unofficial mirror of emacs-devel@gnu.org 
 help / color / mirror / code / Atom feed
* Re: expressions
       [not found] <E18UCGO-0002vU-00@snap.thunk.org>
@ 2003-01-05 18:34 ` Richard Stallman
  2003-01-05 19:55   ` expressions Bob Halley
  2003-01-08 13:50 ` Suggested enhancement: allow emacsclient to send arbitrary LISP expressions Kim F. Storm
  1 sibling, 1 reply; 20+ messages in thread
From: Richard Stallman @ 2003-01-05 18:34 UTC (permalink / raw)
  Cc: emacs-devel

This is a useful feature.  I have a security question for the people
on emacs-devel who support non-GNU-like platforms.  server.el sets up
mode 0700 for the socket.  Is that sufficient security, on all
platforms, to make it safe to install this feature?

      In practice I don't
    expect this to be a problem, although if this is a major concern, a
    option such as --lisp could be added to emacsclient to inhibit adding
    the absolute pathname to the argument, instead of always treating
    arguments that begin with an open parenthesis as LISP expressions.

Perhaps there should be an option --file that forces an argument to be
treated as a file even if it starts with open-paren.  Scripts could
use that; meanwhile, interactive use would remain maximally convenient.

^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: expressions
  2003-01-05 18:34 ` expressions Richard Stallman
@ 2003-01-05 19:55   ` Bob Halley
  2003-01-06  0:49     ` expressions Kim F. Storm
                       ` (2 more replies)
  0 siblings, 3 replies; 20+ messages in thread
From: Bob Halley @ 2003-01-05 19:55 UTC (permalink / raw)
  Cc: emacs-devel

Richard Stallman <rms@gnu.org> writes:

> This is a useful feature.  I have a security question for the people
> on emacs-devel who support non-GNU-like platforms.  server.el sets up
> mode 0700 for the socket.  Is that sufficient security, on all
> platforms, to make it safe to install this feature?

No, it is not safe.  On Solaris, at least as recent as Solaris 8, the
file permissions on UNIX domain sockets are totally ignored.  This may
be true on other platforms as well, though many platforms "do the
right thing" and check file permissions.

The standard way of dealing with this portably is to create a
directory for the socket filename to live in, and control access via
permissions on the directory.

/Bob

^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: expressions
  2003-01-05 19:55   ` expressions Bob Halley
@ 2003-01-06  0:49     ` Kim F. Storm
  2003-01-06  1:55       ` expressions Bob Halley
  2003-01-07 10:14       ` expressions Kai Großjohann
  2003-01-06 17:13     ` expressions Richard Stallman
  2003-01-07 11:53     ` expressions Theodore Ts'o
  2 siblings, 2 replies; 20+ messages in thread
From: Kim F. Storm @ 2003-01-06  0:49 UTC (permalink / raw)
  Cc: emacs-devel

Bob Halley <halley@play-bow.org> writes:

> Richard Stallman <rms@gnu.org> writes:
> 
> > This is a useful feature.  I have a security question for the people
> > on emacs-devel who support non-GNU-like platforms.  server.el sets up
> > mode 0700 for the socket.  Is that sufficient security, on all
> > platforms, to make it safe to install this feature?
> 
> No, it is not safe.  On Solaris, at least as recent as Solaris 8, the
> file permissions on UNIX domain sockets are totally ignored.  This may
> be true on other platforms as well, though many platforms "do the
> right thing" and check file permissions.

Currently, server.el places the socket in /tmp/esrv<UID>-<HOST>

I've always wondered why the socket wasn't placed in $HOME.

> 
> The standard way of dealing with this portably is to create a
> directory for the socket filename to live in, and control access via
> permissions on the directory.


Maybe we should create a directory "~/.esrv" (if it doesn't exist),
check that it is owned by the current user (fail to start server if
not), make it 700, and then create the server socket (e.g. named
`server') in that directory.

-- 
Kim F. Storm <storm@cua.dk> http://www.cua.dk

^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: expressions
  2003-01-06  0:49     ` expressions Kim F. Storm
@ 2003-01-06  1:55       ` Bob Halley
  2003-01-06 20:06         ` expressions chad
  2003-01-07 10:14       ` expressions Kai Großjohann
  1 sibling, 1 reply; 20+ messages in thread
From: Bob Halley @ 2003-01-06  1:55 UTC (permalink / raw)
  Cc: emacs-devel

storm@cua.dk (Kim F. Storm) writes:

> Maybe we should create a directory "~/.esrv" (if it doesn't exist),
> check that it is owned by the current user (fail to start server if
> not), make it 700, and then create the server socket (e.g. named
> `server') in that directory.

