Replies: 2 comments 1 reply
-
Hi @jsmeix, thank you for review! I would convert it from "issue" into "discussion", so it may stay open forever and there will be no need to somehow "fix" it and close. |
Beta Was this translation helpful? Give feedback.
-
Thank you for review. My few comments:
Please notice that https://github.com/OpenPrinting/goipp is logically also part of the
When I listen on all network interfaces and then manually reject unwanted incoming connections, it is implementable in few lines of Go code. Listening to the network selectively requires individual listener per every network interface (or, to be more correct, per every IP address of any network interface). It requires dynamic monitoring of IP configuration change, dynamic adding/removing listeners, brrr. A bit overcomplicated, I'd like to avoid this complexity where possible.
Implementing SSL is considerable (at least in theory) but the good design is required. The major concern is management of certificates. I guess the manual management ("put certificate into directory XXX") would be a bit too difficult to understand, so not too much people will use it.
These sessions are only exist with the purpose to match related requests and responses in logs. So this is OK to have limited IDs space. The purpose of this limitation is to keep these numbers relatively small, comfortable for human eyes.
My major concern here is how to implement this stuff so it will work on any Linux distro (at least, any major distro). Not sure they all have the similar settings for groups etc. |
Beta Was this translation helpful? Give feedback.
-
This is only to have you informed.
At SUSE we did a security review of ipp-usb
https://bugzilla.opensuse.org/show_bug.cgi?id=1221671
Here a copy of the findings, see
https://bugzilla.opensuse.org/show_bug.cgi?id=1221671#c6
Beta Was this translation helpful? Give feedback.
All reactions