Hello Harry,
This is more informational than a fix to your SAML issue, hope this helps.
Have you tried:
# Proxy all requests to the Guacamole server
ProxyPass */guacamole* http://localhost:8080/guacamole
ProxyPassReverse */guacamole* http://localhost:8080/guacamole
Or
# Proxy all requests to the Guacamole server
ProxyPass */* http://localhost:8080/guacamole
ProxyPassReverse */* http://localhost:8080/guacamole
You can also rename the .war create a slink in the tomcat9 directory
WEBAPP will also change the https://url/<here>
You will need to take this one step further, as the federal mandates
will require FIPS 140-2(3), you can get this done with Openssl 3.x, you
will also need to make sure that local SSH is using MFA this can be done
with Googles module or PAM
*TLS: 1.2: This will force AES256 over TCP/IP*
ECDHE-ECDSA-AES256-GCM-SHA384
ECDHE-RSA-AES256-GCM-SHA384
ECDHE-ECDSA-CHACHA20-POLY1305
ECDHE-RSA-CHACHA20-POLY1305
ECDHE-ECDSA-AES128-GCM-SHA256 Phased out in 2030
ECDHE-RSA-AES128-GCM-SHA256 Phased out in 2030
*Alternate Ciphers for TLS 1.2:*
EECDH+AESGCM:EECDH+CHACHA20:EECDH+AES256:EECDH+AES128
*TLS: 1.3 No need to specify ciphers explicitly, as they are predefined:
Keep in mind that some federal departments only support TLS 1.2 still*
TLS_AES_256_GCM_SHA384
TLS_CHACHA20_POLY1305_SHA256
TLS_AES_128_GCM_SHA256 - Phased out in 2030
*Additional Security Measures*
* *Certificate:* Use a certificate with at least 2048-bit RSA or an
ECDSA certificate with a 256-bit key.
* *OCSP Stapling:* Ensures efficient certificate status verification.
* *HSTS: *Enforces HTTPS across your domain.
* *Key Exchange:* Prefer Elliptic Curve Diffie-Hellman Ephemeral
(ECDHE) for forward secrecy.
*SSH:* Strong Ciphers
*Ciphers* [email protected],[email protected],aes256-ctr
*MACs*
[email protected],[email protected],[email protected]
*KexAlgorithms*
curve25519-sha256,[email protected],diffie-hellman-group-exchange-sha256
I only mention this so you have a heads up in your configuration as FIPS
can break updates and some functional capabilities in Guacamole.
*Thank You*
Sean Hulbert
*Security Centric Inc.*
A Cybersecurity Virtualization Enablement Company
/StormCloud Gov, Protected CUI Environment!/
Industry's most secure CMMC/iTAR virtual desktops!
*/FedRAMP MIL4 in process (RAR)/*
System Award Management
*CAGE: 8AUV4*
*SAM ID: UMJLJ8A7BMT3*
AFCEA San Francisco Chapter President
If you have heard of a hacker by name, he/she has failed, fear the
hacker you haven’t heard of!
CONFIDENTIALITY NOTICE: This communication with its contents may contain
confidential and/or legally privileged information. It is solely for the
use of the intended recipient(s). Unauthorized interception, review, use
or disclosure is prohibited and may violate applicable laws including
the Electronic Communications Privacy Act. If you are not the intended
recipient, please contact the sender and destroy all copies of the
communication. Content within this email communication is not legally
binding as a contract and no promises are guaranteed unless in a formal
contract outside this email communication.
igitur qui desiderat pacem, praeparet bellum!!!
Epitoma Rei Militaris
On 12/18/2024 6:08 AM, Devine, Harry (FAA) wrote:
In the browser’s Debug console, I do see an error for “tokens”, and
when I click on it, the Headers show a “403 Forbidden” error for
https://<server>/api/tokens <https://%3cserver%3e/api/tokens>. I know
I’ve never set that up, so I wonder if that’s something needed? But I
can’t find that in the docs anywhere.
Thanks,
Harry
*From:* Devine, Harry (FAA) <[email protected]>
*Sent:* Wednesday, December 18, 2024 9:03 AM
*To:* [email protected]
*Subject:* RE: Question about callback URL with SAML configuration
*CAUTION:*This email originated from outside of the Federal Aviation
Administration (FAA). Do not click on links or open attachments unless
you recognize the sender and know the content is safe.
Also, I am doing a ProxyPass to proxy the traffic through Apache to
the Guacamole backend on 8080:
<Location />
Order allow,deny
Allow from all
ProxyPass http://localhost:8080/guacamole/ flushpackets=on
ProxyPassReverse http://localhost:8080/guacamole/
</Location>
Not sure how this plays into things. But when I sign into the SAML
with my smart card, that works, and the redirect back just keeps
sending me back to the Okta MFA page, which detects I’m already logged
in, and redirects back to Guacamole, and the cycle continues for a
while until the 429 Too Many Requests comes across.
Thanks,
Harry
*From:* Devine, Harry (FAA) <[email protected]>
*Sent:* Tuesday, December 17, 2024 3:26 PM
*To:* [email protected]
*Subject:* RE: Question about callback URL with SAML configuration
*CAUTION:*This email originated from outside of the Federal Aviation
Administration (FAA). Do not click on links or open attachments unless
you recognize the sender and know the content is safe.
I’m not really getting any errors in the Tomcat logs or
/var/log/messages. I eventually just get a 429 Too Many Redirects
error. And the callback I’m referring too is what we need to put into
the saml-callback-url propery in /etc/guacamole/guacamole.properties.
Currently, we have the server name itself (https://<server
<https://%3cserver>>). I’m assuming that needs to be something different.
Thanks,
Harry
*From:* Nick Couchman <[email protected]>
*Sent:* Tuesday, December 17, 2024 3:20 PM
*To:* [email protected]
*Subject:* Re: Question about callback URL with SAML configuration
*CAUTION:*This email originated from outside of the Federal Aviation
Administration (FAA). Do not click on links or open attachments unless
you recognize the sender and know the content is safe.
On Tue, Dec 17, 2024 at 3:13 PM Devine, Harry (FAA)
<[email protected]> wrote:
We are on Guacamole 1.5.4 at the moment, and we have a mandate to
implement MFA. We have been working with our IT department and
using a test Guacamole server for the configuration testing. We
were initially trying OpenID but we kept getting an invalid
response_type value. So they suggested SAML, which we implemented
and proved that we could log in. However, we do get an error from
Guacamole because the MFA doesn’t seem to know how to return the
response back to our Guacamole server.
What error are you seeing? And what messages are you getting in the logs?
So, my question is: how to I implement or configure the Callback
URL on our Guacamole server so the response that comes back can be
retrieved?
Are you talking about the callback URL in the Guacamole configuration,
or one specific to the SAML IdP?
-Nick