This sounds like a good idea to me, though I'd keep the filename
something like server-<hostname>, in case the user shares their home
directory over NFS (or some other network filesystem).

/Bob

^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: expressions
  2003-01-05 19:55   ` expressions Bob Halley
  2003-01-06  0:49     ` expressions Kim F. Storm
@ 2003-01-06 17:13     ` Richard Stallman
  2003-01-06 20:37       ` expressions Bob Halley
  2003-01-08 21:00       ` expressions Andreas Schwab
  2003-01-07 11:53     ` expressions Theodore Ts'o
  2 siblings, 2 replies; 20+ messages in thread
From: Richard Stallman @ 2003-01-06 17:13 UTC (permalink / raw)
  Cc: emacs-devel

    The standard way of dealing with this portably is to create a
    directory for the socket filename to live in, and control access via
    permissions on the directory.

We could change both server.el and emacsclient to do this, I guess.
It would be an incompatible change, and some users who try to use
an older emacsclient with a newer Emacs would lose.

We could change emacsclient to try the new method first and then
try the old method.  Then it would work with old Emacs versions.
Is there a way to make server.el support both methods?

    Currently, server.el places the socket in /tmp/esrv<UID>-<HOST>

This way, different user names with the same UID can interoperate.

    I've always wondered why the socket wasn't placed in $HOME.

That way, they could not interoperate.

The technique of making a directory to regulate access can be used
under /tmp, I guess.  Would these directories in /tmp get cleared out
when /tmp is cleared?  If not, that would be a problem.

^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: expressions
  2003-01-06  1:55       ` expressions Bob Halley
@ 2003-01-06 20:06         ` chad
  2003-01-06 20:32           ` expressions Bob Halley
  0 siblings, 1 reply; 20+ messages in thread
From: chad @ 2003-01-06 20:06 UTC (permalink / raw)
  Cc: Kim F. Storm


Bob Halley <halley@play-bow.org> wrote:

> > Maybe we should create a directory "~/.esrv" (if it doesn't exist),
> > check that it is owned by the current user (fail to start server if
> > not), make it 700, and then create the server socket (e.g. named
> > `server') in that directory.
> 
> This sounds like a good idea to me, though I'd keep the filename
> something like server-<hostname>, in case the user shares their home
> directory over NFS (or some other network filesystem).

I would expect that the reason /tmp was chosen was the inability of some
systems to create sockets in NFS/AFS/SFS/Coda/whatever remote filesystem
that the suer might be using for $HOME.  I suspect that this might still
be a problem.  The ssh/openssh technique involves creating a directory
in $TMPDIR named ssh-$unique (with other refinements that I think do not
apply).  Perhaps this would be a safer strategy?

chad

^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: expressions
  2003-01-06 20:06         ` expressions chad
@ 2003-01-06 20:32           ` Bob Halley
  2003-01-07 10:11             ` expressions Kim F. Storm
  0 siblings, 1 reply; 20+ messages in thread
From: Bob Halley @ 2003-01-06 20:32 UTC (permalink / raw)
  Cc: Kim F. Storm

chad <y@mit.edu> writes:

> I would expect that the reason /tmp was chosen was the inability of some
> systems to create sockets in NFS/AFS/SFS/Coda/whatever remote filesystem
> that the suer might be using for $HOME.  I suspect that this might still
> be a problem.  The ssh/openssh technique involves creating a directory
> in $TMPDIR named ssh-$unique (with other refinements that I think do not
> apply).  Perhaps this would be a safer strategy?

Good point, though we don't want a unique name like SSH since we're
trying to rendezvous on the name.  I tested creating sockets on an NFS
mounted directory with Solaris and it worked, but I have no idea what
happens with other platforms or filesystem types.

So, if we're using /tmp, and want to keep the UID in there for reasons
RMS explained in another message, maybe we want something like

        /tmp/.eserv-<UID>-<HOSTNAME>/server

which should cover us against pretty much everything :).

