New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Make USB passthrough devices user-writable by default #2465

Open
andrewdavidwong opened this Issue Nov 28, 2016 · 0 comments

Comments

Projects
None yet
1 participant
@andrewdavidwong
Member

andrewdavidwong commented Nov 28, 2016

On 2016-11-28 03:29, Jean-Philippe Ouellet wrote:

If you use qvm-usb to assign a particular USB device to a particular
VM, it's probably because you wanted to actually use that device! (or
more likely some program which interfaces with that device)

Currently, such programs will likely fail due to the user account
not having write access to the device node.

Under Qubes' threat model, we assume there is no meaningful privilege
boundary between user and root1, so would it make sense to just make
all passed-through USB devs world-writable (or at least user-writable)
to enable software using them to "Just Work" by default?

Right now things only work if some application provides udev rules
changing ownership/permissions, or if a user observes things failing
and happens to know to go chmod stuff in /dev.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment