[
https://issues.apache.org/jira/browse/GUACAMOLE-2047?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17938780#comment-17938780
]
Rik Giles commented on GUACAMOLE-2047:
--------------------------------------
I have written the attached PoC ([^ConnectionLogger.java]) which is working in
my environment. With additional timestamp modifications to logback.xml the
output looks as shown below.
{code:java}
2025-03-26T10:22:17.348+01:00 [https-openssl-nio-8443-exec-1] INFO
o.a.g.s.event.ConnectionLogger - event=open_tunnel,
uuid=2cf5c723-499d-35a9-83a0-4fd8b5dc5697, protocol=ssh, sourceUser=rikochet,
sourceAddr=[redacted public IP], [email protected],
destinationAddr=172.22.16.123 {code}
If I submit a pull request on Github to add a new extension
`guacamole-client/extensions/guacamole-connection-logger` is this likely to get
accepted?
> Enhance logging for security monitoring
> ---------------------------------------
>
> Key: GUACAMOLE-2047
> URL: https://issues.apache.org/jira/browse/GUACAMOLE-2047
> Project: Guacamole
> Issue Type: New Feature
> Components: guacamole-client
> Reporter: Rik Giles
> Priority: Trivial
> Attachments: ConnectionLogger.java
>
>
> The default logging implementation of Guacamole client does not record
> sufficient information for security monitoring.
> Adding the following telemetry would enable security engineers to create
> detection rules in SIEMs to generate alerts for suspicious behavior:
> * Event (open/close connection)
> * Source IP address (X-FORWARDED-FOR)
> * Source Username (from Guacamole session)
> * Destination IP address (of connection object)
> * Destination Username (used to authenticate with connection object)
> * Protocol (SSH/VNC/RDP)
>
> This proposed feature can be achieved through the use of
> `org.apache.guacamole.net.event.TunnelConnectEvent` and can be implemented as
> an optional extension (as per guacamole-auth-ldap, guacamole-vault etc.)
--
This message was sent by Atlassian Jira
(v8.20.10#820010)