[jira] [Commented] (GUACAMOLE-880) Obfuscation of guacamole client protocol

2019-09-17 Thread Nick Couchman (Jira)


[ 
https://issues.apache.org/jira/browse/GUACAMOLE-880?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16931934#comment-16931934
 ] 

Nick Couchman commented on GUACAMOLE-880:
-

[~bolke]: If you're willing to work on it and want to fork the code and submit 
a pull request, I'm happy to be part of the review process and see if it's 
something worth putting into the code.  My primary concerns for adding 
something like this would be:
* User experience - making sure that normal usage doesn't trigger 
false-positive alerts/alarms/etc.
* Performance - Making sure that such changes are not going to drastically 
impact resource utilization/requirements on either the server or the client.  
I'm most concerned about this from the perspective of the AngularJS application 
within the web browser.

I do think there is a level of practicality that will have to be considered, 
here - yes, multiple gigabytes of data were exfiltrated via an API; however, 
again, the point is that this was assuming the best case scenario for the pen 
tester - that is, they already had valid accounts and access to the data to do 
the test.  I'm not sure that the gravity of the situation is really accurately 
reflected by the pen test.  Layered security would either mitigate, detect, or 
correctly pinpoint the sources of these attacks, and I really do not believe 
that the EU is going to come after someone for GDPR violations simply because 
they use Guacamole and Guacamole doesn't 100% mitigate steganographic attacks.  
If you've properly done defense-in-depth at all layers, I believe that would be 
recognized and accepted by a reasonable governing body like the EU.

> Obfuscation of guacamole client protocol
> 
>
> Key: GUACAMOLE-880
> URL: https://issues.apache.org/jira/browse/GUACAMOLE-880
> Project: Guacamole
>  Issue Type: Wish
>  Components: guacamole-client, guacamole-server
>Reporter: Bolke de Bruin
>Priority: Major
>  Labels: security
>
> One of the reasons we deploy guacamole is to limit data leakage 
> possibilities. We recently had a audit on our infrastructure and it was shown 
> that it was quite easy to leak out data through the guacamole protocol by 
> creating special images inside the desktop and then using mitmproxy (python) 
> and the guacamole python modules to capture the data inside those images.
> In order to limit the attack surface we would like to have obfuscation of the 
> protocol if configured to do so. Of course this could be done by implementing 
> a custom protocol, but it would be nice if Guacamole would have the 
> facilities (hooks) to do this. One could think of allowing a custom function 
> to encrypt/obfuscate the outgoing stream and attach into the javascript that 
> decrypts the stream.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Comment Edited] (GUACAMOLE-880) Obfuscation of guacamole client protocol

2019-09-17 Thread Bolke de Bruin (Jira)


[ 
https://issues.apache.org/jira/browse/GUACAMOLE-880?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16931141#comment-16931141
 ] 

Bolke de Bruin edited comment on GUACAMOLE-880 at 9/17/19 7:23 AM:
---

[~Why4ArtThou] Unfortunately, I think you misunderstand the gravity of the 
situation. It was shown that multiple gigabytes could be exfiltrated in an 
automated fashion by using the python api within an hour. There was nothing 
visually required on the client side. I am aware of precious developer time: I 
am a Apache committer myself and contributor to several projects. The intention 
in this thread is to make 1) people aware if the situation, 2) see if we can 
get to an agreed course of action. This to ensure developer time is not wasted. 
Finally, I am willing to put the time of my team into this or even hire someone 
that could address the isue that we are seeing and then bring it back to the 
community. I think that's worth a bit of discussion right?

[~nick.couch...@yahoo.com] [~mike.jumper] Another avenue we were thinking of is 
to enable a kind of non intrusive Turing test. Ie. by sampling of one uses the 
keyboard and mouse (not capturing keystrokes, but merely statistical tracking) 
we could determine (statistically) if a user is actually human. If not we could 
force reidentification or a real turing test (eg. recaptcha like). This does 
not interfer with the protocol and does not add noise to the images (although 
stenography detection could also trigger a turing test). It would require to be 
able to hook in to the stream (a kind of filter) that is able to trigger the 
follow up. What do you think?


was (Author: bolke):
[~Why4ArtThou] Unfortunately, I think you misunderstand the gravity of the 
situation. It was shown that multiple gigabytes could be exfiltrated in an 
automated fashion by using the python api within an hour. There was nothing 
visually required on the client side. I am aware of precious developer time: I 
am a Apache committer myself and contributor to several projects. The intention 
in this thread is to make 1) people aware if the situation, 2) see if we can 
get to an agreed course of action. This to ensure developer time is not wasted. 
Finally, I am willing to put the time of my team into this or even hire someone 
that could address the isue that we are seeing and then bring it back to the 
community. I think that's worthwhile a bit of discussion right?

