Bullet 1 in the initial posting is one problem, bullet 2 and 3 another
problem.

To fix bullet 1, a solution is to treat the device nodes like scanner or
sound device nodes: Permissions 0660, group ownership being a group
where only users who are allowed to use the desktop are members (esp. no
system users, ex. group "scanner" under Ubuntu), or even better a group
where only the user currently logged in on the desktop is member (PAM
could change group ownership to the default group of the current desktop
user, as done in Mandriva). The owner should be the "lp" user, so that
the user "lp" (the user as which CUPS backends are running by default)
can access the devices without being in the "scanner" (or whatever)
group. This brings the device access to the same security level as
standalone scanners are currently. Higher security is probably only
possible by controlling the devices with a daemon like the former hpiod.

To fix 2 and 3 the daemon should either be started by an init script and
kept running permanently or it should be somehow invoked with the rights
of a neutral, unprivileged user. SUID "hplip" for example, and hplip
should be member of appropriate groups so that hpssd has access rights
only to things which it is supposed to access. The unprivileged user
should not be "lp" for security reasons.

-- 
needs a proper daemon or cupsys integration
https://bugs.launchpad.net/bugs/149045
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to