Tell me about PaperCut's security

KB Home   |   Tell me about PaperCut's security

We have pooled our security knowledge and lessons learnt over the past two decades to bring you a new white paper: Securing your Print System. This paper provides practical and tested advice on how to secure your print system end-to-end, from before a print job is printed, through securing the print workflow, all the way to safeguarding your printed documents. This white paper continues to be improved and expanded upon, drawing from our ongoing research, as well as through feedback sought directly from industry experts.

PaperCut NG and PaperCut MF have been developed from day one with security in mind. With its roots in education and with the full understanding that college kids “like to hack”, our software’s development process has continually focused on security. At the core of this is our open source code-based culture, with large amounts of our source code being made available to customers. The code has been reviewed by leading education organizations, an undertaking which has proven to bear fruit; during one such review in 2008, an independent security expert working for a college discovered an XSRF (Cross-site request forgery) security issue. This issue was fully disclosed and quickly addressed in a subsequent release by the PaperCut development team, accordingly.

At a software-level, PaperCut NG and PaperCut MF leverage Active Directory security groups for access control. Administrators can be setup with different levels of access. For example, system administrators may have access to all application features, whilst office staff could be limited to running reports and accessing only a subset of all features, such as Shared Account management. PaperCut NG and PaperCut MF use SSL/HTTPS for communication and remote web based administration, ensuring sensitive data like passwords and account information is secured over the network, and session cookies are securely flagged so as to prevent their interception or modification for malign purposes. Internal passwords, if used, are stored in a BCrypt hashed format which is seeded by username and salted with a random salt. All security related development is internally assessed and R&D is conducted to ensure we’re meeting best practice.

PaperCut NG and PaperCut MF also leverage a number of 3rd party components such as the Jetty HTTP Server, Apache Tapestry, Ghost Trap, and the Apache Derby database. PaperCut actively works with the open source community backing these projects and has reported and assisted with bugs and issues found over the years. The security of these 3rd party components is actively monitored, and any resulting security implications relevant to our software are openly addressed. The PaperCut development team has also worked to find security problems within copier/MFP firmware, and has teamed with leading vendors to address these issues as found.

PaperCut NG and PaperCut MF are developed in line with security best practices such as CERT Coding Standards, OWASP Top 10, and Oracle Java Security Guidelines. A number of our larger university customers have also had our applications subjected to full PCI Security Audits prior to deployment for handling online payments.

Our Security Response team regularly reviews prospective and emerging security threats, and proactively works to add new (and harden existing) security features in line with best practice. As an example, support for HTTP Strict Transport Security (HSTS) was delivered in PaperCut NG and PaperCut MF version 17.1, in accordance with Memorandum M-15-13. M-15–13 dictates that publically facing United States federal websites and web services must enforce secure connections over HTTPS, with HSTS included as a key requirement, so this addition has allowed US government bodies to run PaperCut NG or PaperCut MF and remain legally compliant. Another example would be the Ghost Trap project; a best practice security related project instigated by PaperCut. The aim is to bring best-of-breed security to the Ghostscript interpreter by sandboxing it, utilising similar technology to that as featured in Google’s Chrome web browser.

The document watermarking feature included in PaperCut NG and PaperCut MF can be used to inject a cryptographically generated unique digital signature into each printed page. This allows physical printing in highly secure environments to be traceable from the paper product back to the originating user and printer, rendering the direct dissemination of confidential information a much more difficult proposition.

See also


Categories: Security, Architecture


Keywords: security policy, security management

Comments

Share your findings and experience with other PaperCut users. Feel free to add comments and suggestions about this Knowledge Base article. Please don't use this for support requests.

Article last modified on May 16, 2017, at 03:37 AM
Printable View   |   Article History   |   Edit Article