[~nick.couch...@yahoo.com] [~mike.jumper] Another avenue we were thinking of is 
to enable a kind of non intrusive Turing test. Ie. by sampling of one uses the 
keyboard and mouse (not capturing keystrokes, but merely statistical tracking) 
we could determine (statistically) if a user is actually human. If not we could 
force reidentification or a real turing test (eg. recaptcha like). This does 
not interfer with the protocol and does not add noise to the images (although 
stenography detection could also trigger a turing test). It would require to be 
able to hook in to the stream (a kind of filter) that is able to trigger the 
follow up. What do you think?

> Obfuscation of guacamole client protocol
> 
>
> Key: GUACAMOLE-880
> URL: https://issues.apache.org/jira/browse/GUACAMOLE-880
> Project: Guacamole
>  Issue Type: Wish
>  Components: guacamole-client, guacamole-server
>Reporter: Bolke de Bruin
>Priority: Major
>  Labels: security
>
> One of the reasons we deploy guacamole is to limit data leakage 
> possibilities. We recently had a audit on our infrastructure and it was shown 
> that it was quite easy to leak out data through the guacamole protocol by 
> creating special images inside the desktop and then using mitmproxy (python) 
> and the guacamole python modules to capture the data inside those images.
> In order to limit the attack surface we would like to have obfuscation of the 
> protocol if configured to do so. Of course this could be done by implementing 
> a custom protocol, but it would be nice if Guacamole would have the 
> facilities (hooks) to do this. One could think of allowing a custom function 
> to encrypt/obfuscate the outgoing stream and attach into the javascript that 
> decrypts the stream.



--
This message was sent by Atlassian Jira
(v8.3.2#803003)


[jira] [Comment Edited] (GUACAMOLE-880) Obfuscation of guacamole client protocol

2019-09-17 Thread Bolke de Bruin (Jira)


[ 
https://issues.apache.org/jira/browse/GUACAMOLE-880?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16931141#comment-16931141
 ] 

Bolke de Bruin edited comment on GUACAMOLE-880 at 9/17/19 7:23 AM:
---

[~Why4ArtThou] Unfortunately, I think you misunderstand the gravity of the 
situation. It was shown that multiple gigabytes could be exfiltrated in an 
automated fashion by using the python api within an hour. There was nothing 
visually required on the client side. I am aware of precious developer time: I 
am a Apache committer myself and contributor to several projects. The intention 
in this thread is to make 1) people aware if the situation, 2) see if we can 
get to an agreed course of action. This to ensure developer time is not wasted. 
Finally, I am willing to put the time of my team into this or even hire someone 
that could address the isue that we are seeing and then bring it back to the 
community. I think that's worthwhile a bit of discussion right?

[~nick.couch...@yahoo.com] [~mike.jumper] Another avenue we were thinking of is 
to enable a kind of non intrusive Turing test. Ie. by sampling of one uses the 
keyboard and mouse (not capturing keystrokes, but merely statistical tracking) 
we could determine (statistically) if a user is actually human. If not we could 
force reidentification or a real turing test (eg. recaptcha like). This does 
not interfer with the protocol and does not add noise to the images (although 
stenography detection could also trigger a turing test). It would require to be 
able to hook in to the stream (a kind of filter) that is able to trigger the 
follow up. What do you think?


was (Author: bolke):
[~Why4ArtThou] Unfortunately, I think you misunderstand the gravity of the 
situation. It was shown that multiple gigabytes could be exfiltrated in an 
automated fashion by using the python api. There was nothing visually required 
on the client side. I am aware of precious developer time: I am a Apache 
committer myself and contributor to several projects. The intention in this 
thread is to make 1) people aware if the situation, 2) see if we can get to an 
agreed course of action. This to ensure developer time is not wasted. Finally, 
I am willing to put the time of my team into this or even hire someone that 
could address the isue that we are seeing and then bring it back to the 
community. I think that's worthwhile a bit of discussion right?

