Stuart Henderson <[email protected]> wrote:

> > I don't know if this matters, but for even ykinfo(1) (in the ykpers port) 
> > to work, I had to:
> > # chmod g+w /dev/usb1
> > # chmod g+rw /dev/ugen0.00
> 
> Known problem, there's no nice way around it though. The standard model
> used on most OS of controlling many simpler USB devices from a low
> privileged userland process does not work too well with the approach
> in https://cvsweb.openbsd.org/src/etc/MAKEDEV.common#rev1.105
> 
> afaik the options for this are chmod, run as root, or write a driver that
> works similar to fido(4) and modify the existing software that interfaces
> with the device to use that instead (I guess for yk it will need a way to
> hook into the keyboard driver too for the usual button-press keyboard
> emulation otp mode).

The situation is stupidly unworkable.

a+rw makes these systems single-user.  Worse, it means any application
can touch the usb devices.

The people who added direct-usb control to Unix completely screwed up
by deciding to ignore *all security considerations*.

It is beyond laughable.  So recently we locked up all the nodes.

Seeing this in a conversation about adding pledge, makes it clear how
few people understand the blend of high-level and low-level components,
and it increases me doubt about the future of mankind.

Reply via email to