> Giving out sys_devices isn't IMO the correct answer either - 
> particularly given that sys_devices is such a big powerful privilege.
> 
> Instead I'd rather see a privilege specifically for these USCSI ioctls.
> However that still leaves the issue of why aren't the DAC permissions 
> enough ?  Why do we need more protection than that here ?  Maybe the new 
> uscsi privilege should be in the basic set ?

Quoting Tamarack (2005/399) inception materials:

> We propose:
> 
> - eliminate smserverd, make libsmedia open device directly;
> - create two new privileges:
>   - uscsi_full for full uscsi access;
>   - uscsi_user for limited uscsi access (no resets or aborts);
> - add uscsi_user to the "Basic User Profile";

However, we ended up removing this part of the proposal - I can't recall 
why exactly. Perhaps we moved it outside of the project scope while 
trying to finish the project before mgmt reprioritized again :)

One thing to keep in mind is that uscsi can be used to do some nasty 
stuff. Like make a device behave in unpredictable ways, triggering 
dormant driver bugs; or reprogram its firmware to become a completely 
different class (make a USB disk behave like a USB microphone); or, on 
parallel SCSI, create bus conditions that would affect devices you may 
not have DAC permissions for; etc.

-Artem


Reply via email to