[jira] [Commented] (GUACAMOLE-1332) Add parameter for specifying known RDP server certificate/fingerprint

2021-04-26 Thread Bastien (Jira)


[ 
https://issues.apache.org/jira/browse/GUACAMOLE-1332?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17331835#comment-17331835
 ] 

Bastien commented on GUACAMOLE-1332:


I understand. I don't find documentation on _certificate/fingerprint_ on 
upstream project *freerdp*. With some 
[tricks|https://gist.github.com/playerla/d6e4ec046029a0e77a0864b116b29016#file-known_hosts2]
 I successfully wrote config/freerdp/known_hosts2. I agree it will be better 
with RDP connection parameters for finding and specifying the 
certificate/fingerprint.

> Add parameter for specifying known RDP server certificate/fingerprint
> -
>
> Key: GUACAMOLE-1332
> URL: https://issues.apache.org/jira/browse/GUACAMOLE-1332
> Project: Guacamole
>  Issue Type: Wish
>  Components: RDP
> Environment: Debian buster guacamole 1.3.0
>Reporter: Bastien
>Priority: Minor
> Attachments: guacamole.log
>
>
> Hello,
> I spend whole day to configure a RDP connection without using "Ignore server 
> certificate". I use a xrdp serveur with a self signed certificate (end goal 
> is a signed certificate from PKI). I didn't find how to trust the certificate 
> fingerprint. I got "Certificate validation failed". "certificate not trusted, 
> aborting."
> I discovered that Guacamole use freerdp which is not well documented on the 
> subject. I tried to add the pem certificate with {{update-ca-certificates}}, 
> or in _.config/freerdp/certs_ and get nothing.
> Do I miss some documentation on how to set-up a trusted RDP host on Guacamole 
> ?
> On my Guacamole test server, I install xfce and remina, succeed to connect to 
> the target. It populates the .config/freerdp/known_hosts2 file, then 
> Guacamole connection begin to work. But it is not an option for the 
> production server.
>  
> Thanks you



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Created] (GUACAMOLE-1334) OID Addon translation key is mismatched

2021-04-26 Thread Tim Worcester (Jira)
Tim Worcester created GUACAMOLE-1334:


 Summary: OID Addon translation key is mismatched
 Key: GUACAMOLE-1334
 URL: https://issues.apache.org/jira/browse/GUACAMOLE-1334
 Project: Guacamole
  Issue Type: Bug
  Components: guacamole-auth-openid
Affects Versions: 1.3.0
Reporter: Tim Worcester
 Fix For: 1.4.0


Code is looking for Key 'INFO_OID_PENDING_REDIRECT'

Translation json provides: 'INFO_OID_REDIRECT_PENDING'



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (GUACAMOLE-1212) Support 2FA Directly in LDAP Extension

2021-04-26 Thread Jelle de Jong (Jira)


[ 
https://issues.apache.org/jira/browse/GUACAMOLE-1212?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17332063#comment-17332063
 ] 

Jelle de Jong commented on GUACAMOLE-1212:
--

Me and Mike already had some discussion on the 
[u...@guacamole.apache.org|mailto:u...@guacamole.apache.org] mailing-list. 

What I read here is that somehow the LDAP code is using the users credentials 
multiple times and not only for password validation? My experience with LDAP 
integrations is that there is an admin bind that is used for gathering group 
information and other data validations. I got many other LDAP integration 
working with the FreeIPA password+otp and I would really like to see Guacamole 
working as well.

In my /etc/guacamole/guacamole.properties I have these two options: 
ldap-search-bind-dn: 
uid=externalldapadmin,cn=sysaccounts,cn=etc,dc=bothends,dc=lan
ldap-search-bind-password: secret 

Would it not be an easy fix to change the LDAP binds to the admin bind and only 
use the user password validation during login, the group and permission 
escalations should could be done securely with the right username filters, if 
there are other look-ups later after the user is already logged in then this 
should also not be an issue.

