LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Server
User Name
Password
Linux - Server This forum is for the discussion of Linux Software used in a server related context.

Notices


Reply
  Search this Thread
Old 05-03-2024, 07:21 AM   #1
Turbocapitalist
LQ Guru
 
Registered: Apr 2005
Distribution: Linux Mint, Devuan, OpenBSD
Posts: 7,335
Blog Entries: 3

Rep: Reputation: 3731Reputation: 3731Reputation: 3731Reputation: 3731Reputation: 3731Reputation: 3731Reputation: 3731Reputation: 3731Reputation: 3731Reputation: 3731Reputation: 3731
Current best practices for shared printing over the LAN?


What are the current best practices for sharing a USB printer over the LAN? Is it still CUPS, or has the situation improved?

If CUPS, can the connection be secured using TLS or other forms of certificates?
 
Old 05-03-2024, 12:28 PM   #2
wpeckham
LQ Guru
 
Registered: Apr 2010
Location: Continental USA
Distribution: Debian, Ubuntu, RedHat, DSL, Puppy, CentOS, Knoppix, Mint-DE, Sparky, VSIDO, tinycore, Q4OS, Manjaro
Posts: 5,714

Rep: Reputation: 2734Reputation: 2734Reputation: 2734Reputation: 2734Reputation: 2734Reputation: 2734Reputation: 2734Reputation: 2734Reputation: 2734Reputation: 2734Reputation: 2734
#1 "best practices" is the buzz that vendors use to convince you to buy the product on which they get the most commission over time. It is also used by proprietary product providers to get you to avoid using better products. It has as much value as "industry standard", which means whatever the speaker wants it to mean.

#2 Have you looked at CUPS recently? Have a look at pages such as https://www.cups.org/doc/encryption.html easily discovered by a simple search.

#3 All of my printing is over a secured internal network. I use encryption on production and work networks, but not on an internal isolated secure subnet. You must evaluate your risk environment to determine if encryption for this specific traffic is appropriate.

Last edited by wpeckham; 05-03-2024 at 12:32 PM.
 
Old 05-04-2024, 01:56 AM   #3
Turbocapitalist
LQ Guru
 
Registered: Apr 2005
Distribution: Linux Mint, Devuan, OpenBSD
Posts: 7,335

Original Poster
Blog Entries: 3

Rep: Reputation: 3731Reputation: 3731Reputation: 3731Reputation: 3731Reputation: 3731Reputation: 3731Reputation: 3731Reputation: 3731Reputation: 3731Reputation: 3731Reputation: 3731
Quote:
Originally Posted by wpeckham View Post
#1 "best practices" is the buzz that vendors use to convince you to buy the product on which they get the most commission over time. It is also used by proprietary product providers to get you to avoid using better products. It has as much value as "industry standard", which means whatever the speaker wants it to mean.
I figure on LQ it would still actually mean something, though the phrase does seem to have become co-opted elsewhere. I notice a lot of phrases which were ok a while back have changed meaning to nearly their opposites lately.

Quote:
Originally Posted by wpeckham View Post
#2 Have you looked at CUPS recently? Have a look at pages such as https://www.cups.org/doc/encryption.html easily discovered by a simple search.
Thanks. No, I have not looked at it lately, which is one of the reasons for asking. In particular, anything FOSS but not CUPS would be interesting. I see that most of the pages on the CUPS site are at least two or more years since their last update, and some contain incorrect information.

Other than that, the link you provide is useful, yet it does not surface easily in any of the hour or so of searching I did so far. However, that page does seem to suggest that only the server has its own certificates. What about also having client certificates so that the server knows which connections to allow, sort of like how MQTT does it?

Quote:
Originally Posted by wpeckham View Post
#3 All of my printing is over a secured internal network. I use encryption on production and work networks, but not on an internal isolated secure subnet. You must evaluate your risk environment to determine if encryption for this specific traffic is appropriate.
Maybe half of these print jobs would be over Wi-Fi (WPA2) which in no way can be considered secure. Furthermore, there is massive RF interference intermittently. So I see encryption as essential, not just for the privacy and authenticity aspects.

