Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20170517162923.3855.16F61A97@matica.foolinux.mooo.com>
Date: Wed, 17 May 2017 09:40:57 -0700
From: Ian Zimmerman <itz@...mate.net>
To: oss-security@...ts.openwall.com
Subject: rxvt-unicode "insecure" setting [Was: terminal emulators' processing
 of escape sequences]

This is a bit tangential to this particular thread, but clearly
security-related.

Quoting "man urxvt", section "RESOURCES":

 insecure: boolean

  Enables "insecure" mode. Rxvt-unicode offers some escape sequences
  that echo arbitrary strings like the icon name or the locale. This
  could be abused if somebody gets 8-bit-clean access to your display,
  whether through a mail client displaying mail bodies unfiltered or
  through write(1) or any other means. Therefore, these sequences are
  disabled by default. (Note that many other terminals, including xterm,
  have these sequences enabled by default, which doesn't make it safer,
  though).

  You can enable them by setting this boolean resource or specifying
  -insecure as an option. At the moment, this enables display-answer,
  locale, findfont, icon label and window title requests.

My ~/.Xresources file, trimmed.  I am sure it is getting read, because
of the cutchars, colors and geometry settings:

 Rxvt.background: seashell
 Rxvt.color10: green4
 Rxvt.color11: orange2
 Rxvt.color14: cyan4
 Rxvt.color2: green3
 Rxvt.color3: orange
 Rxvt.color6: cyan3
 Rxvt.cutchars: '"!' &()*,;<=>?@[]^{|} #$%+-./:
 Rxvt.foreground: Gray40
 Rxvt.geometry: 103x36
 Rxvt.saveLines: 200
 Rxvt.visualBell: on
 URxvt.font: x:-misc-fixed-medium-r-semicondensed--13-*-*-*-*-*-iso10646-1
 URxvt.perl-ext-common:
 URxvt.insecure: false

Finally, a chunk of my ~/.bashrc:

 # If this is an xterm set the title to something informative
 case "$TERM" in
         xterm*|rxvt*)
             PROMPT_COMMAND="echo -ne \"\E]0; $$ ${LOGNAME}@...OSTNAME}:\${PWD} \a\""
             ;;
         *)
             ;;
 esac

And ... it works!

Why?

-- 
Please *no* private Cc: on mailing lists and newsgroups
Personal signed mail: please _encrypt_ and sign
Don't clear-text sign:
http://primate.net/~itz/blog/the-problem-with-gpg-signatures.html

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.