Bullet 1 in the initial posting is one problem, bullet 2 and 3 another problem.
To fix bullet 1, a solution is to treat the device nodes like scanner or sound device nodes: Permissions 0660, group ownership being a group where only users who are allowed to use the desktop are members (esp. no system users, ex. group "scanner" under Ubuntu), or even better a group where only the user currently logged in on the desktop is member (PAM could change group ownership to the default group of the current desktop user, as done in Mandriva). The owner should be the "lp" user, so that the user "lp" (the user as which CUPS backends are running by default) can access the devices without being in the "scanner" (or whatever) group. This brings the device access to the same security level as standalone scanners are currently. Higher security is probably only possible by controlling the devices with a daemon like the former hpiod. To fix 2 and 3 the daemon should either be started by an init script and kept running permanently or it should be somehow invoked with the rights of a neutral, unprivileged user. SUID "hplip" for example, and hplip should be member of appropriate groups so that hpssd has access rights only to things which it is supposed to access. The unprivileged user should not be "lp" for security reasons. -- needs a proper daemon or cupsys integration https://bugs.launchpad.net/bugs/149045 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs