New 'USG' Firewalls Protect USB Drives From Malicious Attacks (zdnet.com) 67
A developer has created the USG, "a small, portable hardware USB firewall...to prevent malicious USB sticks and devices laden with malware from infecting your computer." An anonymous reader quotes ZDNet:
The problem is that most computers automatically trust every USB device that's plugged in, which means malicious code can run without warning... Cars, cash registers, and some ATMs also come with USB ports, all of which can be vulnerable to cyberattacks from a single USB stick. That's where the USG firewall comes in...a simple hardware serial link that only accepts a very few select number of safe commands, which prevents the device from executing system commands or intercepting network traffic. That means the data can flow from the USB device, but [it] effectively blocks other USB exploits.
The firmware has been open sourced, and the technical specifications have also been released online "to allow anyone to build their own from readily available development boards."
The firmware has been open sourced, and the technical specifications have also been released online "to allow anyone to build their own from readily available development boards."
good thing is that you can stack them USG-USG-USB (Score:3)
So what is it for? (Score:2)
Sorry, but couldn't get past all that sheep speak (aka dumbed down language). What exactly is that bridge for? Preventing badusb? Actually checking for malware files stored on the usb stick's filesystem? Preventing computers to flash the usb stick's firmware to make attacks permanent?
Re: (Score:2)
Until they get slammed by ZyXEL for using USG as a name for a firewall. Anyone not doing even basic research here deserves to be slammed too.
Re: (Score:2)
https://github.com/robertfisk/USG/wiki [github.com]
Re: (Score:2)
It only has 4 pins. If we can find which one carries the Evil Bit can't we just snip it?
Re: (Score:2)
It is about preventing an USB stick from claiming to be something else, e.g. a keyboard or a network card. Not that that helps any if there is a malicious executable on the stick...
Re: (Score:3)
Even trudging through the code, it's hard to decipher what it actually does besides implement a basic USB host and USB target and then proxy the commands (with some minor filtering for things that aren't "spec"). I'm supposing that you plug it in, and you have to program it yourself to accept a certain device or range of devices which you 'trust' but even then, it's not going to prevent someone from making a USB thing that emulates your USB thing and does malicious things.
I'm sure you can eventually turn it
So... (Score:2)
--Will the USG device protect against a thumbdrive that would fry your *computer* (electrically) if you plugged it in?
Re: (Score:3)
USB1 only (Score:5, Informative)
Sadly it's only USB1, so basically useless for moving files, which I imagine is the designed purpose. A cool device certainly, but at USB1 speeds more of a cool research project than something actually useful
Re: (Score:2)
Bad Keyboard Still Possible (Score:5, Interesting)
As far as I could glean from the article, the USG does nothing to stop USB devices from registering as a keyboard and then emulating keypresses to open up a back door. Having a physical switch on the USG that indicates 'this device is a keyboard' could stop that... for malicious devices that aren't actually USB keyboards.
I'm also skeptical hat the 'short list of approved commands' is 100% safe and there are no driver vulnerabilities linked to any of those commands. Also, if you plug a new USB device in thru this USG and it doesn't work, are you going to say 'too bad, probably infected', or are you going to remove the USG and try again?
Re: Bad Keyboard Still Possible (Score:1)
Simply lock the computer when you leave it to prevent fake keyboard.
This is more for blocking something like the Bash Bunny. That thing will backdoor a locked computer by pretending it's a USB NIC.
Re: (Score:2)
I'm also skeptical hat the 'short list of approved commands' is 100% safe and there are no driver vulnerabilities linked to any of those commands.
Me too. USB doesn't use "commands". There are no USB commands. Perhaps they mean that they filter SCSI commands for USB flash drives or something.
In any case, many of the vulnerabilities are likely to be down to malformed descriptors. Descriptors tell the computer what the USB device is and in the case of standard things like keyboards and flash drives there are descriptors that give the parameters required to talk to it. Driver vulnerabilities will mostly be in the way these descriptors are parsed.
It also
Re: (Score:3)
It is as useless as a virus scanner is at preventing a user from writing their password on a post-it on the screen. That is to say, both you and the GP are talking about a different attack vector than the BadUSB vulnerability which relies on being able to enumerate two different devices at once at run time on the same bus and do something malicious while pretending to do something else. E.g. a USB mass storage device that logs keystrokes. This device here will prevent either the keylogging or the USB mass s
Re: (Score:2)
True, but the next step is to put a hub in the middle integrated into the USB stick. So you see a USB hub plugged into a port with a USB mass storage device and a USB keyboard attached. We are then right back to square one. I guess the firewall could be programmed to reject hubs to prevent this, but it's all getting rather messy. The better solution is to stop using USB anything to move data about; the network is the computer remember.
Re: (Score:2)
That's not too silly and I've done this myself. I built a device which presents to the OS as a USB hub as a quick and dirty way to work around two microcontrollers communicating on one USB bus without having to design and program a bus system between them.
