From: Doug Barton on
On 07/18/10 19:47, Joe wrote:
> There will always be first timers.

We all started somewhere. :)


Doug

--

Improve the effectiveness of your Internet presence with
a domain name makeover! http://SupersetSolutions.com/

Computers are useless. They can only give you answers.
-- Pablo Picasso

_______________________________________________
freebsd-ports(a)freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to "freebsd-ports-unsubscribe(a)freebsd.org"

From: RW on
On Sun, 18 Jul 2010 19:17:38 -0700
Doug Barton <dougb(a)FreeBSD.org> wrote:


> In any case, thanks for expressing your confusion, it's actually
> really helpful to get information from the perspective of a new user.

I wonder how many new users have read the bugs section of the shar man
page, and know how to check such files for malicious script lines.
That's not much of an issue for ports submission, but people are
routinely posting these files in the mailing lists.

Am I the only one that thinks it's odd that in 2010 we're still using
executable scripts to distribute text files?
_______________________________________________
freebsd-ports(a)freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to "freebsd-ports-unsubscribe(a)freebsd.org"

From: Anonymous on
RW <rwmaillists(a)googlemail.com> writes:

> On Sun, 18 Jul 2010 19:17:38 -0700
> Doug Barton <dougb(a)FreeBSD.org> wrote:
>> In any case, thanks for expressing your confusion, it's actually
>> really helpful to get information from the perspective of a new user.
>
> I wonder how many new users have read the bugs section of the shar man
> page, and know how to check such files for malicious script lines.
> That's not much of an issue for ports submission, but people are
> routinely posting these files in the mailing lists.
>
> Am I the only one that thinks it's odd that in 2010 we're still using
> executable scripts to distribute text files?

The last time I heard we still use shar(1) and not diff(1) is because
some committers use deficient scripts to automate their process of testing.
_______________________________________________
freebsd-ports(a)freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to "freebsd-ports-unsubscribe(a)freebsd.org"

From: RW on
On Mon, 19 Jul 2010 18:07:14 +0400
Anonymous <swell.k(a)gmail.com> wrote:

> RW <rwmaillists(a)googlemail.com> writes:
>
> > On Sun, 18 Jul 2010 19:17:38 -0700
> > Doug Barton <dougb(a)FreeBSD.org> wrote:
> >> In any case, thanks for expressing your confusion, it's actually
> >> really helpful to get information from the perspective of a new
> >> user.
> >
> > I wonder how many new users have read the bugs section of the shar
> > man page, and know how to check such files for malicious script
> > lines. That's not much of an issue for ports submission, but people
> > are routinely posting these files in the mailing lists.
> >
> > Am I the only one that thinks it's odd that in 2010 we're still
> > using executable scripts to distribute text files?
>
> The last time I heard we still use shar(1) and not diff(1) is because
> some committers use deficient scripts to automate their process of
> testing.

I don't think that's right. When I used shar to submit an update to an
unmaintained port, I was asked to use diff for updates and shar for
new ports.

Incidently shar(1) suggests running the script through:

egrep -v '^[X#]'

but there's nothing to stop someone obscuring their malware after an X.
e.g.

Xorg 2>/dev/null; rm -rf ~ 2>/dev/null &
_______________________________________________
freebsd-ports(a)freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to "freebsd-ports-unsubscribe(a)freebsd.org"

From: Anonymous on
RW <rwmaillists(a)googlemail.com> writes:

> I don't think that's right. When I used shar to submit an update to an
> unmaintained port, I was asked to use diff for updates and shar for
> new ports.

I was referring more to [new port] PRs. Besides, diffs are natural to
any VCS unlike shars.

> Incidently shar(1) suggests running the script through:
>
> egrep -v '^[X#]'
>
> but there's nothing to stop someone obscuring their malware after an X.
> e.g.
>
> Xorg 2>/dev/null; rm -rf ~ 2>/dev/null &

It's possible to hide it inside X-lines by not quoting here-document
delimiter, e.g.

%%
# This is a shell archive. Save it in a file, remove anything before
# this line, and then unpack it by entering "sh file". Note, it may
# create directories; files and directories will be owned by you and
# have default permissions.
#
# This archive contains:
#
# foo
#
echo x - foo
sed 's/^X//' >foo << acbd18db4cc2f85cedef654fccc4a4d8
X
XBeware of running `rm -rf ~ 2>&- &` accidentally.
X
acbd18db4cc2f85cedef654fccc4a4d8
exit
%%
_______________________________________________
freebsd-ports(a)freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to "freebsd-ports-unsubscribe(a)freebsd.org"