Quoting David Brownell <[EMAIL PROTECTED]>:

> > > Well for starters, the notion that those two characteristics are enough
> > > to address the problem.  Consider that I might have two USB disk drives
> > > (or cameras) of the same make/model, and they might get connected in any
> > > order.  
> > 
> > If the two devices have same VendorId:ProductID it should not matter.
> > They will get their sequence numbers in the order they were plugged-in.
> 
> But as I said, that's not enough.  It makes a huge difference which
> device is which.

An external USB HDD (as an example) is like a floppy. If you permit the
user to access the floppy drive then you have no control over what
floppies he inserts. Since the contents of the floppy is not under your
control (as well as serial numbers of the USB HDDs - they can be
forged) then essentially there is no security, and no access rights can be
based on the insecure authentication.

So the problem here is that access right can not be controlled by anything
that user plugs in, short of PKI in both device and the host. [This might
be even a usable proposal!]

The software that sets access rights based on some user-provided hints may
be considered a convenience tool only, not a security enforcement tool. If
so, it does not make much of a difference if any local user can access any
locally connected USB device. That user already has full control over the
hardware.

Dmitri

-- 
"...very few phenomena can pull someone out of Deep Hack Mode, with two
noted exceptions: being struck by lightning, or worse, your *computer*
being struck by lightning."
  (By Matt Welsh)

Attachment: msg03174/pgp00000.pgp
Description: PGP signature

Reply via email to