https://bugzilla.novell.com/show_bug.cgi?id=796588 https://bugzilla.novell.com/show_bug.cgi?id=796588#c1 Johannes Meixner <jsmeix@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Found By|--- |Community User Resolution| |UPSTREAM --- Comment #1 from Johannes Meixner <jsmeix@suse.com> 2013-01-03 18:09:38 CET --- Please report it to CUPS upstream at http://www.cups.org/ Preferably post an URL to your CUPS upstream report here as reference. See https://bugzilla.novell.com/page.cgi?id=fields.html#status ------------------------------------------------------------------- UPSTREAM The bug exists upstream. "Responsibility for a bug is said to lie upstream when it is not caused through the distribution's porting efforts." (See the "Software Development" section of http://en.wikipedia.org/wiki/Upstream_(computer_science).) ------------------------------------------------------------------- I think this is a special case that happens only when you print via local queues on the client systems that use the ipp backend to send print jobs to the server. In my environment I can print well with CUPS 1.5.4 on my client workstation to a CUPS 1.3.9 server both via CUPS Browsing and via a so called "client-only configuration" see "Configuring CUPS <= 1.5 in the Network" in http://en.opensuse.org/SDB:CUPS_in_a_Nutshell For printing directly on network printers it is recommended no to use the ipp backend but the socket or lpd backends, see http://www.cups.org/documentation.php/doc-1.5/network.html and http://en.opensuse.org/SDB:Printing_via_TCP/IP_network Furthermore the "Table 2: IPP URI Options" in http://www.cups.org/documentation.php/doc-1.5/network.html shows that the ipp backend should privide a version option to specify the ipp protocol version - perhaps "version=1.0" helps in your particular case. -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.