- Introduction
- WebSocket Options
- Guacd Options
- Client Options
- Callbacks
- Events
- Integration with Node.js Frameworks
- Additional Examples and Resources
guacamole-lite
is a lightweight Node.js server that implements the server-side portion of the Apache Guacamole
protocol. Apache Guacamole is an open-source clientless remote desktop gateway that supports standard protocols like
VNC, RDP, and SSH. Unlike the standard Guacamole server, which is Java-based, guacamole-lite
is designed to be easily
integrated into Node.js applications, offering a more streamlined and flexible approach to remote desktop connectivity.
The primary goal of guacamole-lite
is to provide developers with a simple yet powerful way to embed remote desktop
functionality into their web applications. It is particularly well-suited for projects that already have user and
connection management systems in place and do not require the full suite of features provided by the traditional
Guacamole server.
This documentation focuses on the advanced configuration options available in guacamole-lite
. It is intended for
developers who wish to customize and extend the functionality of their guacamole-lite
deployment beyond the basic
setup. The advanced configuration covers a range of topics, including WebSocket options, guacd
connection settings, client options for encryption and security, logging, and handling of connection parameters.
The websocketOptions
object in guacamole-lite
configures the WebSocket server, which is essential for maintaining a
persistent, full-duplex communication channel required for remote desktop interactions. The WebSocket server handles
incoming connections from clients and facilitates communication between the web client and the guacd
.
The WebSocket server can be customized through various properties within the websocketOptions
object. Here's an
example configuration:
const websocketOptions = {
port: 8080, // The port on which the WebSocket server will listen for connections.
host: '0.0.0.0', // The host address to bind to. Use '0.0.0.0' to accept connections on all IPv4 addresses.
};
The websocketOptions
object is passed directly to the ws
WebSocket library, allowing any supported options by ws
to be included. For a comprehensive list of all the options you can configure, refer to
the ws documentation.
In the context of guacamole-lite
, the WebSocket server is typically configured to listen on a specific port and IP
address. This setup ensures that the server is reachable by clients and can handle the necessary communication for
remote desktop sessions.
The guacdOptions
configuration in guacamole-lite
specifies how it should connect to the guacd
, which is
responsible for handling the remote desktop protocols and translating them into the Guacamole
protocol.
The connection to guacd
can be customized through the guacdOptions
object. However, specifying this object is
optional. If not provided, guacamole-lite
will use the default values. Here's an example of setting guacdOptions
:
const guacdOptions = {
host: 'localhost', // Optional. Default is '127.0.0.1'.
port: 4822, // Optional. Default is 4822.
};
If guacdOptions
is omitted, guacamole-lite
will attempt to connect to guacd
on the local machine (127.0.0.1
) on
port 4822
. These defaults are suitable for most scenarios where guacamole-lite
and guacd
are running on the same
server.
guacdOptions
object is directly passed to net.createConnection() function, allowing any supported options by
net.createConnection() to be included. For a comprehensive list of all the options you can configure, refer to
the net documentation.
The clientOptions
object is where you define the behavior and capabilities of your guacamole-lite
instance. It
allows you to set up encryption for secure communication, establish default settings for various connection types,
configure logging levels, and specify which connection settings can be overridden by query parameters.
Here's a high-level view of the clientOptions
structure:
const clientOptions = {
// Encryption settings for secure token handling
crypt: {
cypher: 'AES-256-CBC',
key: 'MySuperSecretKeyForParamsToken12',
},
// Default settings for remote desktop connections
connectionDefaultSettings: {
rdp: {
'hostname': 'localhost',
'port': '3389',
// More RDP-specific settings...
},
// Default settings for other protocols (VNC, SSH, etc.)...
},
// Logging configuration
log: {
level: 'VERBOSE', // Other levels: 'QUIET', 'ERRORS', 'NORMAL', 'DEBUG'
// Custom log functions (if needed)...
