On Mon, 2010-12-06 at 21:50 +0000, Richard W.M. Jones wrote: > Still not seeing how /etc/iptables.d wouldn't work ... Here is how: When I ask CUPS for a list of network printers, it runs the backends in /usr/lib/cups/backend. One of those is /usr/lib/cups/backend/snmp, which: a) binds to a local unprivileged UDP port b) sends a broadcast SNMP request c) listens for (unicast) responses to that request We don't hear any of those responses because they are not recognised as "related" by the kernel. The iptables rules drop them. If the CUPS snmp backend could say to "the firewall", "hey, please allow responses on this port I've got for the next few seconds" -- which can be controlled using PolicyKit -- then this network discovery would finally work. There's no way to know the local UDP port in advance so /etc/iptables.d-like systems all fail here. Tim. */
Attachment:
signature.asc
Description: This is a digitally signed message part
-- devel mailing list devel@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/devel