/Bob

^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: expressions
  2003-01-06 17:13     ` expressions Richard Stallman
@ 2003-01-06 20:37       ` Bob Halley
  2003-01-08 21:00       ` expressions Andreas Schwab
  1 sibling, 0 replies; 20+ messages in thread
From: Bob Halley @ 2003-01-06 20:37 UTC (permalink / raw)
  Cc: emacs-devel

Richard Stallman <rms@gnu.org> writes:

> The technique of making a directory to regulate access can be used
> under /tmp, I guess.  Would these directories in /tmp get cleared out
> when /tmp is cleared?  If not, that would be a problem.

Depends on the OS.  Many other applications use this "directory in
tmp" approach, so we don't have to worry about being an unusual case.

^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: expressions
  2003-01-06 20:32           ` expressions Bob Halley
@ 2003-01-07 10:11             ` Kim F. Storm
  2003-01-07 19:23               ` expressions Luc Teirlinck
  2003-01-11 19:48               ` expressions Stefan Monnier
  0 siblings, 2 replies; 20+ messages in thread
From: Kim F. Storm @ 2003-01-07 10:11 UTC (permalink / raw)
  Cc: emacs-devel

Bob Halley <halley@play-bow.org> writes:

> chad <y@mit.edu> writes:
> 
> > I would expect that the reason /tmp was chosen was the inability of some
> > systems to create sockets in NFS/AFS/SFS/Coda/whatever remote filesystem
> > that the suer might be using for $HOME.  

On a disk-less work station, even /tmp may be on a remote filesystem...

>                                            I suspect that this might still
> > be a problem.  The ssh/openssh technique involves creating a directory
> > in $TMPDIR named ssh-$unique (with other refinements that I think do not
> > apply).  Perhaps this would be a safer strategy?
> 
> Good point, though we don't want a unique name like SSH since we're
> trying to rendezvous on the name.  I tested creating sockets on an NFS
> mounted directory with Solaris and it worked, but I have no idea what
> happens with other platforms or filesystem types.
> 
> So, if we're using /tmp, and want to keep the UID in there for reasons
> RMS explained in another message, 

I didn't see that message...  Was it copied to the list?


>                                   maybe we want something like
> 
>         /tmp/.eserv-<UID>-<HOSTNAME>/server
> 
> which should cover us against pretty much everything :).

In that case, I would suggest naming it something like:

        /tmp/.emacs-UID/server-HOSTNAME

This would give us a standard place in /tmp/.emacs-UID for other
per-user stuff that we may need in the future.  The directory name
should be put in a new lisp variable, e.g. user-private-directory,
which is bound on start-up.

(defcustom user-private-directory (expand-file-name (format "/tmp/.emacs-%d" (user-uid)))
  "*Directory for user private files."
  :set (lambda (...)
        ... create & set modes on the directory if it doesn't exist ...)
  ...)


server.el could then use that variable to create the name of the socket.

(defvar server-socket-name
  (format "%s/server-%s" user-private-directory
	  (substring (system-name) 0 (string-match "\\." (system-name)))))

-- 
Kim F. Storm <storm@cua.dk> http://www.cua.dk

^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: expressions
  2003-01-06  0:49     ` expressions Kim F. Storm
  2003-01-06  1:55       ` expressions Bob Halley
@ 2003-01-07 10:14       ` Kai Großjohann
  1 sibling, 0 replies; 20+ messages in thread
From: Kai Großjohann @ 2003-01-07 10:14 UTC (permalink / raw)


storm@cua.dk (Kim F. Storm) writes:

> Maybe we should create a directory "~/.esrv" (if it doesn't exist),
> check that it is owned by the current user (fail to start server if
> not), make it 700, and then create the server socket (e.g. named
> `server') in that directory.

How about using ~/.emacs.d?  How about doing chmod go-rwx on that
directory?  (I think go-rwx are good permissions for the directory
anyway.)
-- 
Ambibibentists unite!