I am also okay with the current password field that can handle password+otp for 
the LDAP backend and use the new password prompting features of 1.3.0 for the 
further connection.

> Support 2FA Directly in LDAP Extension
> --
>
> Key: GUACAMOLE-1212
> URL: https://issues.apache.org/jira/browse/GUACAMOLE-1212
> Project: Guacamole
>  Issue Type: Improvement
>  Components: guacamole-auth-ldap
>Reporter: Brett Smith
>Priority: Minor
> Attachments: user-with-otp-trace-level.log
>
>
> I'm using FreeIPA in my environment. I have guacamole-auth-ldap enabled and 
> configured and it works fine for users who do not have 2FA enabled. For our 
> users with 2FA enabled, we are using TOTP tokens provided by FreeIPA.
> When investigating a tcpdump between guacamole and the LDAP server, I can see 
> that guacamole passes the username and password to the LDAP server twice. 
> This works fine for a traditional username and password, but for a 
> 2FA-enabled user, the second authentication attempt returns failure since the 
> TOTP is one-time use. 2FA login attempts result in the guacamole logs 
> outputting "successfully authenticated" while the web UI shows "Invalid 
> Login" in a red banner.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (GUACAMOLE-1334) OID Addon translation key is mismatched

2021-04-26 Thread Tim Worcester (Jira)


[ 
https://issues.apache.org/jira/browse/GUACAMOLE-1334?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17332064#comment-17332064
 ] 

Tim Worcester commented on GUACAMOLE-1334:
--

MR: https://github.com/apache/guacamole-client/pull/605

> OID Addon translation key is mismatched
> ---
>
> Key: GUACAMOLE-1334
> URL: https://issues.apache.org/jira/browse/GUACAMOLE-1334
> Project: Guacamole
>  Issue Type: Bug
>  Components: guacamole-auth-openid
>Affects Versions: 1.3.0
>Reporter: Tim Worcester
>Priority: Trivial
> Fix For: 1.4.0
>
>
> Code is looking for Key 'INFO_OID_PENDING_REDIRECT'
> Translation json provides: 'INFO_OID_REDIRECT_PENDING'



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Resolved] (GUACAMOLE-1334) OID Addon translation key is mismatched

2021-04-26 Thread Tim Worcester (Jira)


 [ 
https://issues.apache.org/jira/browse/GUACAMOLE-1334?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Tim Worcester resolved GUACAMOLE-1334.
--
Resolution: Fixed

MR Merged

> OID Addon translation key is mismatched
> ---
>
> Key: GUACAMOLE-1334
> URL: https://issues.apache.org/jira/browse/GUACAMOLE-1334
> Project: Guacamole
>  Issue Type: Bug
>  Components: guacamole-auth-openid
>Affects Versions: 1.3.0
>Reporter: Tim Worcester
>Priority: Trivial
> Fix For: 1.4.0
>
>
> Code is looking for Key 'INFO_OID_PENDING_REDIRECT'
> Translation json provides: 'INFO_OID_REDIRECT_PENDING'



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (GUACAMOLE-1212) Support 2FA Directly in LDAP Extension

2021-04-26 Thread Nick Couchman (Jira)


[ 
https://issues.apache.org/jira/browse/GUACAMOLE-1212?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17332443#comment-17332443
 ] 

Nick Couchman commented on GUACAMOLE-1212:
--

{quote}
Would it not be an easy fix to change the LDAP binds to the admin bind and only 
use the user password validation during login, the group and permission 
escalations should could be done securely with the right username filters, if 
there are other look-ups later after the user is already logged in then this 
should also not be an issue.
{quote}

I'm not sure it's an easy fix, but it is doable. That said, while we may look 
at making this configurable, it will probably not be the default - the LDAP 
extension as it operates today is designed _intentionally_ to operate the way 
it does - that is, use the search user _only_ for locating the user that is 
logging in, and then use the logged in user for all other binds after that. In 
this way, it leverages the security built-in to LDAP in order to provide access 
to the resources that the LDAP user should be able to access.

