From: Jean Louis <bugs@gnu.support> To: "Dr. Arne Babenhauserheide" <arne_bab@web.de> Cc: 58774@debbugs.gnu.org, emacs-orgmode@gnu.org Subject: bug#58774: 29.0.50; [WISH]: Let us make EWW browse WWW Org files correctly Date: Wed, 26 Oct 2022 10:57:16 +0300 [thread overview] Message-ID: <Y1joXLgNkvNH2ugH@protected.localdomain> (raw) In-Reply-To: <87r0yvsgtt.fsf@web.de> * Dr. Arne Babenhauserheide <arne_bab@web.de> [2022-10-26 01:02]: > All of the Emacs packages have some amount of implicit trust. Users are unaware what package may do, and packages are everywhere on Internet. That is not a problem that I wish to solve. > If you ask me whether I can make this work safely: This would first > require the introduction of a safe-org-mode which strictly disables all > features that can execute remote code or disguise unsafe operations as > safe ones. If a user then decides to explicitly call M-x org-mode, > that’s their problem. Thanks, though, that was not my request. Please note that you miss very important issue, and that is that all browsers support customization on how to open specific content types, so it is quite trivial to customize in browser to open Common Lisp program with Common Lisp. Thus all of browsers who allow content type customization are analogous to problem you are presenting, which in fact is no practical problem at all. Find the victim first, then present the problem. To understand is that content type opening is generally not secure and that it is user choice. I am user of Org mode, and all I wish is to adapt eww to invoke command "org-mode" once content type text/x-org has been recognized. This way I can browse Org files directly, it is very useful for me as I have bunch of files. > If you ask me whether I know how to make this work unsafely: It likely > won’t need a lot of elisp reading, but I do not, because I do not look > for it, because if I did, I would not. Well then 👀 > I do not want to be the one who caused the systems of eww users to get > breached, or who helped opening that security hole. See above, all other content types and URL links may be customized by user to be opened how users want it. Your security presentation lacks the background knowledge. See the attached screenshot how easy it was to customize IceWeasel or Firefox derivate to open Org files by using Emacs client. I have script called "edit" which invoces emacsclient. -- Jean Take action in Free Software Foundation campaigns: https://www.fsf.org/campaigns In support of Richard M. Stallman https://stallmansupport.org/
WARNING: multiple messages have this Message-ID (diff)
From: Jean Louis <bugs@gnu.support> To: "Dr. Arne Babenhauserheide" <arne_bab@web.de> Cc: bug-gnu-emacs@gnu.org, emacs-orgmode@gnu.org Subject: Re: 29.0.50; [WISH]: Let us make EWW browse WWW Org files correctly Date: Wed, 26 Oct 2022 10:57:16 +0300 [thread overview] Message-ID: <Y1joXLgNkvNH2ugH@protected.localdomain> (raw) In-Reply-To: <87r0yvsgtt.fsf@web.de> * Dr. Arne Babenhauserheide <arne_bab@web.de> [2022-10-26 01:02]: > All of the Emacs packages have some amount of implicit trust. Users are unaware what package may do, and packages are everywhere on Internet. That is not a problem that I wish to solve. > If you ask me whether I can make this work safely: This would first > require the introduction of a safe-org-mode which strictly disables all > features that can execute remote code or disguise unsafe operations as > safe ones. If a user then decides to explicitly call M-x org-mode, > that’s their problem. Thanks, though, that was not my request. Please note that you miss very important issue, and that is that all browsers support customization on how to open specific content types, so it is quite trivial to customize in browser to open Common Lisp program with Common Lisp. Thus all of browsers who allow content type customization are analogous to problem you are presenting, which in fact is no practical problem at all. Find the victim first, then present the problem. To understand is that content type opening is generally not secure and that it is user choice. I am user of Org mode, and all I wish is to adapt eww to invoke command "org-mode" once content type text/x-org has been recognized. This way I can browse Org files directly, it is very useful for me as I have bunch of files. > If you ask me whether I know how to make this work unsafely: It likely > won’t need a lot of elisp reading, but I do not, because I do not look > for it, because if I did, I would not. Well then 👀 > I do not want to be the one who caused the systems of eww users to get > breached, or who helped opening that security hole. See above, all other content types and URL links may be customized by user to be opened how users want it. Your security presentation lacks the background knowledge. See the attached screenshot how easy it was to customize IceWeasel or Firefox derivate to open Org files by using Emacs client. I have script called "edit" which invoces emacsclient. -- Jean Take action in Free Software Foundation campaigns: https://www.fsf.org/campaigns In support of Richard M. Stallman https://stallmansupport.org/
