On Wednesday 25 April 2007, Robert Marquardt wrote:
> David Brownell schrieb:
>
> > If this is a "security" issue, what's the threat being defended against?
> > Just for USB sticks?
>
> USB sticks are only an example here. All hotplug devices should be handled.
Why ... what's the threat? Does i
Hi All
On Tuesday 24 April 2007, David Brownell wrote:
> On Tuesday 24 April 2007, Inaky Perez-Gonzalez wrote:
> > I've been toying with some patches to implement this concept also in a
> > generic way so that it could be used to implement a control mechanism
> > for locking down systems (like for
David Brownell schrieb:
> If this is a "security" issue, what's the threat being defended against?
> Just for USB sticks?
USB sticks are only an example here. All hotplug devices should be handled.
I do not see it primarily from the threat side. The other side is to
have access control. "I can p
On Tuesday 24 April 2007, Robert Marquardt wrote:
> Inaky Perez-Gonzalez schrieb:
> > ...
> > I've been toying with some patches to implement this concept also in a
> > generic way so that it could be used to implement a control mechanism
> > for locking down systems (like for example, don't conne
Inaky Perez-Gonzalez schrieb:
> Hi All
>
> As part of the work for Wireless USB, I need to introduce in the USB stack
> the concept of unauthorized vs authorized device. The first one is one that
> cannot be really used until we move it to authorized, but at least we have
> some knowledge of it.
>
On Tuesday 24 April 2007, Eric Blossom wrote:
> On Tue, Apr 24, 2007 at 05:46:16PM -0700, Inaky Perez-Gonzalez wrote:
> >
> > Hi All
> >
> > As part of the work for Wireless USB, I need to introduce in the USB stack
> > the concept of unauthorized vs authorized device. The first one is one that
>
On Tuesday 24 April 2007, Inaky Perez-Gonzalez wrote:
>
> I've been toying with some patches to implement this concept also in a
> generic way so that it could be used to implement a control mechanism
> for locking down systems (like for example, don't connect this kind of
> hw, because policy w
On Tue, Apr 24, 2007 at 05:46:16PM -0700, Inaky Perez-Gonzalez wrote:
>
> Hi All
>
> As part of the work for Wireless USB, I need to introduce in the USB stack
> the concept of unauthorized vs authorized device. The first one is one that
> cannot be really used until we move it to authorized, but
Hi All
As part of the work for Wireless USB, I need to introduce in the USB stack
the concept of unauthorized vs authorized device. The first one is one that
cannot be really used until we move it to authorized, but at least we have
some knowledge of it.
I've been toying with some patches to imp