Unrestricted Admin Mode

From Kicksecure
Jump to navigation Jump to search

Kicksecure can be configured for unrestricted admin mode.

In this mode, traditional access to privilege escalation tools such as sudo and pkexec is possible for the Kicksecure default limited account user.

Most other operating systems do not even call this "unrestricted admin mode" because they do not come with user-sysmaint-split by default. In such systems, unrestricted admin mode is implied. However, Kicksecure provides the flexibility to switch between user-sysmaint-split and unrestricted admin mode depending on your needs.

Starting from Kicksecure version TODO Xfce and above, Kicksecure comes with user-sysmaint-split by default.

Uninstalling user-sysmaint-split and Enabling Unrestricted Admin Mode[edit]

This chapter documents how to disable user-sysmaint-split and revert to unrestricted admin mode, where the user user can use sudo.

Optional. Discouraged.

Warnings:

  • Reverting to unrestricted admin mode increases the risk of privilege escalation attacks and may weaken system security.
  • It is discouraged to use apt for this purpose, to avoid meta-package removal issues (Debian Packages). Instead, it is recommended to proceed as per instructions below.

Platform specific. Select your platform.

Kicksecure

If the user-sysmaint-split package is installed by default, the easiest way to remove it is by using the REMOVE user-sysmaint-split boot option on the GRUB screen.

1. Reboot the machine.

2. Select Kicksecure REMOVE user-sysmaint-split GNU/Linux from the list of boot options.

3. Authenticate as necessary to log in as the sysmaint account. You may have to provide a disk encryption passphrase and/or the user password for the sysmaint account, if either or both passwords are set.

4. Type the word yes into the dialog box confirming that you really do want to uninstall user-sysmaint-split.

5. Click "OK". A terminal window will appear, showing the logs generated while uninstalling user-sysmaint-split.

6. When the text Command exited. You may close this window safely appears, close the terminal window. The system will automatically reboot.

7. Done.

The process of removing user-sysmaint-split is now complete.

Alternatively, you can use dummy-dependency to remove the user-sysmaint-split package while booted in PERSISTENT mode SYSMAINT. [1]

sudo dummy-dependency user-sysmaint-split

Kicksecure for Qubes

1. Qubes version specific.

  • Qubes R4.2: Open a Qubes Root Console.
  • Qubes R4.3 and above: Ensure that the kicksecure-17 Template is booted in PERSISTENT mode SYSMAINT.

2. Run:

sudo dummy-dependency user-sysmaint-split

3. Install qubes-core-agent-passwordless-root to allow the user account to elevate to root.

sudo apt install qubes-core-agent-passwordless-root

4. Shut down the qube template.

5. Reboot any AppVMs that are based on the qube template.

6. Done.

The process of removing user-sysmaint-split is now complete.

Impact[edit]

This removes the sysmaint mode-related GRUB boot menu modifications and reverts back to a "normal" boot menu.

Security impact? This is hard to quantify. It is important to contextualize user-sysmaint-split for what it is: an additional security feature, not magic.

The security concept of user versus administrative account isolation, implemented by the user-sysmaint-split package, is a many-years-old and standard security feature on mainstream mobile operating systems such as Android and iOS. These mobile operating systems degrade device owners to limited rights and provide administrative rights to the device manufacturer (OEM) only. The purpose of this, among other security aspects, is to enforce mobile device restrictions, prioritizing the wishes of OEMs and application developers over user preferences. See also the General Threats to User Freedom wiki chapter Administrative Rights.

user-sysmaint-split improved security in many contexts. For example, if a user is using a dedicated virtual machine (VM) in a session only for the purpose of web browsing, then there is no need for that VM to ever gain root rights. However, in other contexts such as on a server or development environment, user-sysmaint-split might provide less or no security or degrade usability to unproductive levels.

There have been times where user-sysmaint-split was unavailable and nothing catastrophic took place. At worst, this reduces the security level to Kicksecure versions equal to or lower than version 17.2.8.5.

See also Rationale for Protecting the Root Account.

Optional Restrictions[edit]

After removal the user can configure sudo and/or other privilege escalation tools etc as per usual.

Footnotes[edit]

  1. The --purge option is optional and not required in this case when using dummy-dependency, because user-sysmaint-split has been designed without configuration files in the /etc folder. Instead, user-sysmaint-split uses symlinks, which are deleted upon removal. This design ensures that a standard apt remove user-sysmaint-split will not result in unexpected functionality, such as parts of user-sysmaint-split (e.g., boot menu entries) still being active.

We believe security software like Kicksecure needs to remain Open Source and independent. Would you help sustain and grow the project? Learn more about our 12 year success story and maybe DONATE!