},
// Allowed unencrypted connection settings in query parameters
allowedUnencryptedConnectionSettings: {
rdp: ['width', 'height', 'dpi'],
// Allowed settings for other protocols...
},
// Other client-specific options...
};
Unlike the full guacamole-client
, guacamole-lite
does not maintain its own database for managing users, remote
hosts, and credentials. Instead, it relies on the integrating application to supply these parameters. Since the
transmission of these parameters often occurs through potentially insecure channels, such as the client's browser, it is
crucial to ensure their security and integrity. To address these concerns, guacamole-lite
employs encrypted tokens to
pass connection details.
An encrypted token is a secure method of transmitting information where the data is first converted into a ciphertext using an encryption algorithm and a secret key. This process ensures two critical aspects:
a) Authentication: The encrypted token verifies that the connection parameters were indeed generated by the application and have not been forged or tampered with by any third party.
b) Confidentiality: Sensitive information, such as login credentials to the remote host, remains concealed from the
client. Only guacamole-lite
and the application that generated the token can decrypt and access the contained
information.
The encrypted token is a Base64-encoded string that encapsulates the encrypted connection parameters, including an initialization vector (IV) and the encrypted data (value). The IV is a random value used to ensure that the encryption process produces different ciphertexts even if the same data and key are used multiple times. The value is the actual encrypted JSON object containing the connection settings.
For AES-256-CBC
, the encryption key must be 32 bytes (256 bits) in length. This key, combined with the IV, is used to
encrypt the connection parameters securely. It is essential to use a cryptographically strong key, which should be
generated using a secure random number generator and kept confidential.
Allowing unencrypted connection settings to be transmitted can lead to the exposure of sensitive data. To mitigate this
risk, guacamole-lite
uses encrypted tokens to securely pass connection details. However, certain non-sensitive
parameters, such as screen resolution or color depth, can be passed unencrypted via query parameters if explicitly
permitted in the allowedUnencryptedConnectionSettings
.
Best practices for generating and managing encrypted connection tokens include:
- Generating the encrypted token on the backend server to avoid exposing the secret key and remote host credentials to
the client.
- If a malicious actor gains access to the key and the encryption algorithm, they can start encrypting their own
tokens and connecting to any remote host, essentially turning your
guacamole-lite
server into an open relay for their malicious activities. So it's very advisable to generate the token on the backend server to avoid exposing the key and remote host credentials to the client. - Additionally, if you consider generating the token on the frontend, you will need to expose the remote host
address, login and password to the client, which then can be used to connect to the remote host directly,
bypassing your
guacamole-lite
server.
- If a malicious actor gains access to the key and the encryption algorithm, they can start encrypting their own
tokens and connecting to any remote host, essentially turning your
- Generating a robust, random encryption key and safeguarding it and securely storing it:
- Never store the key in your source code or version control system (git).
- Never hardcode the key in your application.
- Never send it to your frontend client or use the frontend client to encrypt the token.
- Using a unique IV for each encryption operation to prevent recognizable patterns in the ciphertext.
- Restricting the token's validity period to minimize the risk of replay attacks.
The crypt
settings within clientOptions
should be set as follows:
const clientOptions = {
crypt: {
cypher: 'AES-256-CBC',
key: 'MySuperSecretKeyForParamsToken12', // Replace with your 32-byte key
},
// Other client options...
};
To encrypt a token object containing connection settings, follow these steps:
- Generate an initialization vector (IV) for encryption. The IV should be random and 16 bytes long for
AES-256-CBC
. - Take the JSON object with connection settings and encrypt it using the cipher and key from
clientOptions
. - Base64 encode the result of the encryption (this will be the
value
). - Create another JSON object containing the base64-encoded IV and the encrypted
value
. - Base64 encode the entire JSON object from step 4 to produce the final token.
For practical examples of how to encrypt the token in different programming languages, refer to the following links:
These examples illustrate the encryption process step-by-step, ensuring that you can securely generate tokens for use
with guacamole-lite
.
