On Thu, Oct 26, 2023 at 12:15:47PM +0200, Daniele B. wrote: > Well, here for a secure OpenBSD I'm expecting a minimal usage of resources. > But I see..if inserting my physical keyboard I get two keyboard devices > attached to run a sleep > button properly on a *consumer multimedia product* well..I missed mayb the > point and > everything is questionable.
On your keyboard there is just one extra button. On other multimedia keyboards there might be a lot of extra buttons which are implemented separately to the regular keyboard keys. > Then, if you are asking tips on how to attack my working station by injection > of keystrocks on a > pseudo keyboard device I have no clue but is it important indeed? If you are concerned about that possibility then you can disable the ucc driver. But if a malicious USB device was going to inject keystrokes then it could do that just as easily using the normal keyboard device driver, so are you going to disable that as well? It could also inject mouse movements and clicks as a mouse device and copy and paste characters in to your terminal, so maybe you want to disable the mouse driver too. And even if you go out and buy a PS/2 keyboard and mouse so that you can disable the USB drivers, a malicious USB device could still attach as a network card so make sure you take steps to avoid that causing any problems. > ( I also asked you in my previous posts to stress test better this ucc driver > and parents because my bad > experiences with usb keyboards passing by an Aten KVM "Secure" switch, is it > anything enlightning? ) Well you didn't provide any debugging info about the problem with the KVM switch, and nothing to suggest that it was even related to the ucc driver. Common sense suggests that the injected keystroke are more likely to be some kind of 'reset' sequence that the switch sends when switching between the attached devices, or otherwise it's just buggy. Or both.