From: Maxim Nikulin <manikulin@gmail.com>
To: emacs-orgmode@gnu.org
Subject: Re: Thoughts on the standardization of Org
Date: Tue, 10 Nov 2020 23:19:35 +0700 [thread overview]
Message-ID: <roeeio$ct7$1@ciao.gmane.io> (raw)
In-Reply-To: <X6lnVcrYqoyOhBFx@protected.rcdrun.com>
> * Maxim Nikulin [2020-11-09 17:06]:
>> 2020-11-08 Jean Louis wrote:
>>> That is right, I am using it since years in ~/.mailcap that works well
>>> for mutt email client.
>>>
>>> text/org; emacsclient %s; nametemplate=%s.org;
>>> text/x-org; emacsclient %s; nametemplate=%s.org;
>>
>> Just for curiosity, couldn't it lead to execution of arbitrary code
>> placed into elisp table expressions, some macro, etc.?
My question is solely concerning content of an org file. Let's assume
default emacs and org mode settings or customization that does not bring
more weakness.
I consider an attack through content of an org file obtained from
network. It may be a message from a person even from usual contact list
whose computer was infected by some malware. Imagine that botnet
developers would notice new RFC on org mode and would add a plugin
capable to add specific payload (fetching and launching its agent using
elisp) if org files noticed in the host owner mailbox. I would not like
to see org next to office files in security warnings.
The reason why I am afraid to add emacs as a MIME handler for org files
is the following. Nowadays vim is shipped with disabled (at least by
default) modeline that was used to specify e.g. tab width for the
particular file, but it allows to change too much settings. After
skimming through the org manual, my impression is that org mode allows
to override a lot of settings through "#+setup:" and other directives. I
do not have a solid notion related to all possibilities to inject elisp
code so I am not sure that no elisp code embedded into received file is
executed during opening of the file without any user action.
Viewing received file I would prefer a restricted mode at least to avoid
obviously dangerous actions:
- C-c C-c for src blocks
- recalculation of a table field containing elisp expression
accidentally fired by Tab or C-c
- export (however it would require more keystrokes, so a chance to
activate it is not so significant)
I could miss some possibilities to activate arbitrary code. Just
speculations, maybe such options are safe without modification of
init.el: custom link handlers, dynamic blocks, column view.
Non-emacs viewer might be safer as a MIME handler despite limited
functionality.
There was a thread concerning "security considerations" section of RFC
discussing if the similar section of MarkDown document is suitable for
org. My impression that org is much more complex.
My worries if arbitrary code could be executed during just opening of a
file are not directly related to standardization. However I do not think
that argument on low attack probability due to negligible popularity is
appropriate in the thread with discussion that standardization could
make org more wide spread.
2020-11-09 22:59, Jean Louis wrote:
> Quoting '%s' is
> recommended. Mailcap has security issues just as file system has.
I was not going to raise such issues. However I agree that in shell it
is quite easy to use quotes in a wrong way.
> That is why on GNU/Linux and BSD systems and other systems we have
> login with username and passwords and locking screensavers. Those are
> for use. Computers should be protected from malicious access.
I do not see why it is relevant. Joking colleagues and angry students is
another attack vector. Mail reader and emacs almost certainly have
privileges to put something to user's autostart. Passwords are not
involved. What could help is running a dedicated emacs used as MIME
handler inside a container with restrictive mount and network namespaces.
> For the same reason one shall be cautious of any packages coming from
> various popular package repositories as such are not verified for
> safety issues.