In guacamole-lite
, connection settings are crucial for establishing a remote desktop session. These settings include
parameters such as hostname, port, and protocol-specific options like screen resolution or authentication credentials.
To manage these settings flexibly, guacamole-lite
merges them from three sources: default settings, encrypted tokens,
and query parameters.
The connectionDefaultSettings
within clientOptions
serve as a baseline for all connections. These defaults can be
overridden by the settings provided in the encrypted token, which in turn can be overridden by the settings specified in
the query parameters. This merging process ensures that the most specific settings take precedence.
Here's how the merging process works:
- Start with the
connectionDefaultSettings
as the base. - Apply settings from the encrypted token, overriding any defaults.
- Apply settings from the query parameters, overriding both the defaults and token settings.
The precedence order of settings is as follows: query parameters > encrypted token > connectionDefaultSettings
.
Here's an example of how you might set default connection options for RDP within clientOptions
:
const clientOptions = {
// Other client options...
connectionDefaultSettings: {
rdp: {
'hostname': 'remote.example.com',
'port': '3389',
'security': 'nla',
'ignore-cert': true,
'enable-wallpaper': false,
// Additional RDP-specific default settings...
},
// Default settings for other protocols (VNC, SSH, etc.)...
},
// Other client options...
};
In this example, we've specified a set of default RDP connection settings that will be used unless overridden by the encrypted token or query parameters. For instance, if the encrypted token contains a different hostname or if the query includes a different port, those values will be used instead of the defaults.
By carefully configuring the connectionDefaultSettings
, you can ensure that guacamole-lite
has sensible defaults for
each protocol while still allowing for flexibility based on the needs of individual connections.
For certain use cases, it may be necessary to allow clients to override specific connection settings via unencrypted
query parameters. This can be useful for dynamically adjusting settings like screen resolution or color depth without
the need to generate a new encrypted token. guacamole-lite
provides a mechanism to specify which connection settings
can be safely passed in the query string without encryption.
The allowedUnencryptedConnectionSettings
within clientOptions
is an object that defines which connection settings
can be overridden by query parameters for each connection type. This feature is designed to be used with caution, as it
can potentially expose your guacamole-lite server to abuse by malicious actors. As best practice, don't allow any
sensitive parameters like hostname, port, or credentials to be overridden in the query string.
By default, guacamole-lite
allows only a limited set of non-sensitive parameters to be overridden via the query
string: width
, height
, dpi
, audio
, video
, image
and timezone
. These parameters are safe to pass
unencrypted and can be used to adjust the screen resolution, audio and video codecs, image formats, and time zone of the
remote desktop session.
To create your own whitelist of parameters, add them to the allowedUnencryptedConnectionSettings
object under the
appropriate connection type. They will override the default parameters.
Here's an example of how to allow additional VNC settings:
const clientOptions = {
// Other client options...
allowedUnencryptedConnectionSettings: {
vnc: [
'width',
'height',
'dpi',
'color-depth', // Additional allowed parameter
],
// Settings for other protocols...
},
};
In this configuration, color-depth
has been added to the list of allowed unencrypted settings for VNC connections.
Even though width
, height
, and dpi
are allowed by default, they must be explicitly included in your whitelist if
you wish to allow them to be overridden in the query string, otherwise they will be ignored.
To send multiple values for the same parameter, such as different audio codecs, the client can include the parameter multiple times in the query string. Here's an example of how a client might specify multiple audio codecs for an RDP connection:
ws://your-guacamole-server:8080/?token=encryptedToken&audio=audio%2FL8&audio=audio%2FL16
In this example, the audio
parameter is provided twice, indicating that both audio/L8
and audio/L16
codecs are
supported by the client. guacamole-lite
will parse the query string and use the provided values to override the
default or token-provided settings.
guacamole-lite
supports several connection types, each designed to facilitate access to different kinds of remote
systems. The primary connection types are RDP, VNC, SSH, and Telnet, which cover a broad range of use cases:
- RDP (Remote Desktop Protocol): Primarily used for accessing Windows desktops and servers, RDP provides a rich graphical interface for users. It is ideal for remote work, IT support, and administration tasks on Windows systems.
