Hi Yury, thank you for your interest in securing gksu/sudo and related applications. I noticed your comments just now when I was browsing my old bugs. Please keep 474024-submit...@bugs.debian.org in Cc if you want the emails to reach the original submitter of the bug...
So, since I filed that bug I have been prototyping a solution and even tried to get feedback at the "Wacky ideas" BoF at debconf9 ;-). The key idea is that password can not be read via X but instead directly via /dev/input/by-path/platform-i8042-serio-0-event-kbd. This is relatively easy. The problem is that it is not enough to read the password securely. We also need to make sure that the command that the user intended to run is really the command that will be run. In short: we need an unspoofable way to show the command to the user. This seems to be very hard. I have currently explored: switching to another virtual console (crashy) and XGrabServer (doesn't work if some other program has already grabbed it). My discussion with xorg people is mainly in the thread http://lists.freedesktop.org/archives/xorg/2010-September/051186.html More notes are at http://iki.fi/lindi/darcs/sido/README -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org