[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-relays] relays and CUPS vulnerabilities
There are some very significant recent CVEs out for CUPS, the unix
printing system.
https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=cups
It's an ideal moment to remind relay operators that a Tor node, relay or
bridge, should be a single-purpose internet server.
Running alternate internet services is a bad idea. The node should have
the minimum packages installed for the purpose of running a node. More
packages means more possible vulnerabilities.
Needless to say, a CUPS server listening on 631/tcp or 631/udp while
providing Tor access is a bad idea.
g
--
43C2 85B0 41B6 4AC1 0E02 2767 7092 AEB3 40B0 C804
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays