Built for **Guacamole 1.0.0 **.
This project is a plugin for Guacamole, an HTML5 based remote desktop solution supporting VNC/RFB, RDP, and SSH.
This plugin is an authentication provider that enables stateless, on-the-fly configuration of remote desktop connections that are authorized using a pre-shared key. It is most appropriate for scenarios where you have an existing user authentication & authorization mechanism.
guacamole-auth-hmac uses Maven for managing builds. After installing Maven you can build a
suitable jar for deployment with mvn package
.
The resulting jar file will be placed in target/guacamole-auth-hmac-<version>.jar
.
Warning This plugin relies on API's introduced in Guacamole 0.8.3, so you must be running at least that version before using this plugin.
Copy guacamole-auth-hmac.jar
to the location specified by lib-directory
in guacamole.properties
.
Mount a directory containing guacamole-auth-hmac-0.9.13-incubating.jar
to the extensions directory one directory under the directory that is defined as GUACAMOLE_HOME. An example docker-compose.yml is provided below:
version: '3'
services:
guacd:
image: guacamole/guacd:0.9.13-incubating
hostname: guacd
restart: always
guacamole:
image: guacamole/guacamole:0.9.13-incubating
hostname: guacamole
restart: always
links:
- guacd
ports:
- "8080:8080"
volumes:
- ./guacamole-data/config:/config
depends_on:
- guacd
environment:
GUACD_HOSTNAME: guacd
GUACD_PORT: 4822
GUACAMOLE_HOME: /config
The structure of guacamole-data looks like:
guacamole-data
└── config
├── extensions
│ └── guacamole-auth-hmac-0.9.13-incubating.jar
├── guacamole.properties
└── lib
And guacamole.properties contains:
secret-key: <some-secret-key>
timestamp-age-limit: 100000
auth-provider: com.stephensugden.guacamole.net.hmac.HmacAuthenticationProvider
With this configuration for Docker, a database is not required (requires 0.9.13).
NOTE Be sure to chmod 755
the extension jar or it will not be loaded! Also, the very first request for authentication fails with a 500 error, but all subsequent requests succeed.
This extension adds extra config keys to guacamole.properties
:
Variable | Required | Default | Comments |
---|---|---|---|
secret-key |
yes | None | The key that will be used to verify URL signatures. Whatever is generating the signed URLs will need to share this value. |
timestamp-age-limit |
no | 600000 | A numeric value (in milliseconds) that determines how long a signed request should be valid for. 600000 ms = 10 min |
use-local-privkey |
no | False | A boolean value to specify whether or not Guacamole should check on the local filesystem for private keys. |
key-directory |
no | /etc/guacamole/keys | A String specifying the location of local private keys. No trailing '/'. |
Variable | Required | Default | Comments |
---|---|---|---|
id |
yes | None | A connection ID that must be unique per user session. Can be a random integer or UUID. |
timestamp |
yes | None | A unix timestamp in milliseconds. This is used to prevent replay attacks. |
guac.protocol |
yes | ssh | One of vnc or ssh . |
guac.hostname |
yes | None | The hostname of the remote desktop server to connect to. |
guac.port |
yes | None | The port number to connect to. |
guac.username |
no | None | Username to login with. If left blank, user will be prompted on SSH connections. VNC connections will fail. |
guac.password |
no | None | Password to authenticate with. If left blank, user will be prompted on SSH connections. VNC connections will fail. |
guac.* |
no | None | Any other configuration parameters recognized by Guacamole can be by prefixing them with guac. . |
signature |
yes | None | The SHA256 encrypted concatenation of timestamp , protocol , hostname , port , username , password for authentication. |
Since users are authenticated using a web request to the Guacamole server, it is insecure to use pubkey auth by sending the private keys over the web. This feature is enabled by the config parameter use-local-privkey
. If true, Guacamole will look for the private key $GUACAMOLE_HOME/keys/<username>/id_rsa_guac
and enable SFTP and use the key for SSH auth. The key and directory must be owned by the user running Guacamole (tomcat7
in my case).
Requests must be signed with an HMAC, where the message content is generated from the request parameters as follows:
- The parameters
timestamp
,guac.protocol
,hostname
, andport
are concatenated. Ifusername
andpassword
parameters are supplied, they are also concatenated. - Encrypt using SHA256.
Using the python example, parameters can be POSTed to /guacamole/api/tokens
to authenticate. The response is then sent as JSON and contains authToken
which is then used to login: guacamole/#/client/(connection)?token=(authToken)
(connection)
is an encoded string that tells Guacamole to connect the user to a server. It is generated as follows:
- Remove the first two characters from the ID (I have tried it without shortening the ID, but it did not work).
- Append
NULLcNullhmac
to the shortened ID.
NULL
represents aNULL
character (often "\0").c
stands for connection.hmac
is the authentication provider.
- Encode this with base64.
Then, add this to the URL after guacamole/#/client/
and append the authToken parameter.
More about using POST with Guacamole
Outline of how Guacamole receives and responds to authentication requests