next prev parent reply other threads:[~2022-10-26 7:57 UTC|newest] Thread overview: 94+ messages / expand[flat|nested] mbox.gz Atom feed top 2022-10-25 12:06 29.0.50; [WISH]: Let us make EWW browse WWW Org files correctly Jean Louis 2022-10-25 15:02 ` Dr. Arne Babenhauserheide 2022-10-25 19:56 ` bug#58774: " Jean Louis 2022-10-25 19:56 ` Jean Louis 2022-10-25 21:54 ` Dr. Arne Babenhauserheide 2022-10-26 7:57 ` Jean Louis [this message] 2022-10-26 7:57 ` Jean Louis 2022-10-26 11:55 ` bug#58774: " Dr. Arne Babenhauserheide 2022-10-26 11:55 ` Dr. Arne Babenhauserheide 2022-10-26 12:20 ` Jean Louis 2022-10-26 12:45 ` bug#58774: " Andreas Schwab 2022-10-26 12:45 ` Andreas Schwab 2022-10-26 13:19 ` bug#58774: " Jean Louis 2022-10-26 13:19 ` Jean Louis 2022-10-26 13:55 ` Andreas Schwab 2022-10-26 17:36 ` Jean Louis 2022-10-27 7:58 ` Andreas Schwab 2022-10-27 8:40 ` Jean Louis 2022-10-27 11:22 ` Andreas Schwab 2022-10-27 11:22 ` Andreas Schwab 2022-10-27 11:23 ` Dr. Arne Babenhauserheide 2022-10-27 11:23 ` Dr. Arne Babenhauserheide 2022-10-27 8:40 ` Jean Louis 2022-10-27 7:58 ` Andreas Schwab 2022-10-26 17:36 ` Jean Louis 2022-10-26 13:55 ` Andreas Schwab 2022-10-26 7:59 ` Jean Louis 2022-10-26 7:59 ` Jean Louis 2022-10-25 23:03 ` Ihor Radchenko 2022-10-26 6:07 ` bug#58774: " Stefan Kangas 2022-10-26 6:52 ` Ihor Radchenko 2022-10-26 6:52 ` Ihor Radchenko 2022-10-26 8:24 ` Jean Louis 2022-10-26 8:24 ` Jean Louis 2022-10-26 20:22 ` indieterminacy 2022-10-26 20:22 ` indieterminacy 2022-10-26 11:30 ` Dr. Arne Babenhauserheide 2022-10-26 11:30 ` Dr. Arne Babenhauserheide 2022-10-26 21:41 ` Tim Cross 2022-10-27 10:43 ` Dr. Arne Babenhauserheide 2022-10-26 13:15 ` Stefan Kangas 2022-10-26 13:15 ` Stefan Kangas 2022-10-26 8:21 ` Jean Louis 2022-10-26 8:21 ` Jean Louis 2022-10-26 17:07 ` Max Nikulin 2022-10-26 17:07 ` Max Nikulin 2022-10-26 18:37 ` Jean Louis 2022-10-26 18:37 ` Jean Louis 2022-10-26 21:16 ` Dr. Arne Babenhauserheide 2022-10-26 21:16 ` Dr. Arne Babenhauserheide 2022-10-27 4:25 ` tomas 2022-10-27 11:10 ` Dr. Arne Babenhauserheide 2022-10-26 21:56 ` indieterminacy 2022-10-26 21:56 ` indieterminacy 2022-10-26 20:00 ` Tim Cross 2022-10-26 6:07 ` Stefan Kangas 2022-10-25 22:13 ` Ag Ibragimov 2022-10-26 8:28 ` Jean Louis 2022-10-26 13:00 ` Rudolf Adamkovič 2022-10-26 13:42 ` bug#58774: " Jean Louis 2022-10-26 13:42 ` Jean Louis 2022-10-27 4:55 ` Jean Louis 2022-10-27 4:55 ` Jean Louis 2022-10-27 11:13 ` bug#58774: " Dr. Arne Babenhauserheide 2022-10-27 11:13 ` Dr. Arne Babenhauserheide 2022-10-27 17:41 ` bug#58774: " Jean Louis 2022-10-27 17:41 ` Jean Louis 2022-10-27 21:43 ` bug#58774: " Dr. Arne Babenhauserheide 2022-10-27 21:43 ` Dr. Arne Babenhauserheide 2022-10-27 15:35 ` bug#58774: " Max Nikulin 2022-10-27 17:58 ` Jean Louis 2022-10-27 17:58 ` Jean Louis 2022-10-27 21:49 ` Dr. Arne Babenhauserheide 2022-10-27 21:49 ` Dr. Arne Babenhauserheide 2022-10-27 18:25 ` Jean Louis 2022-10-27 18:25 ` Jean Louis 2022-10-27 19:53 ` Quiliro Ordóñez 2022-10-27 19:53 ` Quiliro Ordóñez 2022-10-27 19:58 ` Quiliro Ordóñez 2022-10-27 19:58 ` Quiliro Ordóñez 2022-10-27 21:57 ` Dr. Arne Babenhauserheide 2022-10-27 22:18 ` Jean Louis 2022-10-27 22:18 ` Jean Louis 2022-10-27 23:14 ` Dr. Arne Babenhauserheide 2022-10-27 23:14 ` Dr. Arne Babenhauserheide 2022-10-27 23:20 ` Ihor Radchenko 2022-10-27 23:20 ` Ihor Radchenko 2022-10-28 8:28 ` Dr. Arne Babenhauserheide 2022-10-28 8:28 ` Dr. Arne Babenhauserheide 2022-11-02 4:09 ` Ihor Radchenko 2022-11-02 4:09 ` Ihor Radchenko 2022-10-27 21:57 ` Dr. Arne Babenhauserheide 2022-10-27 15:35 ` Max Nikulin 2023-09-02 8:53 ` Stefan Kangas
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=Y1joXLgNkvNH2ugH@protected.localdomain \ --to=bugs@gnu.support \ --cc=58774@debbugs.gnu.org \ --cc=arne_bab@web.de \ --cc=emacs-orgmode@gnu.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this external index https://git.savannah.gnu.org/cgit/emacs.git https://git.savannah.gnu.org/cgit/emacs/org-mode.git This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.