Return-Path: X-Original-To: archive-asf-public-internal@cust-asf2.ponee.io Delivered-To: archive-asf-public-internal@cust-asf2.ponee.io Received: from cust-asf.ponee.io (cust-asf.ponee.io [163.172.22.183]) by cust-asf2.ponee.io (Postfix) with ESMTP id 09CF7200BDC for ; Wed, 14 Dec 2016 20:47:20 +0100 (CET) Received: by cust-asf.ponee.io (Postfix) id 0863A160B2E; Wed, 14 Dec 2016 19:47:20 +0000 (UTC) Delivered-To: archive-asf-public@cust-asf.ponee.io Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by cust-asf.ponee.io (Postfix) with SMTP id 4F991160B0D for ; Wed, 14 Dec 2016 20:47:19 +0100 (CET) Received: (qmail 49738 invoked by uid 500); 14 Dec 2016 19:47:13 -0000 Mailing-List: contact user-help@guacamole.incubator.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: user@guacamole.incubator.apache.org Delivered-To: mailing list user@guacamole.incubator.apache.org Received: (qmail 49728 invoked by uid 99); 14 Dec 2016 19:47:13 -0000 Received: from pnap-us-west-generic-nat.apache.org (HELO spamd1-us-west.apache.org) (209.188.14.142) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 14 Dec 2016 19:47:13 +0000 Received: from localhost (localhost [127.0.0.1]) by spamd1-us-west.apache.org (ASF Mail Server at spamd1-us-west.apache.org) with ESMTP id D92E3D125F for ; Wed, 14 Dec 2016 19:47:12 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at spamd1-us-west.apache.org X-Spam-Flag: NO X-Spam-Score: -0.021 X-Spam-Level: X-Spam-Status: No, score=-0.021 tagged_above=-999 required=6.31 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=disabled Authentication-Results: spamd1-us-west.apache.org (amavisd-new); dkim=pass (2048-bit key) header.d=guac-dev-org.20150623.gappssmtp.com Received: from mx1-lw-us.apache.org ([10.40.0.8]) by localhost (spamd1-us-west.apache.org [10.40.0.7]) (amavisd-new, port 10024) with ESMTP id Oq7kU7ZikSXM for ; Wed, 14 Dec 2016 19:47:12 +0000 (UTC) Received: from mail-vk0-f42.google.com (mail-vk0-f42.google.com [209.85.213.42]) by mx1-lw-us.apache.org (ASF Mail Server at mx1-lw-us.apache.org) with ESMTPS id B465F5F2F1 for ; Wed, 14 Dec 2016 19:47:11 +0000 (UTC) Received: by mail-vk0-f42.google.com with SMTP id w194so44182921vkw.2 for ; Wed, 14 Dec 2016 11:47:11 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=guac-dev-org.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to; bh=P/oj2cf/Kym1Gpg+iLycItlLN9EkVez+wefCUodWrdQ=; b=OlRXcf8aS2ewCvOKnkkIeetYO+HVx/IkEKWVEZk8bxH3mR7flVbjqkB8RAhW2OHp2A jCT++PeF6c2PgzpT+zD6K86RgnP1pGp6oT6AQoZcUwY+x4nmNO8d0a+Z7r+keBBSCSez 0/tr9Om4LW6tPKCRbJ7ANN+VQmlFMSomYwOcQpL6+HEyNRH6uCgGm6bSMT6GA6Gmo7el DCOVQuMPqwC1VNC/oYMCv0Yr43WMPGP9LYZkOm0QPOaCBeE10rHDYxcBsrc0dXMS09js hrDSA16BsE9NKzGR/gvRW63PyIwml0bbMp1GH078j3H2yQsHD5Ft+ArCqa5ZVrdMwfXJ v44Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to; bh=P/oj2cf/Kym1Gpg+iLycItlLN9EkVez+wefCUodWrdQ=; b=eiSUssY1Dy0vqZJzZ1c3HLH8NsXxGDDro+g+RTXT3xrTi7kCJcq/GEEY9qwdlLjgkB tXNOkcvkiaEKmVoDVOvDHXwgEC2EcW4Nh6K1EvMKdD95skIO5KEIF/LMXVIBvX0PkyMF K444VAYjLiI4WinrK0as8vkwZbxdfskEAPAa2nwiPlnVAmuZ6tZyeTBGHBe5biJsD3kq hL+B1CaAS1E8pN9X07UOGSI4nxNObQh4ZpcRDDaAhFXtw2eeScktUXdhM1qKJJeeIE48 gEDBMO5mLAi4KM8sWuIbwxya0FObBpxu8X4P+UgpvoEk27bgKABjgA5ZQ6REFJHJ42M6 n0tw== X-Gm-Message-State: AKaTC01W6J+0EbFrI67iqMbwr+52vvRaNe2QwU7nl99ibEAasmAzku3ShJcgNLrP0rb41llp15K31LS/46x8Cg== X-Received: by 10.159.53.107 with SMTP id o98mr75605194uao.149.1481744825514; Wed, 14 Dec 2016 11:47:05 -0800 (PST) MIME-Version: 1.0 Received: by 10.159.36.105 with HTTP; Wed, 14 Dec 2016 11:47:05 -0800 (PST) X-Originating-IP: [67.164.58.106] In-Reply-To: References: From: Mike Jumper Date: Wed, 14 Dec 2016 11:47:05 -0800 Message-ID: Subject: Re: Security Vulnerabilities? To: user@guacamole.incubator.apache.org Content-Type: text/plain; charset=UTF-8 archived-at: Wed, 14 Dec 2016 19:47:20 -0000 On Wed, Dec 14, 2016 at 10:27 AM, Ray Jantz wrote: > Hi, > > I need to persuade a sys admin that guacamole is secure enough to deploy in > an enterprise. That is exactly Guacamole's intended use. > Security is not one of my strong points, so I'm wondering if > anyone can comment on this subject and maybe offer some talking points I can > use? > We do have code review processes in place intended to prevent this sort of thing, as well as automated static analysis scans via CI. There are no current known vulnerabilities. Historically, there have been two reported vulnerabilities, both of which were fixed: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4415 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1566 (see https://glyptodon.org/jira/browse/GUAC-1465) In general, I would argue that the architecture of Guacamole actually serves to increase the security of a remote desktop deployment. Its nature as a gateway reduces overall attack surface, with all traffic routed through an authentication layer and strong encryption (assuming you set up proper SSL/TLS, of course). That gateway aspect also allows admins to more tightly control which remote desktops can and cannot be accessed by authorized users, rather than exposing access to an entire subnet of remote desktops via VPN, for example. Thanks, - Mike