^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: expressions
  2003-01-05 19:55   ` expressions Bob Halley
  2003-01-06  0:49     ` expressions Kim F. Storm
  2003-01-06 17:13     ` expressions Richard Stallman
@ 2003-01-07 11:53     ` Theodore Ts'o
  2003-01-08  8:00       ` expressions Richard Stallman
  2003-01-11 19:47       ` expressions Stefan Monnier
  2 siblings, 2 replies; 20+ messages in thread
From: Theodore Ts'o @ 2003-01-07 11:53 UTC (permalink / raw)
  Cc: emacs-devel

On Sun, Jan 05, 2003 at 11:55:49AM -0800, Bob Halley wrote:
> No, it is not safe.  On Solaris, at least as recent as Solaris 8, the
> file permissions on UNIX domain sockets are totally ignored.  This may
> be true on other platforms as well, though many platforms "do the
> right thing" and check file permissions.

Wow.  I didn't realize Solaris was that broken/stupid.  

Although granted adding the ability to server.el to evaluate arbitrary
LISP expression becomes a security disaster, even without that, users
who have enable-local-variables set to t and who run server.el are in
trouble --- since an attacker can ask emacs to open an arbitrary file
created by the attacker, and the local variables in the file can
contain arbitrary lisp expressions.

> The standard way of dealing with this portably is to create a
> directory for the socket filename to live in, and control access via
> permissions on the directory.

Yes, although this causes the backwards compatibility problems
mentioned in other mail messages.  One solution would be to allow the
location to be configurable via an emacs-server variable to be one of
the following possibilities, with emacsclient searching all of these
locations:

	/tmp/esrv<uid>-hostname		
		(for backwards compatibility with old emacsclient binaries)

	/tmp/esrv-<uid>/hostname	
		(for homedirs using filesystems that don't support sockets)

	~/.eserv/<hostname>
		(to avoid tmp cleaners)

(BTW, Note that one way of dealing with the temp cleaner problem would
be to have the emacsserver binary periodically wake up every so often,
and try touching the containing directory and socket.  If they have
disappeared, the binary could recreate them.)


Another thought --- if we're willing to bag backwards compatibility
altogether, a friend recently pointed me at the existence of another
package, gnuserv/gnuclient, which does most of what I had wanted.  It
is completely non-backwards compatible with emacslcleint --- indeed,
because it uses the same variable and function names as server.el, it
cannot be loaded at the same time as server.el.  However, it uses
s-expressions for evaluating lisp expressions as well as for passing
filenames to be edited, so it is cleaner than the existing
emacsclient/emacsserver.  It also has security features built in, and
can listen on TCP ports, so you use it across the network.

						- Ted

^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: expressions
  2003-01-07 10:11             ` expressions Kim F. Storm
@ 2003-01-07 19:23               ` Luc Teirlinck
  2003-01-11 19:48               ` expressions Stefan Monnier
  1 sibling, 0 replies; 20+ messages in thread
From: Luc Teirlinck @ 2003-01-07 19:23 UTC (permalink / raw)
  Cc: halley

Kim Storm wrote:
   
   I didn't see that message...  Was it copied to the list?

There seems to be a substantial delay (more than a day), because the
archives seem to be in the process of being updated.  (That is what I
guess.)  Some of yesterday morning's messages have not been posted
yet.

Sincerely,

Luc.

^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: expressions
  2003-01-07 11:53     ` expressions Theodore Ts'o
@ 2003-01-08  8:00       ` Richard Stallman
  2003-01-11 19:47       ` expressions Stefan Monnier
  1 sibling, 0 replies; 20+ messages in thread
From: Richard Stallman @ 2003-01-08  8:00 UTC (permalink / raw)
  Cc: halley

    Although granted adding the ability to server.el to evaluate arbitrary
    LISP expression becomes a security disaster, even without that, users
    who have enable-local-variables set to t and who run server.el are in
    trouble --- since an attacker can ask emacs to open an arbitrary file
    created by the attacker, and the local variables in the file can
    contain arbitrary lisp expressions.

That's true, but enable-local-variables is nil by default.
So this change would really make the problem considerably more
likely.

    (BTW, Note that one way of dealing with the temp cleaner problem would
    be to have the emacsserver binary periodically wake up every so often,
    and try touching the containing directory and socket.  If they have
    disappeared, the binary could recreate them.)

I thin the current code has the same problem--it makes no attempt
to cope if you clean /tmp.  I guess it would be nice to add this
facility to try to cope.

I was worried about whether clearing /tmp might fail to delete
subdirs.  ISTR there was such a problem in the past.  Maybe not now.

