Commit Graph

8 Commits

Author SHA1 Message Date
bolkedebruin
de31bfe8a0 Restrict the rdpgw-auth socket to its own UID by default (#190)
The auth daemon's gRPC socket was world-writable and accepted any
local UID that could connect to it. On a multi-tenant host any user
on the box could speak the gRPC API and run an arbitrary username/
password through PAM -- effectively an unauthenticated PAM oracle.

Create the socket with mode 0660 (Umask(0117)) and gate Accept on
SO_PEERCRED: only the daemon's own UID is allowed by default, plus
any operator-supplied --allow-uid / --allow-gid. Privilege-separated
deployments (rdpgw and rdpgw-auth as different users) need to list
the gateway's UID, or share a group; the existing path otherwise
would have been permissive.

The peer-credentials check is Linux-only; the non-Linux build keeps
the listener as-is and logs a warning, since rdpgw-auth itself
requires libpam and is effectively Linux-only in practice.
2026-04-30 18:59:48 +02:00
m7913d
372dc43ef2 Support for NTLM authentication added (#109)
* Support for NTLM authentication added

To support NTLM authentication, a database is added as an authentication source.
Currently, only the configuration file is supported as a database.
Database authentication supports Basic and NTLM authentication protcols.

ServerConfig.BasicAuthEnabled renamed to LocalEnabled as Basic auth can be used with NTLM or Local.
2024-04-24 14:12:41 +02:00
Bolke de Bruin
46620c87b7 upgrades 2024-03-18 15:27:30 +01:00
Bolke de Bruin
e3ae09b525 Prepare for merge 2022-09-26 08:32:49 +02:00
Bolke de Bruin
eb1b287751 refactor tunnel and transport 2022-09-24 11:23:41 +02:00
Bolke de Bruin
8aa7c8cbb7 Verify if account is valid 2022-09-09 16:44:19 +02:00
Bolke de Bruin
fb58cb299e Add server implementation of basic auth 2022-08-24 13:47:26 +02:00
Bolke de Bruin
390f6acbcd Add support for PAM authentication 2022-08-23 22:52:15 +02:00