[~nick.couch...@yahoo.com] [~mike.jumper] Another avenue we were thinking of is 
to enable a kind of non intrusive Turing test. Ie. by sampling of one uses the 
keyboard and mouse (not capturing keystrokes, but merely statistical tracking) 
we could determine (statistically) if a user is actually human. If not we could 
force reidentification or a real turing test (eg. recaptcha like). This does 
not interfer with the protocol and does not add noise to the images (although 
stenography detection could also trigger a turing test). It would require to be 
able to hook in to the stream (a kind of filter) that is able to trigger the 
follow up. What do you think?

> Obfuscation of guacamole client protocol
> 
>
> Key: GUACAMOLE-880
> URL: https://issues.apache.org/jira/browse/GUACAMOLE-880
> Project: Guacamole
>  Issue Type: Wish
>  Components: guacamole-client, guacamole-server
>Reporter: Bolke de Bruin
>Priority: Major
>  Labels: security
>
> One of the reasons we deploy guacamole is to limit data leakage 
> possibilities. We recently had a audit on our infrastructure and it was shown 
> that it was quite easy to leak out data through the guacamole protocol by 
> creating special images inside the desktop and then using mitmproxy (python) 
> and the guacamole python modules to capture the data inside those images.
> In order to limit the attack surface we would like to have obfuscation of the 
> protocol if configured to do so. Of course this could be done by implementing 
> a custom protocol, but it would be nice if Guacamole would have the 
> facilities (hooks) to do this. One could think of allowing a custom function 
> to encrypt/obfuscate the outgoing stream and attach into the javascript that 
> decrypts the stream.



--
This message was sent by Atlassian Jira
(v8.3.2#803003)


[jira] [Comment Edited] (GUACAMOLE-880) Obfuscation of guacamole client protocol

2019-09-17 Thread Bolke de Bruin (Jira)


[ 
https://issues.apache.org/jira/browse/GUACAMOLE-880?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16931141#comment-16931141
 ] 

Bolke de Bruin edited comment on GUACAMOLE-880 at 9/17/19 7:22 AM:
---

[~Why4ArtThou] Unfortunately, I think you misunderstand the gravity of the 
situation. It was shown that multiple gigabytes could be exfiltrated in an 
automated fashion by using the python api. There was nothing visually required 
on the client side. I am aware of precious developer time: I am a Apache 
committer myself and contributor to several projects. The intention in this 
thread is to make 1) people aware if the situation, 2) see if we can get to an 
agreed course of action. This to ensure developer time is not wasted. Finally, 
I am willing to put the time of my team into this or even hire someone that 
could address the isue that we are seeing and then bring it back to the 
community. I think that's worthwhile a bit of discussion right?

[~nick.couch...@yahoo.com] [~mike.jumper] Another avenue we were thinking of is 
to enable a kind of non intrusive Turing test. Ie. by sampling of one uses the 
keyboard and mouse (not capturing keystrokes, but merely statistical tracking) 
we could determine (statistically) if a user is actually human. If not we could 
force reidentification or a real turing test (eg. recaptcha like). This does 
not interfer with the protocol and does not add noise to the images (although 
stenography detection could also trigger a turing test). It would require to be 
able to hook in to the stream (a kind of filter) that is able to trigger the 
follow up. What do you think?


was (Author: bolke):
[~Why4ArtThou] Unfortunately, I think you misunderstand the gravity of the 
situation. It was shown that multiple gigabytes could be exfiltrated in an 
automated fashion by using the python api. There was nothing visually required 
on the client side. I am aware of precious developer time: I am a Apache 
committer myself and contributor to several projects. The intention in this 
thread is to make 1) people aware if the situation, 2) see if we can get to an 
agreed course of action. This to ensure developer time is not wasted. Finally, 
I willing to put the time of my team into this or even hire someone that could 
address the isue that we are seeing and then bring it back to the community. I 
think that's worthwhile a bit of discussion right?

