00:00:00 --- log: started forth/15.02.15 01:04:38 --- quit: kumul (Quit: Leaving) 01:07:38 --- join: true-grue (~grue@95-27-173-200.broadband.corbina.ru) joined #forth 01:23:35 --- quit: impomatic (Read error: Connection reset by peer) 01:24:50 --- join: jameseb- (~jameseb_@runciman.default.hacksoc.uk0.bigv.io) joined #forth 01:34:39 --- quit: jameseb (*.net *.split) 01:54:23 --- join: impomatic (~chatzilla@87.113.239.117) joined #forth 02:25:41 --- join: nighty-_ (~nighty@hokuriku.rural-networks.com) joined #forth 02:35:49 --- quit: bluekelp (Ping timeout: 245 seconds) 02:36:21 --- join: bluekelp (~bluekelp@2001:470:1:41:699b:d4ed:dd79:98d4) joined #forth 02:36:26 --- mode: ChanServ set +v bluekelp 02:57:27 --- join: bedah (~bedah@g231052015.adsl.alicedsl.de) joined #forth 03:58:01 --- join: darkf_ (~darkf___@unaffiliated/darkf) joined #forth 04:00:54 --- quit: darkf (Ping timeout: 252 seconds) 04:18:51 --- join: DocPlatypus (~skquinn@c-76-31-212-235.hsd1.tx.comcast.net) joined #forth 04:26:10 --- nick: darkf_ -> darkf 04:29:15 --- part: DocPlatypus left #forth 04:31:39 --- join: Keshl (~Purple@24.115.181.94.res-cmts.gld.ptd.net) joined #forth 05:28:24 --- join: bedah2 (~bedah@g224157204.adsl.alicedsl.de) joined #forth 05:31:57 --- quit: bedah (Ping timeout: 264 seconds) 06:05:04 --- join: denysonique (~quassel@31.55.72.135) joined #forth 06:05:05 --- quit: denysonique (Changing host) 06:05:05 --- join: denysonique (~quassel@unaffiliated/dennisonicc) joined #forth 06:15:31 --- quit: fantazo (Quit: Verlassend) 07:28:14 --- quit: darkf (Quit: Leaving) 07:35:22 --- join: _spt_ (~jaat@host-92-30-226-89.as13285.net) joined #forth 07:35:23 --- quit: _spt_ (Changing host) 07:35:23 --- join: _spt_ (~jaat@unaffiliated/-spt-/x-5624824) joined #forth 07:36:44 --- join: kumul (~mool@adsl-64-237-238-222.prtc.net) joined #forth 07:41:22 --- join: kumool (~mool@adsl-64-237-239-22.prtc.net) joined #forth 07:45:11 --- quit: kumul (Ping timeout: 255 seconds) 08:07:45 --- quit: denysonique (Ping timeout: 252 seconds) 09:00:23 --- join: fantazo (~fantazo@089144195189.atnat0004.highway.a1.net) joined #forth 09:49:20 --- quit: kumool (Ping timeout: 264 seconds) 09:56:43 --- quit: Keshl (Quit: Konversation terminated!) 10:02:15 --- join: Zarutian (~Adium@168-110-22-46.fiber.hringdu.is) joined #forth 11:00:34 --- quit: joneshf-laptop (Read error: Connection reset by peer) 11:00:37 --- join: joneshf-laptop_ (~joneshf@98.208.35.89) joined #forth 11:18:40 --- quit: Zarutian (Quit: Leaving.) 11:28:44 --- quit: fantazo (Quit: Verlassend) 12:21:15 --- join: MrMobius_ (~MrMobius@2601:f:400:1241:65a8:4149:3c13:95bc) joined #forth 12:28:16 --- quit: MrMobius_ (Ping timeout: 250 seconds) 12:30:54 <_spt_> evening folks 12:32:19 --- join: spt_1 (~jaat@host-92-30-226-89.as13285.net) joined #forth 12:35:58 --- quit: _spt_ (Ping timeout: 246 seconds) 13:07:46 --- quit: true-grue (Read error: Connection reset by peer) 13:19:30 --- join: Zarutian (~Adium@168-110-22-46.fiber.hringdu.is) joined #forth 13:19:43 --- join: Mat4 (~claude@ip18861915.dynamic.kabel-deutschland.de) joined #forth 13:19:45 hello 13:29:04 Ni! 13:29:17 hi DKordic 13:29:54 What's the progress on Your OS? 13:30:06 USB solved? 13:30:15 yes 13:30:25 Nice. 13:31:38 however I have some work at current to do and thing to work on it further at end of february 13:32:58 I mean further work must wait a bit 13:38:40 Mat4: how do you solve USB? 13:39:55 I mean, there is enumeration that happens when an USB device is plugged into a USB port (the hub for that port notifies the USB host iirc) 13:40:27 lets say I plug in two keyboards. Do both get their keypresses into the same buffer or? 13:41:01 I simply ported the driver sources of the current Linux kernel 13:43:21 Zarutian: yes, that would be the case 13:47:39 (not for Linux because as I see it input devices are handled exlusive so the second keyboard would only registered) 13:48:09 that logic is not part of the kernel driver 13:49:45 so your os is the vulernable to the badUSB stuff then? (Which basically grants the second keyboards which might be a programmed MCU pretending to be a keyboard access to the same input buffer) 13:51:37 at moment yes 13:52:44 but this is something you intend to rectify? 