[Bug 1554021] Review Request: usbauth - USB firewall against BadUSB attacks

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



https://bugzilla.redhat.com/show_bug.cgi?id=1554021



--- Comment #7 from Stefan Koch <stefan.koch10@xxxxxxxxx> ---
The main difference is that usbguard uses the USB device authorization
mechanism. usbauth uses the USB interface authorization mechanism, that was
introduced since kernel 4.4.
Historical, usbguard was published while the working on usbauth has already
been started.

usbauth could allow/deny usb interfaces using the new usb interface
authorization mechanism that is part of linux 4.4 and above.
See also:
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/log/?h=v4.4.94&qt=grep&q=interface+auth

Examples:
* allow a storage functionality of a USB device and deny USB Ethernet of the
same device
* allow audio/video functionality of an USB TV card and deny using the remote
control functionality
* allow USB printing/scanning and deny USB storage usage of a multifunction
printer (BTW: the interface mechanism supports denying user space triggered
actions (using USB claiming) like scanning)

usbguard could allow/deny USB devices using the usb device authorization
mechanism of the Linux kernel.
It allows to denying a whole device if one interface of it is considered as bad
(usbauth supports this, too)
usbguard allows creating actions that is not supported by usbauth.

I hope this helps. If you can understand German language you could read a
detailed description:
https://epub.uni-bayreuth.de/3048/1/koch2017sicherheitsaspekte.pdf

Currently the usbauth suite is packaged for openSUSE Leap 15.0, Debian Buster
including ubuntu 18.04

-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are always notified about changes to this product and component
_______________________________________________
package-review mailing list -- package-review@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to package-review-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-review@xxxxxxxxxxxxxxxxxxxxxxx




[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite Conditions]     [KDE Users]

  Powered by Linux