On Thu, Apr 3, 2025 at 8:36 PM Cyrus <cyru...@gmail.com> wrote:

> Hello!,
>
> I'm wondering what's the default protection everyone is applying to
> keystroke logging files.
>
> Since Guacamole cannot know if a bunch of keystrokes comprise a password,
> it's not possible to mask them in the keystroke logging.
>
> I can disable keystroke altogether and leave video recording only to cover
> any data exfiltration if the Guacamole server is compromised, but I wonder
> if there's an intermediate solution like encrypting those files and still
> have "playback in the console" when needed.
>
>
There's not really anything built-in to Guacamole, no, that you could use
to protect against this. And, ultimately what you're asking seems a bit
idealistic:
* You want guacd and guacamole-client (Tomcat) to be able to write
keystrokes to a file and read them back for playback, which requires that
these processes have the correct access to the files.
* However, you want to prevent someone who "compromises" your server from
being able to read these files?

This largely depends on what you mean by "compromises the server"? If by
that you mean, "gains privileged (root) access," I don't really know what
to tell you - anyone who gains that level of permissions can simply "su -
guacd" (or whatever user guacd is running under) and grab the files. Since
guacd is running under that account, the account has to have access - how
would you simultaneously allow guacd to have access but deny someone else
with root access from moving to that user account and gaining access? There
may be ways to use SELinux and its ides of context to help with this, but,
in the end, it seems like this is asking for something that isn't really
achievable.

If by "compromises the server" you mean, simply gains access to the server,
under a non-privileged account that isn't guacd and/or guacamole-client
related, then the answer is relatively simple: make sure permissions are
set correctly.

If by "compromises the server" you mean, walks in and physically steals the
server and hauls it off to their warehouse, then some sort of at-rest
encryption where the key is physically disconnected from the server would
help.

-Nick

>

Reply via email to