I would say this is better to solve within a proper IdP rather than an end-node webapp like guacamole. ie set up guacamole to use SAML or OpenID connect to a "proper" Identity provider and make that thing do the high-security checks. eg we use Apache with mod_auth_mellon as a reverse proxy frontend to guacamole (set to use http-auth-header). As we are an "Okta shop", that means we can lean into all the MFA offerings they have - guacamole doesn't have to worry it's pretty little head about it ;-). But Google's OpenID-Connect would do just as good a job. Or this, or that, etc :-)
On Sat, Oct 30, 2021 at 6:12 AM Craig Sawyer <csaw...@yumaed.org> wrote: > OK I'm all for short-lived auth certs, I'm a fan. But I'm confused as > to the use case/utility here. The idea you have is: > > A: User visits Guacamole and authenticates via some method and guac > returns a Guac Auth Cookie to the browser. > B: User clicks on host SSHA in Guac UI, and Guac then determines SSHA > needs a short lived auth token/cert and then does one of these: > 1: Guac impersonates the user, to generate a short lived auth > token/cert/OTP for SSHA > 2: Guac has the rights to generate such things for ALL users, no > impersonation needed > C: Guac connects to SSHA, sends the short lived cert to SSHA and then > returns a full connection to the user. > > To alleviate all of this complexity in our infrastructure, for Guac, > our virtual desktop systems have a 65 character randomly generated > password, shared only with Guac. Since brute force attacks against a > 64 char password is currently known to require more energy than the > entire known universe, we feel confident the possible leak of an > account can only happen from guac being compromised or the target host > leaking it somehow. Either way a short lived cert doesn't buy us > anything(especially since using the Guac SQL DB, we can update those > passwords at will whenever we want with some SQL queries). > > I don't see how a short lived cert(above) buys anything over say my > solution. > > The 1st option, passing through an MFA/token from the end user > client(i.e. web browser) all the way through to the target host > machine (SSHA in this example) is something I'd definitely be > interested in. This would require transporting FIDO/U2F or X509 certs > through, neither of which are user-friendly or 100% supported yet(last > I checked). Since browsers have mostly decided client X509 certs are > evil and should never be user-friendly, the only option is FIDO/U2F > pass-through (unless I'm missing something) which isn't yet fully > supported across the major browsers yet(right?). > > -Craig > > On Fri, Oct 29, 2021 at 9:39 AM Angal, Rajeev <ran...@visa.com.invalid> > wrote: > > > > Thanks. Nick. Makes total sense. Yes I agree opensource projects need > developers who have interest and time. > > > > I will check the developer forum to get a feel of the component it goes > to and the scope of the effort. > > > > I have filed a Jira ticket here: > > > > https://jira.glyptodon.com/browse/GUAC-1694 > > > > > > > > -rajeev > > > > > > > > > > > > > > > > From: Nick Couchman <vn...@apache.org> > > Sent: Friday, October 29, 2021 9:10 AM > > To: user@guacamole.apache.org > > Subject: Re: Does Guacamole support PKI/Smartcard authentication for RDP > (instead of username/password)? > > > > > > > > On Thu, Oct 28, 2021 at 10:25 PM Angal, Rajeev <ran...@visa.com.invalid> > wrote: > > > > Hello – > > > > Want to request a poll to the community if this feature would be useful? > > > > > > > > If you think this feature would be useful, the best thing to do is 1) > insure that there's a Jira issue for it, 2) vote for the Jira issue, and 3) > contribute. > > > > > > > > https://issues.apache.org/jira/projects/GUACAMOLE/issues > > > > > > > > If there is enough interest , please advise the best way to implement it > in the near future. > > > > > > > > While you're welcome to lend your voice to the issue by posting here or > submitting and/or voting on the Jira issue, if you want to get it > implemented then you need to either wait for one of the developers to have > the time, expertise, and inclination to do it, or jump in and contribute > yourself. This is an open source, community project, and, while enough > people asking for a feature can help raise it to a level that an existing > developer would jump in and do it, the reality is that many features get > implemented when someone who has a vested interest in the feature is able > to contribute to it's getting done. I recognize that not everyone is a > developer - I'm not a very good one, and it isn't what I spend most of my > time doing - I'm a systems engineer/admin and IT Manager by day. My > contributions are pretty limited as compared to some of the other folks who > spend their time on the project, but I wrote the RADIUS extension when I > needed it enough in my #DayJob that I was willing to invest time in > brushing up on my Java skills and working with the other developers to get > the code to the point where it could be included in the project. > > > > > > > > -Nick > > --------------------------------------------------------------------- > To unsubscribe, e-mail: user-unsubscr...@guacamole.apache.org > For additional commands, e-mail: user-h...@guacamole.apache.org > > -- Cheers Jason Haar Information Security Manager, Trimble Navigation Ltd. Phone: +1 408 481 8171 PGP Fingerprint: 7A2E 0407 C9A6 CAF6 2B9F 8422 C063 5EBB FE1D 66D1