Re: 20030112 breaks dvips -o "|lpr"

2003-01-20 Thread Tomas G. Rokicki
Thanks for all the feedback guys.

I had a disk fail on me (IBM Deskstar 60GB) so I lost my work machine.
I'm rebuilding it now, but this set me back a day.  [Stupid me, not
doing backups, also lost a bunch of photos and other things I had
been doing.]

I will try to finish it up during the evenings; there are still some
important changes coming with regards to the encoding issues pointed
out earlier.

After I have the changes in I will bump the version number, to 5.94.

Once again, my most sincere and humble apologies for the delays.

-tom



Re: 20030112 breaks dvips -o "|lpr"

2003-01-16 Thread Tomas G. Rokicki
Okay, so if we agree the solution is:

1.  Allow the output pipe to be opened in all cases

and

2.  Never search for configuration files (config.ps, config.printer,
and .dvipsrc are the only ones critical here) in the current
directory

then I've got some questions about dvips vs kpathsea.  Who currently
is responsible for defining the default paths for dvips?  Is this
still in dvips, or is this in texconfig, or kpathsea?  Is it
simply a matter of changing those defaults, wherever they live?

-tom



Re: 20030112 breaks dvips -o "|lpr"

2003-01-16 Thread Tomas G. Rokicki
Dvips has *always* searched in the current directory first for virtually
all files, config files, tfm files, vf files, figure files, header files,
etc.  So all the blame on that goes to me.  This was intended as a
feature; users sometimes want to override something, much like TeX
searches for input files starting in the current directory and then
moving on to the system directories and so on.

>From a security standpoint, this is clearly bad, as you say.  But I'm
not sure disabling search for config files in . is, at this point,
a great solution.  I'm sure many people use this extensively, and
we will totally break them if we make this change.  For instance, what
about .dvipsrc, which is *intended* as a place for the user to specify
default config options for dvips, and it is searched for in $HOME,
which is often the current working directory of people running dvips
as well?

Man, what a mess.



Re: 20030112 breaks dvips -o "|lpr"

2003-01-16 Thread Tomas G. Rokicki
> only config files in "trusted paths" can be used for external commands etc.

Sounds like we're getting closer to Perl's taint mode.

In any case, this is the sort of thing we'd have to depend on
kpathsea to provide, right?  I don't see that happening in this
release.  Yet, not allowing

   o !lpr -P foo

in a configuration file due to security restrictions is disappointing.

Note that dvips *does* use the current directory in most of its search
paths, so anyone can drop a config.ps as part of a dvi tarball that
will be picked up by dvips.  (Which is another issue, since security
can be disabled in the config.ps, which is why originally dvips would
never let you turn security *off* in config.ps . . .)

Arghhh.

-tom



Re: 20030112 breaks dvips -o "|lpr"

2003-01-16 Thread Tomas G. Rokicki
That's a very good point; if the *user* specifices -o "|..." that
*should* override the security setting.

What if the -o option comes from a config file; should that override
the security setting?  Probably not, because the override could
come from a .dvipsrc file created by a malicious program . . .

Gosh, there is lots of stuff that needs to be fixed in dvips; I'm
very sorry for (possibly) holding up a new release.  I'll make sure
to spend some time this weekend on it . . .

-tom



Re: finally: new teTeX pretest (20011103)

2001-11-04 Thread Tomas G. Rokicki

I'd be content to apply that patch (to the TeXLive tree, which is the
current dvips `source' as far as I'm concerned) unless I hear any
objections . . .

-tom




Re: [tex-k] sourceforge for texk?

2001-06-06 Thread Tomas G. Rokicki


I don't think you'll have trouble getting the authors to agree if you
can contact all the authors.  :-(  I wonder if there is a way to lock
down the parts for which you do not [yet] have author permission?

This is exciting, I have to admit.

-tom




Re: [tex-k] sourceforge for dvipsk?

2001-06-06 Thread Tomas G. Rokicki


Yes yes yes!  That would be great!  I'd definitely encourage all
of TeX Live to be on sourceforge.  Sourceforge is based on cvs, is
it not?  I really think that's the way to go.

Perforce is better than sourceforge at most things (I find), mostly
having to do with keeping multi-file changes together, but using
CVS is fine if we can get it out there on some public site . . .

-tom




Re: [tex-k] secure mode of dvips should be default

2001-06-02 Thread Tomas G. Rokicki

Thanks, everyone, for taking such quick action on this.

-tom




Re: [tex-k] secure mode of dvips should be default

2001-06-01 Thread Tomas G. Rokicki

Yeah, but people don't distribute .dvi files, do they?

-tom




Re: [tex-k] secure mode of dvips should be default

2001-06-01 Thread Tomas G. Rokicki

Thanks for the email on dvips security!

Can you explain why secure mode should be on by default?
In other words, how might I run TeX and/or dvips over
untrusted code?  Provide me with a convincing attack
scenario.  A time bomb in some macro source somewhere that
gets included into a distribution?

Certainly if someone embeds dvips into some sort of automatic,
MIME-driven viewer, yes, secure mode should be set on, but
for command-line use?

Thanks!

-tom




Re: Xdvi: shell-command specials don't work.

2000-05-16 Thread Tomas G. Rokicki

I think that, it may actually be possible to support them if they fit
some really simple grammar of how they are used, or else automatic
conversion . . . that is, config.ps could say something like

allow command jpg2eps %f -

where %f means file name with no shell metacharacters or spaces or some
such.

But this obviously gets convoluted.

What we really want is something like the standard mime content handlers.

-tom




Re: Xdvi: shell-command specials don't work.

2000-05-16 Thread Tomas G. Rokicki

In general, it may be time to pull all those shell escapes from the
dviware, including dvips . . . I haven't heard of anyone abusing
them, but they are a danger.

tom