{quote}
I am also okay with the current password field that can handle password+otp for 
the LDAP backend and use the new password prompting features of 1.3.0 for the 
further connection.
{quote}

I'm not entirely sure what you mean, here - the current password field can 
handle password+otp (the LDAP extension just doesn't know how to prompt for the 
OTP separate from the password). However, I think making sure that the LDAP 
connection(s) are persistent for the life of the Guacamole session is probably 
the best way to go.

> Support 2FA Directly in LDAP Extension
> --
>
> Key: GUACAMOLE-1212
> URL: https://issues.apache.org/jira/browse/GUACAMOLE-1212
> Project: Guacamole
>  Issue Type: Improvement
>  Components: guacamole-auth-ldap
>Reporter: Brett Smith
>Priority: Minor
> Attachments: user-with-otp-trace-level.log
>
>
> I'm using FreeIPA in my environment. I have guacamole-auth-ldap enabled and 
> configured and it works fine for users who do not have 2FA enabled. For our 
> users with 2FA enabled, we are using TOTP tokens provided by FreeIPA.
> When investigating a tcpdump between guacamole and the LDAP server, I can see 
> that guacamole passes the username and password to the LDAP server twice. 
> This works fine for a traditional username and password, but for a 
> 2FA-enabled user, the second authentication attempt returns failure since the 
> TOTP is one-time use. 2FA login attempts result in the guacamole logs 
> outputting "successfully authenticated" while the web UI shows "Invalid 
> Login" in a red banner.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (GUACAMOLE-1212) Support 2FA Directly in LDAP Extension

2021-04-26 Thread Brett Smith (Jira)


[ 
https://issues.apache.org/jira/browse/GUACAMOLE-1212?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17332472#comment-17332472
 ] 

Brett Smith commented on GUACAMOLE-1212:


If leveraging the sysaccount bind will solve Guac attempting to use the user's 
OTP multiple times, that seems like the right approach to me. Bind accounts do 
not degrade the security of LDAP; most LDAP-aware applications use a bind 
account for searching the directory.

Personally, I'm fine with the OTP being placed after the password in the 
password field. That's the approach our users are used to with other LDAP-aware 
applications.

> Support 2FA Directly in LDAP Extension
> --
>
> Key: GUACAMOLE-1212
> URL: https://issues.apache.org/jira/browse/GUACAMOLE-1212
> Project: Guacamole
>  Issue Type: Improvement
>  Components: guacamole-auth-ldap
>Reporter: Brett Smith
>Priority: Minor
> Attachments: user-with-otp-trace-level.log
>
>
> I'm using FreeIPA in my environment. I have guacamole-auth-ldap enabled and 
> configured and it works fine for users who do not have 2FA enabled. For our 
> users with 2FA enabled, we are using TOTP tokens provided by FreeIPA.
> When investigating a tcpdump between guacamole and the LDAP server, I can see 
> that guacamole passes the username and password to the LDAP server twice. 
> This works fine for a traditional username and password, but for a 
> 2FA-enabled user, the second authentication attempt returns failure since the 
> TOTP is one-time use. 2FA login attempts result in the guacamole logs 
> outputting "successfully authenticated" while the web UI shows "Invalid 
> Login" in a red banner.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (GUACAMOLE-1212) Support 2FA Directly in LDAP Extension

2021-04-26 Thread Nick Couchman (Jira)


[ 
https://issues.apache.org/jira/browse/GUACAMOLE-1212?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17332480#comment-17332480
 ] 

Nick Couchman commented on GUACAMOLE-1212:
--

{quote}
If leveraging the sysaccount bind will solve Guac attempting to use the user's 
OTP multiple times, that seems like the right approach to me. Bind accounts do 
not degrade the security of LDAP; most LDAP-aware applications use a bind 
account for searching the directory.
{quote}

I'm not opposed to having that as an option (as mentioned before), but not by 
default. I agree that bind accounts do not, in and of themselves, degrade the 
security of LDAP - it depends upon how you use them. That has never been my 
point - my point is that the Guacamole LDAP extension is _designed_ to leverage 
LDAP security. Thus, changing this behavior in the LDAP module *will* impact 
the security of the LDAP module in ways that may matter to other users. It may 
not impact you and your use-case, but it is relevant to how we've designed the 
LDAP module to be deployed, and that has to be factored into this. It is one of 
the reasons why we won't make this behavior - using the bind account for all 
LDAP operations - the default behavior - it will be something you have to 
manually change in the config file.