    Another thought --- if we're willing to bag backwards compatibility
    altogether, a friend recently pointed me at the existence of another
    package, gnuserv/gnuclient, which does most of what I had wanted.

I think there are problems getting papers for that.
I don't remember the details, though.  Maybe we could implement
whatever security feature it has.  How does that work?

^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: Suggested enhancement: allow emacsclient to send arbitrary LISP expressions
       [not found] <E18UCGO-0002vU-00@snap.thunk.org>
  2003-01-05 18:34 ` expressions Richard Stallman
@ 2003-01-08 13:50 ` Kim F. Storm
  2003-01-09 23:13   ` Richard Stallman
  1 sibling, 1 reply; 20+ messages in thread
From: Kim F. Storm @ 2003-01-08 13:50 UTC (permalink / raw)
  Cc: emacs-devel

tytso@mit.edu writes:

> This patch allows the emacs client to pass in an arbitrary lisp
> expression, which will be executed by the emacs server process.  
> 
> For example: emacsclient '(make-frame-on-display "localhost:12")'


Stepping back to the beginning of this thread, this is actually
already implemented in CVS emacs:

        emacsclient --eval '(make-frame-on-display "localhost:12")'

There's also a new --display option, so you may even write:

        emacsclient --eval '(make-frame)' --display "localhost:12"


-- 
Kim F. Storm <storm@cua.dk> http://www.cua.dk

^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: expressions
  2003-01-06 17:13     ` expressions Richard Stallman
  2003-01-06 20:37       ` expressions Bob Halley
@ 2003-01-08 21:00       ` Andreas Schwab
  1 sibling, 0 replies; 20+ messages in thread
From: Andreas Schwab @ 2003-01-08 21:00 UTC (permalink / raw)
  Cc: emacs-devel

Richard Stallman <rms@gnu.org> writes:

|>     The standard way of dealing with this portably is to create a
|>     directory for the socket filename to live in, and control access via
|>     permissions on the directory.
|> 
|> We could change both server.el and emacsclient to do this, I guess.
|> It would be an incompatible change, and some users who try to use
|> an older emacsclient with a newer Emacs would lose.

I don't think this is a problem, since emacsclient and emacs should
always be in sync.

Andreas.

-- 
Andreas Schwab, SuSE Labs, schwab@suse.de
SuSE Linux AG, Deutschherrnstr. 15-19, D-90429 Nürnberg
Key fingerprint = 58CA 54C7 6D53 942B 1756  01D3 44D5 214B 8276 4ED5
"And now for something completely different."

^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: Suggested enhancement: allow emacsclient to send arbitrary LISP expressions
  2003-01-08 13:50 ` Suggested enhancement: allow emacsclient to send arbitrary LISP expressions Kim F. Storm
@ 2003-01-09 23:13   ` Richard Stallman
  2003-01-13 21:08     ` Theodore Ts'o
  0 siblings, 1 reply; 20+ messages in thread
From: Richard Stallman @ 2003-01-09 23:13 UTC (permalink / raw)
  Cc: emacs-devel

    Stepping back to the beginning of this thread, this is actually
    already implemented in CVS emacs:

	    emacsclient --eval '(make-frame-on-display "localhost:12")'

Then it would appear we have a serious security problem already,
on some systems.

I will comment out this feature; when someone makes the changes
necessary to make it safe, we can turn it back on.

^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: expressions
  2003-01-07 11:53     ` expressions Theodore Ts'o
  2003-01-08  8:00       ` expressions Richard Stallman
@ 2003-01-11 19:47       ` Stefan Monnier
  1 sibling, 0 replies; 20+ messages in thread
From: Stefan Monnier @ 2003-01-11 19:47 UTC (permalink / raw)
  Cc: emacs-devel

> 	/tmp/esrv<uid>-hostname
> 		(for backwards compatibility with old emacsclient binaries)

I actually have no idea why the hostname should be included.
After all, /tmp is not supposed to be shared among several machines
(i.e. it might be NFS-mounted but it should be dedicated to one
particular host).

> (BTW, Note that one way of dealing with the temp cleaner problem would
> be to have the emacsserver binary periodically wake up every so often,
> and try touching the containing directory and socket.  If they have
> disappeared, the binary could recreate them.)

I don't see why /tmp cleaning should be a problem.
It isn't for SSH and X11 and for Emacs until now.


