Hello, On Jun 27 13:32 Henrique de Moraes Holschuh wrote (shortened): > With the new "send it all over the socket in the first place" approach > hpiod, hpssd and the other components now take (which is much easier on us > trying to lock these things down, let me thank you again for switching to > this design even if it is potentially a bit slower than passing around file > handles or filenames in a spool), it should not be too difficult to even > move hpiod and hpssd to true network awareness, so that we could have the > tools talking to hpiod/hpssd on a remote server. This is the ultimate goal > for a GUI-less HPLIP packaging, IMHO.
If hpiod/hpssd become full network accessible services (i.e. accessible from other IPs than 127.0.0.1), we (i.e. the distributors or at least Suse/Novell) have the problem that network accessible services must not run as root because of obvious security reasons. This means that when there is full network support, it must be possible that the services can work as a non-root user (e.g. the usual "lp" user for printing services or perhaps an additional "scan" user for scanner access or perhaps a new "hp" user for all hpiod/hpssd access). Of course a distributor can and will make sure that the regular file and device node permissions are set accordingly so that those non-root user can access what it needs and only what it needs. On the other hand this does not mean that it must be impossible to run hpiod/hpssd as root. For example on a system in a trusted internal network it may be the easiest way to get it all working without thinking about permissions at all. For a self-compiled HPLIP it could be a usage-friendly but security-unfriendly default to run the services as root. It is your (i.e. HP's) decission what you prefer in this case: Be usage-friendly for the price of intrinsic insecurity or be security-friendly for the price of usage-problems. Note that I carefully distinguish between "user-friendly" and "usage-friendly" because an intrinsic insecure system is obviously never ever "user-friendly". Think about when crackers learn about that on systems with a self-compiled HPLIP there are network services runing as root and sooner or later there will be a successful attack and then it becomes known that it is HP who is to blame for hundreds of cracked systems because of insecure HP services ... Just an idea: Perhaps it is easiest to leave hpiod/hpssd running as root and keep it listening only on 127.0.0.1 and have an additional new hpproxy service which does not run as root and which listens on 0.0.0.0 on a fixed registred port? (There is no "hplip" at http://www.iana.org/assignments/port-numbers). Of course all sercurity related stuff must be done in hpproxy (e.g. check for allowed source IPs, do additional optional user authentication, check if data is valid, ...) because it wouldn't be more secure when hpproxy simply forwards any arbitrary stuff to hpiod/hpssd which are running as root. But this would ad least keep the non-localhost network stuff well seperated from the localhost network stuff. E.g. the user could simply stop hpproxy and there is no longer any non-localhost network stuff which he must worry about. And for a self-compiled HPLIP, hpiod/hpssd could still work as usual and hpproxy would not be activated by default so that even a self-compiled HPLIP would be o.k. on a home-user system. Kind Regards Johannes Meixner -- SUSE LINUX Products GmbH, Maxfeldstrasse 5 Mail: [EMAIL PROTECTED] 90409 Nuernberg, Germany WWW: http://www.suse.de/ Using Tomcat but need to do more? Need to support web services, security? Get stuff done quickly with pre-integrated technology to make your job easier Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642 _______________________________________________ HPLIP-Devel mailing list HPLIP-Devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/hplip-devel