- VNC (Virtual Network Computing): A versatile protocol that allows for remote control of a computer's desktop environment, VNC is used across various operating systems, including Linux, macOS, and Windows. It is suitable for system administration and accessing graphical applications remotely.
- SSH (Secure Shell): A protocol used for secure command-line access to Unix-like operating systems, SSH is essential for server management, secure file transfers, and running text-based applications in a secure manner.
- Telnet: An older protocol used for two-way interactive communication, Telnet is less secure than SSH and is generally used in controlled environments for managing network devices or systems that do not support SSH.
Each connection type has its own set of parameters and client handshake instructions, which are used to establish and
configure the remote desktop session. guacamole-lite
allows for default settings to be specified for each protocol,
which can be combined with settings from the encrypted connection token provided by the client.
Each connection type has specific parameters required for establishing a session. These parameters include details such as hostname, port, and protocol-specific settings like color depth or audio support. Additionally, they can contain client handshake instructions which used to negotiate the capabilities between the client and the server, such as supported audio and video codecs or image formats.
Below is an example configuration that outlines the default settings for each supported connection type
in guacamole-lite
. These settings include both connection parameters and client handshake instructions:
const clientOptions = {
// Default settings for different connection types
connectionDefaultSettings: {
rdp: {
'create-drive-path': true,
'security': 'any',
'ignore-cert': true,
'enable-wallpaper': false,
'create-recording-path': true,
'audio': ['audio/L16'],
'video': null,
'image': ['image/png', 'image/jpeg'],
'timezone': 'America/New_York',
},
vnc: {
'swap-red-blue': true,
'disable-paste': false,
},
ssh: {
'enable-sftp': true,
'green-black': true,
},
telnet: {
'login-success-regex': '.*',
},
},
// Other client options...
};
These defaults provide a starting point for each protocol and can be overridden by the encrypted token or query parameters. For instance, the RDP defaults set up a drive path for file transfer, specify a security setting, and configure audio and image settings for the session. Similarly, VNC, SSH, and Telnet have their own relevant defaults.
For a detailed list of connection parameters for each protocol, refer to the Guacamole documentation on configuring connections. Additionally, the protocol reference for client handshake instructions provides guidance on the handshake instructions common to all protocols.
Both connection parameters and client handshake instructions can be mixed in the same object.
For a more comprehensive example and comments on configuring connectionDefaultSettings
, please see
the advanced_configuration.js example included with guacamole-lite
.
Effective logging is essential for monitoring the behavior of guacamole-lite
and diagnosing issues. The logging system
in guacamole-lite
provides various levels of verbosity, allowing developers to choose the amount of detail they
receive in the logs.
guacamole-lite
supports the following log levels, which determine the verbosity of the output:
- QUIET: No logs will be output.
- ERRORS: Only error messages will be logged.
- NORMAL: Errors and essential operational messages will be logged, such as startup and shutdown notices.
- VERBOSE: In addition to errors and operational messages, connection-related messages will be logged, including when connections are opened or closed.
- DEBUG: The most verbose level, including all the above plus detailed debugging information, such as inter-server
communication between
guacamole-lite
andguacd
with all opcodes sent and received.
To configure the log level, set the level
property within the log
object in clientOptions
. Here's an example:
const clientOptions = {
// Other client options...
log: {
level: 'VERBOSE', // Adjust the log level as needed.
},
};
In this configuration, VERBOSE
logging is enabled, which provides a detailed account of the operational status
without the extensive debugging information that the DEBUG
level would include.
guacamole-lite
allows for the implementation of custom log functions, providing flexibility to redirect log output as
needed, such as to a file or a logging service.
