|
Message-ID: <20170517162923.3855.16F61A97@matica.foolinux.mooo.com> Date: Wed, 17 May 2017 09:40:57 -0700 From: Ian Zimmerman <itz@...mate.net> To: oss-security@...ts.openwall.com Subject: rxvt-unicode "insecure" setting [Was: terminal emulators' processing of escape sequences] This is a bit tangential to this particular thread, but clearly security-related. Quoting "man urxvt", section "RESOURCES": insecure: boolean Enables "insecure" mode. Rxvt-unicode offers some escape sequences that echo arbitrary strings like the icon name or the locale. This could be abused if somebody gets 8-bit-clean access to your display, whether through a mail client displaying mail bodies unfiltered or through write(1) or any other means. Therefore, these sequences are disabled by default. (Note that many other terminals, including xterm, have these sequences enabled by default, which doesn't make it safer, though). You can enable them by setting this boolean resource or specifying -insecure as an option. At the moment, this enables display-answer, locale, findfont, icon label and window title requests. My ~/.Xresources file, trimmed. I am sure it is getting read, because of the cutchars, colors and geometry settings: Rxvt.background: seashell Rxvt.color10: green4 Rxvt.color11: orange2 Rxvt.color14: cyan4 Rxvt.color2: green3 Rxvt.color3: orange Rxvt.color6: cyan3 Rxvt.cutchars: '"!' &()*,;<=>?@[]^{|} #$%+-./: Rxvt.foreground: Gray40 Rxvt.geometry: 103x36 Rxvt.saveLines: 200 Rxvt.visualBell: on URxvt.font: x:-misc-fixed-medium-r-semicondensed--13-*-*-*-*-*-iso10646-1 URxvt.perl-ext-common: URxvt.insecure: false Finally, a chunk of my ~/.bashrc: # If this is an xterm set the title to something informative case "$TERM" in xterm*|rxvt*) PROMPT_COMMAND="echo -ne \"\E]0; $$ ${LOGNAME}@...OSTNAME}:\${PWD} \a\"" ;; *) ;; esac And ... it works! Why? -- Please *no* private Cc: on mailing lists and newsgroups Personal signed mail: please _encrypt_ and sign Don't clear-text sign: http://primate.net/~itz/blog/the-problem-with-gpg-signatures.html
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.