You really shouldn't be running guacd or tomcat as root (or really anything
else you can avoid doing so on). Create service accounts for both and
run/permission them according to those accounts.

As mentioned its likely a good idea to set ownership and file permissions on
the tomcat/guacamole related directories to be as restrictive as you can
while still working.

Password hashing would be a good way to go. The /path/to/file method is
pointless...the idea with that is have a credential file with more strict
permissions (and usually a hidden file, aka .filename) than the file that
looks at it...you can just set the guac.properties to be that strict
instead.

Also, there are many other things you can do to help secure guacamole that
really makes this a non-issue (from an outside threat perspective):

- Dont run things as root
- Dont allow root ssh (instead authorized users should need to su, sudo -i,
etc. if they need root...which should be very rare).
- Run behind a reverse proxy
- Properly configure HTTPS/SSL and enforce it.
- Use service accounts with no shell login, and when possible no home dir
for running services.
- Log access and usage. Monitor logs or at least periodically check.
- Backup, backup...and then backup some more. You can never have too many
backups. Scheduled, on site/off site, manual, etc. Test backups to make sure
you can get set back up.
- If available use security features like SEL or AppArmour
- Use 2FA like TOTP
- Do NOT expose SSH or anything other than ports 80/443 to your server from
the outside world. If you must remote access the server itself VPN.





--
Sent from: 
http://apache-guacamole-general-user-mailing-list.2363388.n4.nabble.com/

---------------------------------------------------------------------
To unsubscribe, e-mail: user-unsubscr...@guacamole.apache.org
For additional commands, e-mail: user-h...@guacamole.apache.org

Reply via email to