	Stefan

^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: expressions
  2003-01-07 10:11             ` expressions Kim F. Storm
  2003-01-07 19:23               ` expressions Luc Teirlinck
@ 2003-01-11 19:48               ` Stefan Monnier
  1 sibling, 0 replies; 20+ messages in thread
From: Stefan Monnier @ 2003-01-11 19:48 UTC (permalink / raw)
  Cc: emacs-devel

> > > I would expect that the reason /tmp was chosen was the inability of some
> > > systems to create sockets in NFS/AFS/SFS/Coda/whatever remote filesystem
> > > that the suer might be using for $HOME.  
> 
> On a disk-less work station, even /tmp may be on a remote filesystem...

So what ?  The point is that if $HOME works, then /tmp works
as well, whereas the opposite is not true.


	Stefan

^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: Suggested enhancement: allow emacsclient to send arbitrary LISP expressions
  2003-01-09 23:13   ` Richard Stallman
@ 2003-01-13 21:08     ` Theodore Ts'o
  2003-01-14 18:55       ` Richard Stallman
  0 siblings, 1 reply; 20+ messages in thread
From: Theodore Ts'o @ 2003-01-13 21:08 UTC (permalink / raw)
  Cc: storm

On Thu, Jan 09, 2003 at 06:13:16PM -0500, Richard Stallman wrote:
>     Stepping back to the beginning of this thread, this is actually
>     already implemented in CVS emacs:
> 
> 	    emacsclient --eval '(make-frame-on-display "localhost:12")'

Great!  So it sounds like I don't need to send legal papers to the
FSF, since somoene else has implemented this rather obvious idea.

> Then it would appear we have a serious security problem already,
> on some systems.
> 
> I will comment out this feature; when someone makes the changes
> necessary to make it safe, we can turn it back on.

How about it making it configurable via a variable, which is nil by
default.  That way those of us who are running non-broken systems
where the permissions on unix-domain sockets are actually respected
can enjoy the functionality right away.

						- Ted

^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: Suggested enhancement: allow emacsclient to send arbitrary LISP expressions
  2003-01-13 21:08     ` Theodore Ts'o
@ 2003-01-14 18:55       ` Richard Stallman
  0 siblings, 0 replies; 20+ messages in thread
From: Richard Stallman @ 2003-01-14 18:55 UTC (permalink / raw)
  Cc: storm

    How about it making it configurable via a variable, which is nil by
    default.  That way those of us who are running non-broken systems
    where the permissions on unix-domain sockets are actually respected
    can enjoy the functionality right away.

I expect someone will fix the security problem pretty soon, by using a
subdirectory.  Once that is done, we can simply turn it back on.

I turned it off now just as insurance against forgetting about it.

^ permalink raw reply	[flat|nested] 20+ messages in thread

end of thread, other threads:[~2003-01-14 18:55 UTC | newest]

Thread overview: 20+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
     [not found] <E18UCGO-0002vU-00@snap.thunk.org>
2003-01-05 18:34 ` expressions Richard Stallman
2003-01-05 19:55   ` expressions Bob Halley
2003-01-06  0:49     ` expressions Kim F. Storm
2003-01-06  1:55       ` expressions Bob Halley
2003-01-06 20:06         ` expressions chad
2003-01-06 20:32           ` expressions Bob Halley
2003-01-07 10:11             ` expressions Kim F. Storm
2003-01-07 19:23               ` expressions Luc Teirlinck
2003-01-11 19:48               ` expressions Stefan Monnier
2003-01-07 10:14       ` expressions Kai Großjohann
2003-01-06 17:13     ` expressions Richard Stallman
2003-01-06 20:37       ` expressions Bob Halley
2003-01-08 21:00       ` expressions Andreas Schwab
2003-01-07 11:53     ` expressions Theodore Ts'o
2003-01-08  8:00       ` expressions Richard Stallman
2003-01-11 19:47       ` expressions Stefan Monnier
2003-01-08 13:50 ` Suggested enhancement: allow emacsclient to send arbitrary LISP expressions Kim F. Storm
2003-01-09 23:13   ` Richard Stallman
2003-01-13 21:08     ` Theodore Ts'o
2003-01-14 18:55       ` Richard Stallman

Code repositories for project(s) associated with this public inbox

	https://git.savannah.gnu.org/cgit/emacs.git

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).