13:55:12 I think a doable approach for this kind of attack is to support protective zones for input devices 13:56:10 that's a quite old idea which works fine (which sadly no common OS today implement) 13:57:06 protective zones for input devices? I havent read about that idea and I have read a bit about old OS ideas. I am curious what it is? 13:59:18 basical filters for input streams which detect command (in my case source) sequences dependent on security characteristics 14:00:06 I see. 14:18:17 I was thinking about something much simpler. Such as just enumerating, printing or otherwise inform user, then ignoring the new device until activated by the user. (First keyboard or keyboard connected to USB port whose id is saved in nonvolatile memory gets the normal input buffer) 14:21:52 that's a nice idea. How can be ensured that an user recognise compromitted devices ? 14:25:55 compromised keyboards? not sure but it will make use of usb-stick HID devices harder 14:26:22 (the ones that an attacker plugs into your computer) 14:27:49 and here is a thing, iirc usb hubs tells which port the device was connected to so something like a tree-view or tree-graph (in ASCII if one doesnt have graphics) can show which devices are connected to which ports 14:29:54 yes, possible 14:33:49 each node could be labeled in such way to give information what the device is, which hub it is connected to (front or back on desktops etc). Then the message printed when a new device is connected can be informative: "New mass storage device plugged into top front usb port" for example. 14:34:36 which is what you would expect usually when you plug a USB flash memory stick. 14:35:37 good idea, thanks 14:37:02 if the user sees something like "New keyboard plugged into top front usb port" they can go "wait a sec, that wasnt what I plugged in" 15:23:48 --- quit: Mat4 (Quit: Verlassend) 15:25:01 --- join: MrMobius_ (~MrMobius@ip-64-134-123-29.public.wayport.net) joined #forth 15:49:06 --- quit: mnemnion (Remote host closed the connection) 16:11:06 --- quit: spt_1 (Quit: gone to fix a server for Staffc CC) 16:18:15 --- quit: nighty-_ (Remote host closed the connection) 16:19:48 --- quit: bedah2 (Quit: Ex-Chat) 17:45:22 --- join: kumul (~mool@adsl-64-237-238-150.prtc.net) joined #forth 18:03:39 --- join: darkf (~darkf___@unaffiliated/darkf) joined #forth 18:03:45 --- quit: MrMobius_ (Ping timeout: 246 seconds) 18:16:36 --- quit: Zarutian (Quit: Leaving.) 18:24:24 --- join: roygbiv (~JohnRambo@pdpc/supporter/active/roygbiv) joined #forth 18:38:24 --- join: mnemnion (~mnemnion@c-98-210-219-91.hsd1.ca.comcast.net) joined #forth 18:58:17 --- quit: roygbiv (Quit: ™) 19:13:16 --- join: MrMobius_ (~MrMobius@ip-64-134-123-29.public.wayport.net) joined #forth 19:44:42 --- quit: mnemnion (Remote host closed the connection) 20:04:20 --- quit: MrMobius_ (Ping timeout: 250 seconds) 22:42:43 --- quit: kumul (Quit: Leaving) 23:08:15 --- nick: QuNianHuiLai -> yunfan 23:27:17 --- join: fantazo (~fantazo@089144210212.atnat0019.highway.a1.net) joined #forth 23:45:00 --- join: mnemnion (~mnemnion@c-98-210-219-91.hsd1.ca.comcast.net) joined #forth 23:49:20 --- quit: mnemnion (Ping timeout: 246 seconds) 23:59:51 --- nick: yunfan -> mayli_he 23:59:59 --- log: ended forth/15.02.15