There is a post on the new site re printing security (see below). Does anyone have experience with Possible Solution 1? We're hoping to get a few more pointers, maybe some extra documentation, some "here's how you avoid these pitfalls". Thanks!
X2goServer == CUPS Server, latest implementation (as of 20110909):
cups-x2go CUPS backend runs as root
as root the backend launches x2goprint (without sudo!!!)
x2goprint script changes owner ship of PDF file and pushes it into SSHFS share towards the X2go client.
using X2go printing locally (X2go server == CUPS server) then security (sudo) is not an issue any more(?)
Nope still is (not a big one, though): Using CUPS the user can easily be faked, allowing to fill someone else's quota or print at their home printer.
X2goServer != CUPS Server:
The Cups-server connects the x2go-Server as x2goprint-user using ssh-key auth.
x2goprint-user executes sudo to change the ownership of the PDF file and pushes it into SSHFS share towards the X2go client.
This script can currently be exploited.
If someone becomes x2goprint he might become root.