> Support 2FA Directly in LDAP Extension
> --
>
> Key: GUACAMOLE-1212
> URL: https://issues.apache.org/jira/browse/GUACAMOLE-1212
> Project: Guacamole
>  Issue Type: Improvement
>  Components: guacamole-auth-ldap
>Reporter: Brett Smith
>Priority: Minor
> Attachments: user-with-otp-trace-level.log
>
>
> I'm using FreeIPA in my environment. I have guacamole-auth-ldap enabled and 
> configured and it works fine for users who do not have 2FA enabled. For our 
> users with 2FA enabled, we are using TOTP tokens provided by FreeIPA.
> When investigating a tcpdump between guacamole and the LDAP server, I can see 
> that guacamole passes the username and password to the LDAP server twice. 
> This works fine for a traditional username and password, but for a 
> 2FA-enabled user, the second authentication attempt returns failure since the 
> TOTP is one-time use. 2FA login attempts result in the guacamole logs 
> outputting "successfully authenticated" while the web UI shows "Invalid 
> Login" in a red banner.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Comment Edited] (GUACAMOLE-1283) Legacy RDP encryption may fail with "ERRINFO_DECRYPT_FAILED"

2021-04-26 Thread Shaun Tarves (Jira)


[ 
https://issues.apache.org/jira/browse/GUACAMOLE-1283?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17332573#comment-17332573
 ] 

Shaun Tarves edited comment on GUACAMOLE-1283 at 4/26/21, 4:28 PM:
---

[~mjumper] [~vnick] We tried to build off master to test this fix and the 
filesystem mounting doesn't appear to be working at all now.


was (Author: shauntarves):
[~mjumper] We tried to build off master to test this fix and the filesystem 
mounting doesn't appear to be working at all now.

> Legacy RDP encryption may fail with "ERRINFO_DECRYPT_FAILED"
> 
>
> Key: GUACAMOLE-1283
> URL: https://issues.apache.org/jira/browse/GUACAMOLE-1283
> Project: Guacamole
>  Issue Type: Bug
>  Components: RDP
>Affects Versions: 1.2.0
> Environment: guacd 1.2 running in Docker on RHEL 7 deployed in AWS
>Reporter: Shaun Tarves
>Assignee: Mike Jumper
>Priority: Minor
> Fix For: 1.4.0
>
> Attachments: RemoteDesktop.txt, TerminalServices.txt
>
>
> We are experiencing semi-regular disconnects of the guacamole-server (guacd) 
> while a user is interacting with a remote machine. Attached are the 
> DEBUG-level logs, which we see every time we experience the disconnects. I'm 
> not sure how to further debug this issue.
> {code}
> Feb  8 14:46:21 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011Clipboard 
> data received. Reporting availability of clipboard data to RDP server.
> Feb  8 14:46:24 ip-172-16-10-253 journal: guacd[84]: DEBUG:#011Clipboard data 
> received. Reporting availability of clipboard data to RDP server.
> Feb  8 14:46:41 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011Clipboard 
> data received. Reporting availability of clipboard data to RDP server.
> Feb  8 14:47:13 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011Clipboard 
> data received. Reporting availability of clipboard data to RDP server.
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011Clipboard 
> data received. Reporting availability of clipboard data to RDP server.
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: 
> DEBUG:#011ERRINFO_DECRYPT_FAILED (0x1192):(a) Decryption using Standard 
> RDP Security mechanisms (section 5.3.6) failed.
> Feb  8 14:47:22 ip-172-16-10-253 journal: (b) Session key creation using 
> Standard RDP Security mechanisms (section 5.3.5) failed.
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011BIO_read 
> returned a system error 104: Connection reset by peer
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: ERROR:#011Connection 
> closed.
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011Unloading 
> device 0 (Remote Access Filesystem)
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011SVC "rdpdr" 
> disconnected.
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011SVC "rdpsnd" 
> disconnected.
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: INFO:#011Internal RDP 
> client disconnected
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: INFO:#011User 
> "@5dd34373-1e17-4091-9670-c00fc2d68684" disconnected (0 users remain)
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: INFO:#011Last user of 
> connection "$60bea827-60a1-403b-84b8-3c7358f490ee" disconnected
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011Requesting 
> termination of client...
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011Client 
> terminated successfully.
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[8]: INFO:#011Connection 
> "$60bea827-60a1-403b-84b8-3c7358f490ee" removed.
> {code}
> Attached are the MS Event Logs for the `RemoteDesktop*` and 
> `TerminalServices*` log sources



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (GUACAMOLE-1283) Legacy RDP encryption may fail with "ERRINFO_DECRYPT_FAILED"

2021-04-26 Thread Shaun Tarves (Jira)


[ 
https://issues.apache.org/jira/browse/GUACAMOLE-1283?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17332573#comment-17332573
 ] 

Shaun Tarves commented on GUACAMOLE-1283:
-

[~mjumper] We tried to build off master to test this fix and the filesystem 
mounting doesn't appear to be working at all now.

> Legacy RDP encryption may fail with "ERRINFO_DECRYPT_FAILED"
> 
>
> Key: GUACAMOLE-1283
> URL: https://issues.apache.org/jira/browse/GUACAMOLE-1283
> Project: Guacamole
>  Issue Type: Bug
>  Components: RDP
>Affects Versions: 1.2.0
> Environment: guacd 1.2 running in Docker on RHEL 7 deployed in AWS
>Reporter: Shaun Tarves
>Assignee: Mike Jumper
>Priority: Minor
> Fix For: 1.4.0
>
> Attachments: RemoteDesktop.txt, TerminalServices.txt
>
>
> We are experiencing semi-regular disconnects of the guacamole-server (guacd) 
> while a user is interacting with a remote machine. Attached are the 
> DEBUG-level logs, which we see every time we experience the disconnects. I'm 
> not sure how to further debug this issue.
> {code}
> Feb  8 14:46:21 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011Clipboard 
> data received. Reporting availability of clipboard data to RDP server.
> Feb  8 14:46:24 ip-172-16-10-253 journal: guacd[84]: DEBUG:#011Clipboard data 
> received. Reporting availability of clipboard data to RDP server.
> Feb  8 14:46:41 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011Clipboard 
> data received. Reporting availability of clipboard data to RDP server.
> Feb  8 14:47:13 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011Clipboard 
> data received. Reporting availability of clipboard data to RDP server.
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011Clipboard 
> data received. Reporting availability of clipboard data to RDP server.
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: 
> DEBUG:#011ERRINFO_DECRYPT_FAILED (0x1192):(a) Decryption using Standard 
> RDP Security mechanisms (section 5.3.6) failed.
> Feb  8 14:47:22 ip-172-16-10-253 journal: (b) Session key creation using 
> Standard RDP Security mechanisms (section 5.3.5) failed.
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011BIO_read 
> returned a system error 104: Connection reset by peer
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: ERROR:#011Connection 
> closed.
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011Unloading 
> device 0 (Remote Access Filesystem)
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011SVC "rdpdr" 
> disconnected.
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011SVC "rdpsnd" 
> disconnected.
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: INFO:#011Internal RDP 
> client disconnected
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: INFO:#011User 
> "@5dd34373-1e17-4091-9670-c00fc2d68684" disconnected (0 users remain)
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: INFO:#011Last user of 
> connection "$60bea827-60a1-403b-84b8-3c7358f490ee" disconnected
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011Requesting 
> termination of client...
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011Client 
> terminated successfully.
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[8]: INFO:#011Connection 
> "$60bea827-60a1-403b-84b8-3c7358f490ee" removed.
> {code}
> Attached are the MS Event Logs for the `RemoteDesktop*` and 
> `TerminalServices*` log sources



