We worry about 0day exploits but a lot of times in any organisation there’s somebody who just doesn’t like to lock the screen, or use a screen saver, and even go as far as to simulate activity in order to bypass a group policy for locking the workstation.
BlueProximity is a useful program created by Lars Friedrichs that can set up the computer to execute different actions when a specific bluetooth device is in or out of range. We could use it for all sorts of things like stopping the playback in cmus, changing the status in Pidgin, turning the monitor ON or OFF, unmounting encrypted partitions, etc. In particular, we’re interested now in locking the workstation. Although it is possible to also unlock it without a password, I wouldn’t recommend going that route. So this covers the setup for Ubuntu 16.04, and a few tips and tricks to get the setup working quickly and smoothly.
This post is part of the Security Bricks tutorials - simple methods and habits to build a deliberately secure operational environment, for personal and business use. The other parts below:
- Part 1 - Physical OPSEC basics
- Part 2 - Preventing evil maid attacks
- Part 3 - KeePass password manager with 2FA
- Part 4 - Using tokens in Ubuntu with PGP
- Part 5 - Token-based authentication for SSH
1. Setup
If your computer doesn’t have Bluetooth support already don’t worry, you can get an external Bluetooth adapter. Connect it and check if it’s recognised correctly:
~ dmesg | tail
[92804.787813] usb 3-6: new full-speed USB device number 12 using xhci_hcd
[92804.924114] usb 3-6: New USB device found, idVendor=1131, idProduct=1004
[92804.924121] usb 3-6: New USB device strings: Mfr=1, Product=2, SerialNumber=0
[92804.924126] usb 3-6: Product: ISSCEDRBTA
[92804.924129] usb 3-6: Manufacturer: ISSC
Next, you should see a new local Bluetooth device:
~ hcitool dev
Devices:
hci0 00:11:67:C4:9D:21
For more details and statistics, you can also use hciconfig
:
~ hciconfig
hci0: Type: BR/EDR Bus: USB
BD Address: 00:11:67:C4:9D:21 ACL MTU: 1021:4 SCO MTU: 48:10
UP RUNNING
RX bytes:1132593 acl:20240 sco:0 events:51387 errors:0
TX bytes:483873 acl:20256 sco:0 commands:16273 errors:0
If you have any issues, also make sure that the bluetooth service is up and running:
~ service bluetooth status
● bluetooth.service - Bluetooth service
Loaded: loaded (/lib/systemd/system/bluetooth.service; enabled; vendor preset: enabled)
Active: active (running) since Mon 2017-07-31 17:39:55 BST; 18h ago
Docs: man:bluetoothd(8)
Main PID: 29577
Status: "Running"
Tasks: 1
Memory: 1.4M
CPU: 10ms
CGroup: /system.slice/bluetooth.service
└─29577 n/a
2. Establish connectivity
For the purpose of this post I’ll use the mobile phone as the device that will lock the workstation when out of range. You could use any device for this purpose. Let’s begin by scanning for neighbouring Bluetooth devices. So I’ve activated Bluetooth and performed a scan:
~ hcitool scan
Scanning ...
28:ED:6A:82:33:BF iPhone
78:AB:BB:9B:3C:56 TVBluetooth
Surprise surprise! By default, my Android S5 is not discoverable, even if the blue tooth is activated. After a bit of checking through the options, I’ve noticed the following message:
“[..] is visible to nearby devices while Bluetooh settings is open”
Now let’s do the scan again, this time having the settings window open on the mobile phone:
~ hcitool scan
Scanning ...
E0:CB:EE:13:4D:21 SS5 <--- my phone
Perfect! Now we have the device’s MAC address, which we’ll use in blueproximity.
3. Set up blueproximity
- Device detection - We’d have the same issue as above when scanning for new devices in Blueproximity (1).
So we’ll introduce the MAC address manually in the form (2): - Channel scan - Use the Scan channels button (3) to go through the ports and find an usable one. At this point we’ll have to accept the pairing on the device. After the scan ends, select an usable channel from the list (4).
- Configure the locking command - In the Locking tab, add any script to be run in the Locking command field. I’m using
~/scripts/screenlock.sh
, with the following content (I’m using i3 window manager):#!/usr/bin/env bash i3lock --image ~/Documents/wallpapers/dark-earth.png --tiling
Adjust any locking parameters (e.g. distance, duration) in the Proximity details tab.
- Verify - You can check the icon and tooltip of Blueproximity to see its status. And also enable logging to a file, if needed.
~ tail -f ~/blueproximity.log Tue Aug 1 14:28:22 2017 blueproximity: screen is locked Tue Aug 1 14:34:56 2017 blueproximity: screen is unlocked Tue Aug 1 14:35:59 2017 blueproximity: screen is locked Tue Aug 1 14:36:15 2017 blueproximity: screen is unlocked
4. Tips and tricks
Simulation mode
Notice that when the settings window is raised, the application is in simulation mode and it will not actually trigger the locking/unlocking events. So to function properly, the settings window needs to be closed.
Unintended locking
If the associated Bluetooth device moves out of range, or the signal is lost, the application will lock the workstation even if there is activity. This might be a bit anoying but not very likely to happen often.
5. Security considerations
Spoofing the phone bluetooth
There is a good reason why we use this trick to lock the workstation but not to unlock it. Because somebody could just spoof the phone, Mr. Robot style, and unlock the machine without the password.
Having Bluetooth enabled all the time
There are a number of Bluetooth attacks that you expose yourself to when you enable it on the phone, even if the device is not broadcasting and is “undiscoverable”. These range from information disclosures and tracking the device’s movements to eavesdropping, denial of service and even controlling the device (e.g. placing phone calls, sending text messages).