I would prefer to not touch the subject of degree of trust in respect to
external packages. Let's limit the scope to org "core", maybe even as a
part of emacs distribution.
next prev parent reply other threads:[~2020-11-10 16:21 UTC|newest]
Thread overview: 72+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-11-01 0:22 Thoughts on the standardization of Org Asa Zeren
2020-11-01 0:40 ` Dr. Arne Babenhauserheide
2020-11-01 3:08 ` Asa Zeren
2020-11-01 4:23 ` Pankaj Jangid
2020-11-01 7:54 ` Tim Cross
2020-11-01 2:28 ` Tim Cross
2020-11-01 3:39 ` Pankaj Jangid
2020-11-02 12:39 ` Eric S Fraga
2020-11-02 14:22 ` Greg Minshall
2020-11-02 14:56 ` Eric S Fraga
2020-11-02 15:23 ` Russell Adams
2020-11-02 15:31 ` TEC
2020-11-02 15:48 ` Eric S Fraga
2020-11-02 16:27 ` Carsten Dominik
2020-11-02 22:05 ` Tim Cross
2020-11-03 3:29 ` Greg Minshall
2020-11-01 5:20 ` Tom Gillespie
2020-11-01 10:25 ` Dr. Arne Babenhauserheide
2020-11-01 10:28 ` TEC
2020-11-01 18:02 ` Jack Kamm
2020-11-01 16:03 ` Asa Zeren
2020-11-01 17:27 ` Dr. Arne Babenhauserheide
2020-11-01 17:29 ` TEC
2020-11-01 18:43 ` Asa Zeren
2020-11-01 6:24 ` TEC
2020-11-01 16:13 ` Russell Adams
2020-11-01 19:46 ` Daniele Nicolodi
2020-11-01 23:10 ` Dr. Arne Babenhauserheide
2020-11-02 8:37 ` Daniele Nicolodi
2020-11-02 9:02 ` TEC
2020-11-02 11:04 ` Daniele Nicolodi
2020-11-02 13:43 ` TEC
2020-11-07 21:20 ` Jean Louis
2020-11-09 14:04 ` Maxim Nikulin
2020-11-09 15:57 ` Daniele Nicolodi
2020-11-09 15:59 ` Jean Louis
2020-11-10 16:19 ` Maxim Nikulin [this message]
2020-11-10 20:22 ` Jean Louis
2020-11-10 23:08 ` Tom Gillespie
2020-11-11 0:00 ` Tim Cross
2020-11-09 21:46 ` Tim Cross
2020-11-09 22:45 ` Emails are not safe - " Jean Louis
2020-11-10 4:13 ` Greg Minshall
2020-11-10 4:49 ` Tim Cross
2020-11-10 7:12 ` Greg Minshall
2020-11-10 16:29 ` Maxim Nikulin
2020-11-10 20:35 ` Jean Louis
2020-11-10 22:30 ` Tim Cross
2020-11-11 5:03 ` Jean Louis
2020-11-11 6:40 ` Tim Cross
2020-11-27 16:49 ` Maxim Nikulin
2020-11-27 17:16 ` Jean Louis
2020-11-11 17:10 ` Maxim Nikulin
2020-11-11 17:34 ` Jean Louis
2020-11-12 3:39 ` Greg Minshall
2020-11-11 3:49 ` Greg Minshall
2020-11-02 9:53 ` Dr. Arne Babenhauserheide
2020-11-02 1:17 ` Ken Mankoff
2020-11-02 8:12 ` Russell Adams
2020-11-02 9:57 ` Dr. Arne Babenhauserheide
2020-11-03 8:24 ` David Rogers
2020-11-03 12:14 ` Ken Mankoff
2020-11-03 12:27 ` Russell Adams
2020-11-03 13:00 ` Eric S Fraga
2020-11-03 13:31 ` Ken Mankoff
2020-11-03 15:03 ` Eric S Fraga
2020-11-03 20:27 ` TEC
2020-11-03 14:38 ` Devin Prater
2020-11-03 22:03 ` David Rogers
-- strict thread matches above, loose matches on Subject: below --
2020-11-01 13:34 Gustav Wikström
2020-11-01 18:39 Asa Zeren
2020-11-03 22:30 Asa Zeren
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
List information: https://www.orgmode.org/
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to='roeeio$ct7$1@ciao.gmane.io' \
--to=manikulin@gmail.com \
--cc=emacs-orgmode@gnu.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
Code repositories for project(s) associated with this public inbox
https://git.savannah.gnu.org/cgit/emacs/org-mode.git
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).