--
This message was sent by Atlassian Jira
(v8.3.4#803005)


[jira] [Commented] (GUACAMOLE-1283) Legacy RDP encryption may fail with "ERRINFO_DECRYPT_FAILED"

2021-04-26 Thread Mike Jumper (Jira)


[ 
https://issues.apache.org/jira/browse/GUACAMOLE-1283?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17332709#comment-17332709
 ] 

Mike Jumper commented on GUACAMOLE-1283:


[~shauntarves] - retesting against master, drive support for RDP seems to be 
working fine. I see the virtual filesystem within the RDP session, and I'm able 
to initiate file downloads. Quickly checking other virtual channels (clipboard, 
audio output), no issues encountered there, either. Tested against connections 
to Windows 2019 and Windows 2003.

Perhaps FreeRDP plugins, etc. are hanging around from a previous build?

> Legacy RDP encryption may fail with "ERRINFO_DECRYPT_FAILED"
> 
>
> Key: GUACAMOLE-1283
> URL: https://issues.apache.org/jira/browse/GUACAMOLE-1283
> Project: Guacamole
>  Issue Type: Bug
>  Components: RDP
>Affects Versions: 1.2.0
> Environment: guacd 1.2 running in Docker on RHEL 7 deployed in AWS
>Reporter: Shaun Tarves
>Assignee: Mike Jumper
>Priority: Minor
> Fix For: 1.4.0
>
> Attachments: RemoteDesktop.txt, TerminalServices.txt
>
>
> We are experiencing semi-regular disconnects of the guacamole-server (guacd) 
> while a user is interacting with a remote machine. Attached are the 
> DEBUG-level logs, which we see every time we experience the disconnects. I'm 
> not sure how to further debug this issue.
> {code}
> Feb  8 14:46:21 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011Clipboard 
> data received. Reporting availability of clipboard data to RDP server.
> Feb  8 14:46:24 ip-172-16-10-253 journal: guacd[84]: DEBUG:#011Clipboard data 
> received. Reporting availability of clipboard data to RDP server.
> Feb  8 14:46:41 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011Clipboard 
> data received. Reporting availability of clipboard data to RDP server.
> Feb  8 14:47:13 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011Clipboard 
> data received. Reporting availability of clipboard data to RDP server.
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011Clipboard 
> data received. Reporting availability of clipboard data to RDP server.
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: 
> DEBUG:#011ERRINFO_DECRYPT_FAILED (0x1192):(a) Decryption using Standard 
> RDP Security mechanisms (section 5.3.6) failed.
> Feb  8 14:47:22 ip-172-16-10-253 journal: (b) Session key creation using 
> Standard RDP Security mechanisms (section 5.3.5) failed.
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011BIO_read 
> returned a system error 104: Connection reset by peer
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: ERROR:#011Connection 
> closed.
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011Unloading 
> device 0 (Remote Access Filesystem)
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011SVC "rdpdr" 
> disconnected.
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011SVC "rdpsnd" 
> disconnected.
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: INFO:#011Internal RDP 
> client disconnected
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: INFO:#011User 
> "@5dd34373-1e17-4091-9670-c00fc2d68684" disconnected (0 users remain)
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: INFO:#011Last user of 
> connection "$60bea827-60a1-403b-84b8-3c7358f490ee" disconnected
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011Requesting 
> termination of client...
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[148]: DEBUG:#011Client 
> terminated successfully.
> Feb  8 14:47:22 ip-172-16-10-253 journal: guacd[8]: INFO:#011Connection 
> "$60bea827-60a1-403b-84b8-3c7358f490ee" removed.
> {code}
> Attached are the MS Event Logs for the `RemoteDesktop*` and 
> `TerminalServices*` log sources



--
This message was sent by Atlassian Jira
(v8.3.4#803005)