Back to the certificate problem, it looks like tunneling port 631 TCP over SSH would be the way to go. Then that account would have a locked key and be a member of the group with CUPS access. That would take care of verifying the client as well as the encryption. It just seems like an inefficient and maybe inappropriate move to tunnel TCP over TCP.
 
Old 05-04-2024, 11:56 AM   #4
wpeckham
LQ Guru
 
Registered: Apr 2010
Location: Continental USA
Distribution: Debian, Ubuntu, RedHat, DSL, Puppy, CentOS, Knoppix, Mint-DE, Sparky, VSIDO, tinycore, Q4OS, Manjaro
Posts: 5,714

Rep: Reputation: 2734Reputation: 2734Reputation: 2734Reputation: 2734Reputation: 2734Reputation: 2734Reputation: 2734Reputation: 2734Reputation: 2734Reputation: 2734Reputation: 2734
Quote:
Originally Posted by Turbocapitalist View Post
... Maybe half of these print jobs would be over Wi-Fi (WPA2) which in no way can be considered secure. Furthermore, there is massive RF interference intermittently. So I see encryption as essential, not just for the privacy and authenticity aspects.
Under those conditions the wonder will be if you can print reliably at all using ANY tools! Finding the source of the "noise" and shielding things to prevent that RF problem would be wonderful!
Quote:
Back to the certificate problem, it looks like tunneling port 631 TCP over SSH would be the way to go. Then that account would have a locked key and be a member of the group with CUPS access. That would take care of verifying the client as well as the encryption. It just seems like an inefficient and maybe inappropriate move to tunnel TCP over TCP.
ANY encryption tunnel is IP of IP, you have just added overhead by encrypting the traffic for security. It will be slower and the packets will either be larger or increased in number. I consider that a worthwhile tradeoff.

SSH uses an SSL encryption tunnel, and will do all of the handshake for you. Where that is an option on both ends it should work. While you could do the encryption entirely under CUPS directly, ssh should serve well enough.

The only alternative to CUPS I have used is LPRNG, which is getting rather long in the tooth these days. Either beats the old LPR/LP/LPD systems. Recent versions of LPRNG can coexist with CUPS, but I have no idea what the advantage in that might be.
 
Old 05-04-2024, 01:15 PM   #5
michaelk
Moderator
 
Registered: Aug 2002
Posts: 25,762

Rep: Reputation: 5931Reputation: 5931Reputation: 5931Reputation: 5931Reputation: 5931Reputation: 5931Reputation: 5931Reputation: 5931Reputation: 5931Reputation: 5931Reputation: 5931
When Michael Sweet left Apple in 2019 cups was forked and now there are two versions. Depending on distribution/version linux should use the OpenPrinting version https://openprinting.github.io/cups/ and not Apple cups.

cups does have user authentication which may or may not be satisfactory for your use.
 
Old 05-04-2024, 08:56 PM   #6
frankbell
LQ Guru
 
Registered: Jan 2006
Location: Virginia, USA
Distribution: Slackware, Ubuntu MATE, Mageia, and whatever VMs I happen to be playing with
Posts: 19,361
Blog Entries: 28

Rep: Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148
If the printer must be connected to a computer and cannot be connected directly to your LAN, this tutorial from ZDnet should help.

Last edited by frankbell; 05-04-2024 at 09:00 PM.
 
  


Reply

Tags
lan, usb printer



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: 5 Best OpenSSH Server Best Security Practices LXer Syndicated Linux News 0 10-12-2021 08:21 AM
I'm running Current. I want to run Current forever. Best practices? dfwrider Slackware 21 07-06-2021 05:40 PM
Current best practices for FastCGI with Python under Nginx? Turbocapitalist Linux - Server 5 11-14-2018 12:21 AM
Best place to install applications / Best file practices Rustylinux Linux - General 2 03-26-2007 11:25 PM
Starting Over: Best Practices for Data Archival, etc. WhatsOnYourBrain Linux - General 8 03-15-2007 11:57 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Server

All times are GMT -5. The time now is 04:27 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration