11
11
.\" 2. Redistributions in binary form must reproduce the above copyright
12
12
.\" notice, this list of conditions and the following disclaimer in the
13
13
.\" documentation and/or other materials provided with the distribution.
14
.\" 3. All advertising materials mentioning features or use of this software
15
.\" must display the following acknowledgement:
16
.\" This product includes software developed by the University of
17
.\" California, Berkeley and its contributors.
18
.\" 4. Neither the name of the University nor the names of its contributors
14
.\" 3. Neither the name of the University nor the names of its contributors
19
15
.\" may be used to endorse or promote products derived from this software
20
16
.\" without specific prior written permission.
42
38
The strategy used to maintain protected
43
39
spooling areas is as follows:
45
The spooling area is writable only by a \fIdaemon\fP user
46
and \fIdaemon\fP group.
48
The \fIlpr\fP program runs set-user-id to \fIroot\fP and
49
set-group-id to group \fIdaemon\fP. The \fIroot\fP access permits
50
reading any file required. Accessibility is verified
51
with an \fIaccess\fP\|(2) call. The group ID
52
is used in setting up proper ownership of files
53
in the spooling area for \fIlprm\fP.
55
Control files in a spooling area are made with \fIdaemon\fP
41
The spooling area is writable only by \fIroot\fP and
42
and the \fIdaemon\fP group.
44
The \fIlpr\fP and \fIlprm\fP programs run set-user-id to user \fIdaemon\fP and
45
set-group-id to group \fIdaemon\fP.
47
The \fIlpc\fP and \fIlpq\fP programs run set-group-id to group \fIdaemon\fP
48
to access spool files.
50
Control and data files in a spooling area are made with \fIdaemon\fP
56
51
ownership and group ownership \fIdaemon\fP. Their mode is 0660.
57
This insures control files are not modified by a user
52
This ensures control files are not modified by a user
58
53
and that no user can remove files except through \fIlprm\fP.
60
The spooling programs,
61
\fIlpd\fP, \fIlpq\fP, and \fIlprm\fP run set-user-id to \fIroot\fP
62
and set-group-id to group \fIdaemon\fP to access spool files and printers.
64
The printer server, \fIlpd\fP,
65
uses the same verification procedures as \fIrshd\fP\|(8C)
66
in authenticating remote clients. The host on which a client
67
resides must be present in the file /etc/hosts.equiv or /etc/hosts.lpd and
68
the request message must come from a reserved port number.
70
In practice, none of \fIlpd\fP, \fIlpq\fP, or
71
\fIlprm\fP would have to run as user \fIroot\fP if remote
72
spooling were not supported. In previous incarnations of
73
the printer system \fIlpd\fP ran set-user-id to \fIdaemon\fP,
74
set-group-id to group \fIspooling\fP, and \fIlpq\fP and \fIlprm\fP ran
75
set-group-id to group \fIspooling\fP.
55
The printer server, \fIlpd\fP, runs as \fIroot\fP but spends most
56
of its time with the effective user-id set to \fIdaemon\fP and the
57
effective group-id set to \fIdaemon\fP. As a result, spool files
58
it creates belong to user and group \fIdaemon\fP. \fILpd\fP uses
59
the same verification procedures as \fIrshd\fP\|(8) in authenticating
60
remote clients. The host on which a client resides must be present
61
in the file /etc/hosts.equiv or /etc/hosts.lpd and the request
62
message must come from a reserved port number.