Hi,

For a R&D project, I am trying to get guacamole working to be able to access systems on my home network remotely.

Guacamole (I believe) needs to run under something like tomcat to serve up the java war file & application.

I really don't want to have Tomcat exposed to the Internet without some kind of authentication in front of it.

I was thinking of running Tomcat bound to localhost and using pf to redirect to it, but that doesn't add any security.

So, I was thinking of using some form of authpf to open up pf rules when I needed to access systems remotely.

But, I don't want to open up Tomcat to the world when I'm using guacamole, so is it possible to have authpf tweak pf rules so that the originating IP address of the ssh session would be the only one that could access Tomcat?

Is there something better that could be done?

I was thinking even httpd in front of tomcat with httpd authentication, but that doesn't seem to make sense to me at a high level.

I was looking at relayd but it doesn't seen to have any authentication mechanism built in.

Does anyone have some inspiration on how to provide a level of security before packets even hit Tomcat?

Thanks,
Steve Williams

Reply via email to