Virtual Machine, the VM's login security is not as important as the host system's login security. There are numerous ways to modify a virtual machine's state from the host system, allowing an attacker with access to an unlocked host machine to bypass a virtual machine's login screen. Virtual machine users are expected to keep their host system physically secure from in-person attackers.
However, there are situations in which it is valuable to require password authentication for administrative actions or for login purposes. Users should be aware of their threat model and adjust login settings accordingly. Users interested in this topic should read the Default Passwords and Protection against Physical Attacks wiki pages.
Configuring GUI Autologin[edit]
Platform specific.
- Non-Qubes-Kicksecure: Applicable. See below.
- Kicksecure-Qubes users can skip this section, except for HVM Qube. [1]
Host operating system (OS) versus virtual machine (VM).
- Host operating system:
- Simple login screen: Disabling autologin can be useful if the user wants to enable a login screen.
- No full disk encryption: Note, the login screen is not providing Full Disk Encryption (FDE). The purpose of the login screen is elaborated in chapter Login Screen.
- VMs: It is not very useful to disable autologin to enable a login screen inside VMs. It's much more secure to have a login screen on the host operating system.
Automatic Autologin Configuration[edit]
To view which user accounts on the system have autologin enabled, run systemcheck. This will show you a login security table, indicating which users on the system are not password protected and/or have autologin enabled.
Only one normal user account can have autologin enabled at once. The reason for this is fairly obvious - if two users had autologin enabled at the same time, which user would be automatically logged into? For this reason, if you enable autologin for one user account when autologin is already enabled for a different user account, autologin will be disabled for that different user account. The only exception to this rule is if user-sysmaint-split is installed. In this case, the sysmaint
user account can have autologin enabled or disabled independently of the other user accounts. This is because the sysmaint
account is only accessible when the system is booted in PERSISTENT mode SYSMAINT.
To enable or disable autologin on a user account, you can use the autologinchange utility.
1. Launch autologinchange
. You can do this by clicking the "Manage GUI Autologin" button in the System Maintenance Panel. You can also run the tool by running the following command in a terminal:
sudo autologinchange
2. autologinchange will display a list of user accounts on the system. Identify the user you want to enable or disable autologin for.
3. Type the user account's name and press Enter.
4. You will be told whether autologin is currently enabled or disabled for the current user account. To toggle autologin on the selected account, press y
, then press Enter.
5. Done. Autologin has now been toggled on the specified user account.
Manual Autologin Configuration[edit]
To change the auto login behavior, we have to edit the config file of lightdm which is the default display manager used by Kicksecure.
If you use another display manager, please look up in the manual of your display manager on how to change auto login behavior, for lightdm in Kicksecure it is:
Apply the following instructions to enable the login prompt at boot.
This requires configuration of LightDM in Kicksecure.
1. Disable LightDM autologin.
This is done by deleting the configuration files which enable autologin.
sudo rm /etc/lightdm/lightdm.conf.d/30_autologin.conf
sudo rm /etc/lightdm/lightdm.conf.d/40_autologin.conf
2. Linux user account password.
The user will need to Configuring Passwords if one has not already been set.
3. Reboot.
4. Done.
Autologin should be disabled after reboot and the user should see a login prompt after reboot.
Troubleshooting: See footnote for troubleshooting. [2]
Configuring Passwords[edit]
The user can set or change the password for a user account in Kicksecure, if this is useful for the user's threat model based on this default passwords information.
If you are using Kicksecure 17.3.0.5 or later, you can change user passwords using the "Manage Passwords" button in the System Maintenance Panel. You can also change user passwords from a terminal, by using the following instructions.
1. Change Keyboard Layout if necessary.
2. Review Test Keyboard Layout before proceeding further.
3. Open a terminal (such as Xfce Terminal Emulator).
Start menu
→ Applications
→ System
→ Terminal
4. Run a test command as root
by using sudo
.
Run. [5]
sudo systemd-detect-virt
5. Read the note below regarding the username and password.
6. Read the note below regarding the password change procedure.
When typing the password it will not appear on the screen, nor will the asterisk sign (*
) be visible. It is necessary to type blindly and trust the procedure.
7. Change the account user
(and sudo
) password.
- To change the
user
(Kicksecure default user account) password, run the following command. [5] - This will also be the password when running
sudo
from Linux user accountuser
. [7] - Using
pwchange
. [8]
sudo pwchange
pwchange will prompt.
What user's password do you want to change?
Type user
and then press <Enter>
.
8. Root password.
No changes required. Optional, for details, see root account in Kicksecure.
9. Done.
The procedure of changing passwords is complete.
If issues appear when gaining root, consider using dsudo.
Another option is to boot into recovery mode and change passwords there.
Graphical Login Screen[edit]
For graphical user interface (GUI).
Platform specific.
- Kicksecure: Applicable. See below.
- Kicksecure for Qubes: Mostly, not applicable except if using a Qubes HVM. This is up to the host operating system, Qubes, not Kicksecure.
A login screen can be provided by a login manager. For example, LightDM is the login manager used by default in Kicksecure.
Figure: LightDM
login manager
Console Login Screen[edit]
For command line interface (CLI).
What is a virtual console? See Virtual Console.
Login Instructions for Virtual Console[edit]
Platform specific.
- Kicksecure: Applicable. See below.
- Kicksecure-Qubes: Mostly, not applicable except if using a Qubes HVM. This is up to the host operating system, Qubes, not Kicksecure.
Figure: virtual console login screen
1. Type the Username.
- The default username is:
user
- Press
<Enter>
after typing the username.
2. Type the Password.
- If a password has been set, type it and press
<Enter>
. - Note: No feedback (such as asterisks "
*
") will be shown when typing the password.
Notes[edit]
- The default root account is locked for security reasons. For more information, visit the root account documentation.
- If you are using a virtual machine, ignore any
host login:
prompts. Do not enter your host computer username or password.
Troubleshooting[edit]
- Forgot Username or Password: If you have forgotten your username or password, please refer to the Recovery page for steps on recovering your account.
See Also[edit]
- Login Screen
- Learn more about default passwords, when it is useful to set a password, see Default Passwords.
/etc/issue
file- Learn more about securing your Kicksecure installation by visiting our System Hardening Checklist
- ↑ Except for desktop HVM Qube, virtual machines in Qubes OS do not use a traditional GUI login mechanism, and thus do not have a concept of GUI autologin.
- ↑
GDM configuration.
GDM is a login manager different from LightDM. Only very old versions of Kicksecure come with GDM installed by default.
1. Open the GDM configuration file.
Note, if the file is empty that means it doesn't exist. In that case, skip this.
Open file
/etc/gdm3/daemon.conf.dist
in an editor with root rights.Kicksecure
See Open File with Root Rights
for detailed instructions on why to use
sudoedit
for better security and how to use it.Note: Mousepad (or the chosen text editor) must be closed before running the
sudoedit
command.sudoedit /etc/gdm3/daemon.conf.dist
Kicksecure for Qubes
NOTES:
- When using Kicksecure-Qubes, this needs to be done inside the Template.
sudoedit /etc/gdm3/daemon.conf.dist
- After applying this change, shutdown the Template.
- All App Qubes based on the Template need to be restarted if they were already running.
- This is a general procedure required for Qubes and unspecific to Kicksecure for Qubes.
Others and Alternatives
- This is just an example. Other tools could achieve the same goal.
- If this example does not work for you or if you are not using Kicksecure, please refer to this link.
sudoedit /etc/gdm3/daemon.conf.dist
2. Search for the following.
AutomaticLoginEnable=true AutomaticLogin=user
3. Modify.
Out-comment, add a hash symbol ("
#
") in front of the two lines. Or replace the content, copy/paste the following which does the same.#AutomaticLoginEnable=true #AutomaticLogin=user
4. Save.
- ↑ By default, Qubes does not require a password for superuser access.
- ↑
https://www.qubes-os.org/doc/vm-sudo/
- ↑ Jump up to: 5.0 5.1
Type the command in the terminal and press
<Enter>
. - ↑
Rationale for Change from Default Password changeme to Empty Default Password
- ↑
- This is the usual Debian /
sudo
default and Unspecific to Kicksecure.
- This is the usual Debian /
- ↑
/usr/sbin/pwchange
source code.
- Alternatively, Debian standard command: sudo passwd user

We believe security software like Kicksecure needs to remain Open Source and independent. Would you help sustain and grow the project? Learn more about our 12 year success story and maybe DONATE!