[~nick.couch...@yahoo.com] [~mike.jumper] Another avenue we were thinking of is 
to enable a kind of non intrusive Turing test. Ie. by sampling of one uses the 
keyboard and mouse (not capturing keystrokes, but merely statistical tracking) 
we could determine (statistically) if a user is actually human. If not we could 
force reidentification or a real turing test (eg. recaptcha like). This does 
not interfer with the protocol and does not add noise to the images (although 
stenography detection could also trigger a turing test). It would require to be 
able to hook in to the stream (a kind of filter) that is able to trigger the 
follow up. What do you think?

> Obfuscation of guacamole client protocol
> 
>
> Key: GUACAMOLE-880
> URL: https://issues.apache.org/jira/browse/GUACAMOLE-880
> Project: Guacamole
>  Issue Type: Wish
>  Components: guacamole-client, guacamole-server
>Reporter: Bolke de Bruin
>Priority: Major
>  Labels: security
>
> One of the reasons we deploy guacamole is to limit data leakage 
> possibilities. We recently had a audit on our infrastructure and it was shown 
> that it was quite easy to leak out data through the guacamole protocol by 
> creating special images inside the desktop and then using mitmproxy (python) 
> and the guacamole python modules to capture the data inside those images.
> In order to limit the attack surface we would like to have obfuscation of the 
> protocol if configured to do so. Of course this could be done by implementing 
> a custom protocol, but it would be nice if Guacamole would have the 
> facilities (hooks) to do this. One could think of allowing a custom function 
> to encrypt/obfuscate the outgoing stream and attach into the javascript that 
> decrypts the stream.



--
This message was sent by Atlassian Jira
(v8.3.2#803003)


[jira] [Commented] (GUACAMOLE-880) Obfuscation of guacamole client protocol

2019-09-17 Thread Bolke de Bruin (Jira)


[ 
https://issues.apache.org/jira/browse/GUACAMOLE-880?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16931141#comment-16931141
 ] 

Bolke de Bruin commented on GUACAMOLE-880:
--

[~Why4ArtThou] Unfortunately, I think you misunderstand the gravity of the 
situation. It was shown that multiple gigabytes could be exfiltrated in an 
automated fashion by using the python api. There was nothing visually required 
on the client side. I am aware of precious developer time: I am a Apache 
committer myself and contributor to several projects. The intention in this 
thread is to make 1) people aware if the situation, 2) see if we can get to an 
agreed course of action. This to ensure developer time is not wasted. Finally, 
I willing to put the time of my team into this or even hire someone that could 
address the isue that we are seeing and then bring it back to the community. I 
think that's worthwhile a bit of discussion right?

[~nick.couch...@yahoo.com] [~mike.jumper] Another avenue we were thinking of is 
to enable a kind of non intrusive Turing test. Ie. by sampling of one uses the 
keyboard and mouse (not capturing keystrokes, but merely statistical tracking) 
we could determine (statistically) if a user is actually human. If not we could 
force reidentification or a real turing test (eg. recaptcha like). This does 
not interfer with the protocol and does not add noise to the images (although 
stenography detection could also trigger a turing test). It would require to be 
able to hook in to the stream (a kind of filter) that is able to trigger the 
follow up. What do you think?

> Obfuscation of guacamole client protocol
> 
>
> Key: GUACAMOLE-880
> URL: https://issues.apache.org/jira/browse/GUACAMOLE-880
> Project: Guacamole
>  Issue Type: Wish
>  Components: guacamole-client, guacamole-server
>Reporter: Bolke de Bruin
>Priority: Major
>  Labels: security
>
> One of the reasons we deploy guacamole is to limit data leakage 
> possibilities. We recently had a audit on our infrastructure and it was shown 
> that it was quite easy to leak out data through the guacamole protocol by 
> creating special images inside the desktop and then using mitmproxy (python) 
> and the guacamole python modules to capture the data inside those images.
> In order to limit the attack surface we would like to have obfuscation of the 
> protocol if configured to do so. Of course this could be done by implementing 
> a custom protocol, but it would be nice if Guacamole would have the 
> facilities (hooks) to do this. One could think of allowing a custom function 
> to encrypt/obfuscate the outgoing stream and attach into the javascript that 
> decrypts the stream.



--
This message was sent by Atlassian Jira
(v8.3.2#803003)