Wipe SSD after unsuccessful login?

Discussion in 'macOS' started by Davoosie2, Dec 31, 2016.

  1. Davoosie2 macrumors newbie

    Joined:
    Dec 31, 2016
    Location:
    Zagreb, Croatia
    #1
    Is there a way either with a third party utility or a terminal command to wipe the SSD of my MacBook Pro after two unsuccessful login attempts? Something that will wipe the system drive after a wrong user ID or password is entered incorrectly after two tires?

    I have something like this setup on my computer at work, which is a Linux box I figured I could make it work with my MBP, but looks like that option is not available or at least locked out of OS X
     
  2. wol macrumors regular

    Joined:
    Jun 15, 2005
    #2
    Not sure if this can be done easily. iOS devices can be configured to behave this way using "Apple Configurator 2" by specifying "Passcode protection" / "Maximum number of failed attempts". Note that this actually does not "wipe" all of the data, but instead simply wipes the decryption + recovery keys.

    macOS has the terminal command "pwpolicy". It enables "setaccountpolicies" (see man page). However, the default event triggered by "MaximumFailedAuthentications" is a "lockout period" (rather than erasing decryption + recovery keys). I'd guess that there might be some (undocumented) setting to make accountpolicies behave similar to iOS.

    Maybe someone else on the forum is more knowledgeable about this subject?
     
  3. Davoosie2 thread starter macrumors newbie

    Joined:
    Dec 31, 2016
    Location:
    Zagreb, Croatia
    #3
    Thanks Wol. I messed around with it for a few days and I don't think it's an option. Even with a 3rd party utility. I guess I'll stick with the strong password for now.
     
  4. Tech198, Jan 8, 2017
    Last edited: Jan 8, 2017

    Tech198 macrumors G4

    Joined:
    Mar 21, 2011
    Location:
    Australia, Perth
    #4
    similar to the "Erase Data.." in iOS Touch ID settings ? I reckon on a desktop, that would be far more of a problem as u'd be having all your documents store on a Mac, not on an iOS device. So, naturally u'd also freak out more as well now u've just lost those important photos.. (particularly after only 3 attempts), u can get a password wrong more than twice..that just leaves 1 left till u can say goodbye to your Mac.

    Not everyone Backups all the time, and not everyone uses iCloud (other services).

    The same lockout period applies to Windows as well
     
  5. KALLT macrumors 601

    Joined:
    Sep 23, 2008
    #5
    macOS does have this functionality if you use Find My Mac. I am of the opinion that you should not rely on it though.

    Macs work a wee different from iPhones when it comes to encryption. iPhones have specific hardware features that support a function like this. They have a secure boot chain, they have effaceable storage to quickly zap a portion of the flash storage and they have dedicated chips that store and manage the encryption keys (Secure Element). Macs have none of this, at least not until Apple released the MacBook Pro laptops with the Touch Bar.

    Macs use whole-volume encryption and it is not dependent upon the hardware in any way. An attacker would simply need to take out the drive and attempt to mount it on another computer to completely bypass this protection. On an iPhone this is not as easy.
     
  6. BrianBaughn macrumors 601

    BrianBaughn

    Joined:
    Feb 13, 2011
    Location:
    Baltimore, Maryland
    #6
    "attempt to completely bypass this protection" kinda makes it sound like it's easy to do!

    Interesting article on "cracking" FileVault: https://blog.elcomsoft.com/2016/07/mac-os-forensics-attacking-filevault-2/
     
  7. KALLT macrumors 601

    Joined:
    Sep 23, 2008
    #7
    Technically it is, if you are assuming that your password is not strong enough, which the OP called attention to. If the password is not strong, i.e. either guessable through available information or brute-forceable, then an attacker will not be impeded by any software-based mechanisms that delete the volume after a few tries, because it is probably irrelevant.

    There are other ways to get in. You’ve already pointed out a vulnerability in the iCloud key recovery, but there are others. Sierra 10.12.2 recently closed a vulnerability that allowed an attacker to extract the key directly from memory using a $300 tool, all done in a few seconds (source). This happened, to my knowledge, at least once before. Macs also do not have a Trusted Platform Module that guarantees the integrity of the boot and recovery partition, which means that an attacker could modify them and retrieve your password using a keylogger if they have access to your device.
     

Share This Page