Printer Security Advances

 
 
By Larry Seltzer  |  Posted 2007-07-06 Email Print this article Print
 
 
 
 
 
 
 

Opinion: Printer companies actually do pay attention to security these days. Security philosophy isn't as settled as it is in other areas.

If youre in IT in a big company and youre concerned about printer security, good for you. I think caring enough to work on it is the biggest part of the solution. After my first story on the subject of printer hacking I got a lot of e-mail with printer security horror stories. I ended on a note of skepticism that truly its a significant problem and thats still how I feel. I also get the sense, just as with computers, the newer ones are safer than the older ones.

This article about Konica Minoltas latest MFP gives you an idea of what some printer vendors are doing about security. MFPs (multi-function printers) are becoming more popular in the enterprise (or so the printer vendors tell me) and they raise a number of special security issues that dont apply to print-only printers.

I had an interesting conversation with Randy Cusick, a technical marketing manager at Xerox who has dealt with these matters, especially with respect to MFPs. These are, of course, printers with other functions built around them, and these other functions bring their own potential for vulnerability.

Pedro Pereira thinks that Xerox, whose future was once in question, has made a comeback and is gunning for the SMB channel. Click here to read more.

Some of the potential for vulnerability is relatively obvious, such as physical authentication of users at the device. Thus the Konica Minolta units with biometric authentication, for example. And at that point you need to define different user capabilities and manage them; not all users should be able to change printer settings, such as the e-mail address to which alerts are sent. Cusick cited an FBI/Computer Security Institute report saying that more than half of attacks on corporate nets came from an internal source, and an MFP could certainly be such a source.

Konica isnt the only company whose new products are better at this sort of thing than their old ones. Old high-end printers might have been UNIX boxes with FTP still installed, but the new ones are likely to have run through serious security evaluations. For what its worth, many Xerox products have received Common Criteria Certification.

Another important capability is management. Products from big companies are likely to come with SNMP MIBs, and many have their own network management tools as well. HPs Web Jetadmin software allows what they call "fleet management" and includes many security-related features like authentication.

Cusick noted that the early concerns they heard in this area came from government, as they often do. Extreme physical security measures, such as built-in hard-drive wiping, are now widely available in printers from Xerox and others to address some of their concerns. Xerox actually has a fee-based service for printer retirement in which they will physically remove the hard disk and present it to the client.

Print-only devices, such as my own Xerox Phaser 6180DN, usually dont have any hard disk in them, and this simplifies things somewhat. This may be one reason Cusick says customers want MFPs delivered locked down, and allow the admin to turn functions on as needed. But for simpler printers the customers want functions on by default.

Printers are simpler devices and managers are fairly trusting of them and dont want to have to open up ports. Printers also typically dont have passwords (other than for administration) or important authentication issues other than global on/off access.

MFPs, on the other hand, are filled with important security issues. Xerox does things like run the fax on a separate card on a separate CPU that only interfaces with the rest of the device through standard ITU T.30 protocols. The fax never writes to the hard drive (yes, this limits the storage for faxes, faxes must be stored in RAM).

As with most security issues, the best protection you have is being informed and on top of your own equipment. HP has a good Secure Imaging and Printing Web site with information thats applicable not only to their own products.

Because printers and MFPs dont have a widely appreciated reputation for security issues, they dont often get treated properly. There should be some input from those with security responsibility in printer purchase and management decisions. Even in smaller organizations, administration needs to be aware of the potential. HP told me a story of a K-12 school in which children learned how to use PJL commands to send (ahem!) rude messages to the console.

So it seems to me that everyone is still learning about these issues, but Im pretty upbeat. If IT cares enough about printer security to pay attention to it, the printers will be hard to attack, harder certainly than something else in the enterprise, and that might be enough for them to be left alone.

Security Center Editor Larry Seltzer has worked in and written about the computer industry since 1983. Check out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers blog Cheap Hack More from Larry Seltzer
 
 
 
 
Larry Seltzer has been writing software for and English about computers ever since—,much to his own amazement—,he graduated from the University of Pennsylvania in 1983.

He was one of the authors of NPL and NPL-R, fourth-generation languages for microcomputers by the now-defunct DeskTop Software Corporation. (Larry is sad to find absolutely no hits on any of these +products on Google.) His work at Desktop Software included programming the UCSD p-System, a virtual machine-based operating system with portable binaries that pre-dated Java by more than 10 years.

For several years, he wrote corporate software for Mathematica Policy Research (they're still in business!) and Chase Econometrics (not so lucky) before being forcibly thrown into the consulting market. He bummed around the Philadelphia consulting and contract-programming scenes for a year or two before taking a job at NSTL (National Software Testing Labs) developing product tests and managing contract testing for the computer industry, governments and publication.

In 1991 Larry moved to Massachusetts to become Technical Director of PC Week Labs (now eWeek Labs). He moved within Ziff Davis to New York in 1994 to run testing at Windows Sources. In 1995, he became Technical Director for Internet product testing at PC Magazine and stayed there till 1998.

Since then, he has been writing for numerous other publications, including Fortune Small Business, Windows 2000 Magazine (now Windows and .NET Magazine), ZDNet and Sam Whitmore's Media Survey.
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Rocket Fuel