On Monday, January 23, 2017 at 10:00:09 PM UTC+3, raah...@gmail.com wrote:
> On Monday, January 23, 2017 at 3:28:47 AM UTC-5, daltong defourne wrote:
> > Hi!
> > I've managed to plug a USB printer/scanner into Windows HVM via usbip (as 
> > workaround to current USB/PCI passthrough woes)
> > 
> > Sharing with community:
> > https://github.com/QubesOS/qubes-issues/issues/2597#issuecomment-274347172
> > 
> > NB! This thing requires that you have networking between windows HVM and 
> > your usbvm (or whatever the USB controller has been passed through to)
> 
> can other appvms bet attacked by the usbvm after this setup?

in my humble opinion, usbip from usbvm is bearable, but definitely not very 
good security-wise.
(it's a complex piece of software with obscure, occult behavior, and  a daemon 
running as root on usbvm)

using it to take over the usbvm from a compromised windows box is definitely 
within possibility.

If your usbvm doesn't manage dom0's input devices and if it has no networking 
beyond windows-vm <-> usbvm path, attacker will be likely limited to dropping 
malware on flash drives you connect to usbvm and such
 

So IMHO (don't quote me on this) it's not very bad and most of increased 
susceptibility happens on windows7<->usbvm path

It's a trade-of (most things in life are :()
 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a5df96cc-dde0-42a4-bba7-092f80b0ffd6%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to