On Wed, 15 Apr 2020 at 6:03 AM, Steve Williams <
st...@williamsitconsulting.com> wrote:

> Hi,
>
> For a R&D project, I am trying to get guacamole working to be able to
> access systems on my home network remotely.
>
> Guacamole (I believe) needs to run under something like tomcat to serve
> up the java war file & application.
>
> I really don't want to have Tomcat exposed to the Internet without some
> kind of authentication in front of it.
>
> I was thinking of running Tomcat bound to localhost and using pf to
> redirect to it, but that doesn't add any security.
>
> So, I was thinking of using some form of authpf to open up pf rules when
> I needed to access systems remotely.
>
> But, I don't want to open up Tomcat to the world when I'm using
> guacamole, so is it possible to have authpf tweak pf rules so that the
> originating IP address of the ssh session would be the only one that
> could access Tomcat?
>
> Is there something better that could be done?
>
> I was thinking even httpd in front of tomcat with httpd authentication,
> but that doesn't seem to make sense to me at a high level.
>
> I was looking at relayd but it doesn't seen to have any authentication
> mechanism built in.
>
> Does anyone have some inspiration on how to provide a level of security
> before packets even hit Tomcat?


I suggest a VPN or Tomcat client cert auth on a non standard high port ( to
reduce the noise from standard scans ).

— Ram

Reply via email to