This would easily defeat this device as far as I can see.
Re: (Score:3)
As far as I could glean from the article, the USG does nothing to stop USB devices from registering as a keyboard and then emulating keypresses to open up a back door.
No it doesn't. As far as I can understand what it does do is prevent a USB mass storage device, or a USB network card, or a USB monitor, etc, etc, pretending to be both what it is and also a keyboard at the same time. It also prevents it from changing at some point while being used to do something malicious and then changing back. What you are describing is a different attack vector to the BadUSB exploit this is designed to prevent.
People picking up dirty USB sticks in the carpark will only continue to use
Re: (Score:3)
Because there are some USB devices which have a legitimate purpose for doing all of these "bad" things, so they'd be rendered useless.
Re: (Score:3)
Re: (Score:1)
Re: (Score:2)
I have yet to see a device like this. I have seen plenty of devices which will enumerate as different devices on connect by user request (e.g. reboot in firmware download mode, hold down something while plugging it in etc), but I've yet to come across a device that actually will attempt to enumerate both states at once.
Re:why (Score:4, Informative)
I have Huawei USB cellular modem that identifies itself simultaneously as:
1. USB mass storage, if one has a microSD card in the internal slot. This is handy for storing files and whatnot on the stick.
2. As a CD-ROM drive with a virtual CD containing the drivers needed for the cellular modem functionality, so the user can install the drivers needed while only possessing the stick itself (e.g. no real CD, no internet download, etc.).
3. As a cellular modem.
Re: (Score:2)
"Accept the things I cannot change" and all that.
Re: (Score:1)
Ubikeys look like secuity dongles, but present themeselves as keyboards [yubico.com] so instead of retyping a long one-time-key, you just press a button and it "types" it for you. All without needing OS specific drivers. But they doen't look like a keyboard.
A waste of money (Score:2)
Re: (Score:2)
USB devices can be more than file systems.
Having autorun off is not going to stop a USB device pretending to be a keyboard or mouse or whatnot.
Re: (Score:2)
You can prevent Windows from installing new USB devices by type.
Mind you if you're keyboard then breaks you're screwed without some form of remote access or a PS/2 port.
Re: (Score:2)
It's not auto-running a file on a filesystem. It's automatically talking to the firmware on the USB controller, something that every OS needs to allow for a USB device to function.
Re: (Score:2)
Why can't you just use a different USB driver for your OS that filters, alerts on, requires additional permission for, or blocks whatever you want, rather than buying a new piece of hardware?
I mean, I get the voltage thing to fry a port, but that's a DOS attack no worse than someone who is physically there just smashing the port/computer. Why not just secure the USB device driver in the first place?
Re: (Score:2)
This device won't prevent the frying of the port.
And yes you can prevent BadUSB by diligently disabling auto-installation of new USB devices (no need for a driver, you can do that in Group Policy). You can even do it on a per ID basis. However I mentioned what could go wrong in another thread: Say you've locked down the system by ID to prevent auto-install of new USB HID devices (the key-logging portion of this attack).
And your keyboard / mouse combination breaks.
What now? You need the exact same make and m
The problem is most Windows computers (Score:1)
Windows only I presume
Bootstrapping after a keyboard replacement (Score:2)
What might be better is if the OS keeps a whitelist of devices that it's seen and prompts if it sees a new device with some information about what the device actually wants to try and do or be.
When your desktop PC's keyboard breaks, good luck adding the replacement you purchased to its whitelist.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
And use what to enter your password so that the OS knows the click on OK is coming from an administrator?
Re: (Score:2)
On-screen keyboard failures (Score:2)
I don't see how a user could use the on-screen keyboard to authenticate to Windows when the elevation prompt covers up the on-screen keyboard [microsoft.com] or when pressing Ctrl+Alt+Del on the login or lock screen does not cause the password prompt to appear [superuser.com].
Nor does it help if the user replaced a broken mouse at the same time.
Re: (Score:2)
Re: (Score:2)
Alternately, since you purport to know the administrator
Re: (Score:2)
pressing Ctrl+Alt+Del on the login or lock screen does not cause the password prompt to appear
an admin user, who can log in with the on-screen keyboard
Not if Windows fails to show the login prompt in the first place because it fails to respond to Ctrl+Alt+Del on the on-screen keyboard.
Re: (Score:2)
On a daily basis, I'm forced to modify system security functions under non admin accounts using admin credentials.
Re: (Score:2)
Re: (Score:2)
Over charging protection? (Score:2)
This device does not stop the worst of the USB issues the Capacitor killer that draws in electricity, charges a capacitor, then releases it all back into the PC at high voltage and capacity, frying the computer.
If you read the link to the article.. (Score:1)
Will it protect the PC from the USB Killer device? (Score:1)
USG? (Score:1)