It would be nice to enable USB Ethernet that doesn’t use RNDIS… but looking at Defined Class Codes | USB-IF I don’t immediately see anything about USB and Ethernet that isn’t RNDIS, so I’m not sure an interface rule (like the rules we’ve been using) will work. More investigation is needed there, if it turns out to be possible I’ll try to enable it.
I’m fully aware of the threat posed by the Equation APT actor.
Apologies for the scattered remarks about mixing up internal versus external webcams while referencing Keytap 2.
The more I read this thread, the greater the impact on my tranquil mindset of each presumed certainty only reveals further unknowns of what I thought I knew.
At least right now USBGuard does not display desktop notifications. There’s a utility for that in the Debian repos (usbguard-notifier) but it’s not been integrated yet. Might be worth doing?
The other day I did a dist-upgrade on a distro morph and /etc/usbguard/rules.d/30_security-misc.conf does not exist? Neither were usbguard or usbguard-notifier packages added after the upgrade.
user@host:~$ ls /etc/usbguard/rules.d/
user@host:~$
I had to install those two and add 30_security-misc.conf manually with 0600 permissions and it worked.
Kicksecure 18 has not yet been released. The current released version of Kicksecure is Kicksecure 17. We’re discussing what to do for the next major release.
Thanks, I’ll continue to test some things manually. Sorry I missed that part about the version.
Is there anything in the daemon config that adjusts how early in the boot process USBGuard is loaded?
Reason I’m curious being that I noticed that I was able to plug in a non storage device after login screen before the desktop screen was loaded?
I’ll test it again it could just be something else with my system specific to my morph.
That is what it should do unless you have the USB adapter plugged in before starting up your computer it should be allowed.
Are you testing the config file manually aswell?
For the record my Samsung SSD drive that I have been testing around a distro morph on shows that it indeed shows it as class 8 aka mass storage so there should be no issue with the current rule since its booting the system of an external SSD drive.
user@host:~$ lsusb -v | awk '/04e8:0002/ {found=1} found && /bInterfaceClass/ {print; exit}'
bInterfaceClass 8 Mass Storage
user@host:~$
That means there shouldn’t be any issues with USBGuard an users that choose to install and boot from an external media as such (external SSD/HDD drives etc).
1. Being the current rule allows for USB’s to be allowed that are plugged in before the daemon is loaded (before the computer boots up).
2. External SSD/HDD drives should come up as class 8 Mass Storage which us allow by the policy rule set.
To get the output of Base ClassbInterfaceClass, SubClassbInterfaceSubClass, and ProtocolbInterfaceProtocol you can try pasting this command if it matters:
lsusb -v | awk '/0002:0002/ {found=1} found && /bInterface/ && !/bInterfaceNumber/ {print; if (/bInterfaceProtocol/) exit}'