When's the last time you heard of malicious code in a Microsoft Office file?  
No recent version will run macro code without warning and default disabling on 
load.  I would expect mail clients to also be circumspect about allowing direct 
opening of document files provided as attachments.

I think the recommendation for those, for the wary, would be to allow Zip and 
encourage people to package anything simpler than an image that way.  Of course 
images and PDFs have exploits too.

Perhaps the truly-safe cases are only text and zip?

I don't know about you, but I also only receive e-mail in plaintext.

 - Dennis

-----Original Message-----
From: Eike Rathke [mailto:[email protected]] 
Sent: Wednesday, August 31, 2011 12:46
To: [email protected]
Subject: Re: [ooo-user] was RE: [email protected] [Was: Re: [Discussion] 
[email protected]]

Hi Marcus,

On Wednesday, 2011-08-31 20:56:16 +0200, Marcus (OOo) wrote:

> For ooo-support@ files like doc, xls, ppt, odt, ods, odp will be
> most important.

I'd certainly not allow MS binary files as potential malicious code
carriers.

> But also jpg, png, gif for screenshots could be
> important. Additionally maybe pdf.

pdf is fine.

  Eike

-- 
 PGP/OpenPGP/GnuPG encrypted mail preferred in all private communication.
 Key ID: 0x293C05FD - 997A 4C60 CE41 0149 0DB3  9E96 2F1A D073 293C 05FD

Reply via email to