Phil Perry wrote:
What is the threat you're trying to mitigate, specifically? I don't see
how pairing a tablet would allow file transfers. An unauthorized device
can't unilaterally pair with your system.
If you enable Bluetooth on a workstation (by starting the 'bluetooth'
service), then a normal user on the workstation can (for example)
transfer files to/from a mobile phone - which is something we don't allow
Users don't have to have any special perms to do this - users can pair
with any Bluetooth devices they want
i.e. it isn't possible to control what a user can and can't do with
Bluetooth - so it isn't possible to allow pairing with just particular
(or classes of) Bluetooth devices
Is it possible to control behaviour with udev rules?
No idea - I haven't found anything that allows you to 'control'
Bluetooth - including any mention of udev rules
I have no idea if udev could be used in this way - nor where to start in
creating possible udev rules :-)
I asked my original question on the linux-bluetooth email list - and the
only suggestion was hacking the Bluetooth kernel modules to 'filter
connection requests at the PSM level' ...
Thanks
James Pearson
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
https://lists.centos.org/mailman/listinfo/centos