cups userspace -- trusted programs?

Linda Knippers linda.knippers at hp.com
Wed May 31 22:54:48 UTC 2006


Hi Mike,

Matt is away this week so he'll probably have a more detailed response
but in the meantime, I have a few comments/questions.

> I'm wondering if the intent of the cups userspace tools are to be 
> trusted programs?  Specifically I'm curious about cupsaccept, cupsreject,
> cupsenable and cupsdisable. The reason I ask is because if they are 
> supposed to be trusted programs, they don't generate unique audit 
> messages like other programs.

I don't think these programs are trusted programs because all they do
is talk to the cupsd, which is a trusted program.  The cupsd makes
all the decisions and takes all the actions.  These programs (really
just 'accept' as the rest I believe are symlinks to it) are not setuid
and do not make any access or other decisions, at least that's my
understanding.

> Personally, I think these tools should generate messages since they are 
> a source for leaking information, and therefore should be restricted to 
> administrators.

I think the real question is which actions should be audited.  Should
enabling/disabling a printer queue be audited?  I don't believe its
required to be and if its not security relevant, do we want it in the
audit logs?  Cups has a comprehensive logging facility so there is all
kinds of information about happening with the print subsystem that I
don't think we want to replicate in the audit logs, but perhaps there
are more actions that would make sense to audit than we currently are
auditing.

Do you have specific examples of actions that you think should be
audited aside from what's required for LSPP?

-- ljk
> 
> Thanks,
> Mike
> 




More information about the Linux-audit mailing list