Here's a simple example of custom log functions that write logs to a file:
const fs = require('fs');
const logFile = fs.createWriteStream('guacamole-lite.log', {flags: 'a'});
const clientOptions = {
// Other client options...
log: {
level: 'VERBOSE',
stdLog: (...args) => {
logFile.write(new Date().toISOString() + ' - ' + args.join(' ') + '\n');
},
errorLog: (...args) => {
logFile.write(new Date().toISOString() + ' - ERROR - ' + args.join(' ') + '\n');
},
},
};
In this example, the stdLog
function writes standard log messages to a file, while errorLog
writes error messages.
Both functions prepend a timestamp and differentiate error messages by including the word "ERROR".
Callbacks in guacamole-lite
provide hooks that allow developers to intercept and manipulate the connection process.
For now the only available callback is processConnectionSettings
, which offers a way to validate and modify connection
parameters dynamically. We may add more callbacks in the future to support additional use cases.
The processConnectionSettings
callback is invoked after a WebSocket connection with the client has been established
and the connection token has been decrypted, but before a connection to guacd
is opened. This callback is an
opportunity to adjust connection settings on the fly or to validate them before proceeding with the connection.
The callback function receives two arguments:
settings
: An object containing the decrypted connection settings.callback
: A function that must be called with two parameters: an error (if any) and the modified settings.
If the callback
is called with an error, the connection attempt will be rejected. Otherwise, the modified settings
will be used to establish the connection with guacd
.
Developers can include custom parameters within the encrypted token to pass additional data required for the connection.
These custom parameters can then be accessed and utilized within the processConnectionSettings
callback.
For example, a custom expiration
parameter can be used to verify the token's validity and prevent replay attacks. If
the current time is greater than the expiration timestamp, the token is considered expired, and the connection is
rejected:
if (settings['expiration'] < Date.now()) {
console.error('Token expired');
return callback(new Error('Token expired'));
}
The processConnectionSettings
callback can also be used to modify connection settings based on the provided
parameters. For instance, if a userId
is included in the token, it can be used to assign a unique drive path for file
transfer for each user:
settings.connection['drive-path'] = '/tmp/guacamole_' + settings['userId'];
This approach allows for personalized settings for each user or connection, enhancing the flexibility and security
of guacamole-lite
.
Following is an example of how to define the callbacks
object with the processConnectionSettings
callback.
Having these data encrypted in the token:
{
"expiration": 3510738000000,
"userId": 777,
"connection": {
"type": "rdp",
"settings": {
"hostname": "10.0.0.12",
"username": "Administrator",
"password": "pAsSwOrD",
"enable-drive": true
}
}
}
You can use the following processConnectionSettings
callback to validate the token's expiration date and modify the
connection settings:
const callbacks = {
processConnectionSettings: (settings, callback) => {
// Validate the token's expiration date
if (settings['expiration'] < Date.now()) {
console.error('Token expired');
return callback(new Error('Token expired'));
}
// Modify the connection settings based on the userId
settings.connection['drive-path'] = '/tmp/guacamole_' + settings['userId'];
// Proceed with the modified settings
callback(null, settings);
}
};
In this configuration, the callback checks for token expiration and sets a user-specific drive path. The modified
settings are then forwarded to guacd
to establish the connection.
guacamole-lite
emits several events that provide hooks into the lifecycle of a client's connection. These events allow
developers to execute custom logic at various stages, such as when a connection is established, terminated, or
encounters an error. The primary events emitted by guacamole-lite
are open
, close
, and error
.
The open
event is emitted when a connection to the remote desktop host (via guacd
) is successfully established. This
event signifies that the initial handshake has been completed and the client is ready to start sending and receiving
data.
The close
event is triggered when a connection is closed. This can happen for various reasons, such as the client
disconnecting, an error occurring, or the server shutting down. The event provides an opportunity to perform cleanup
tasks or log the disconnection.
The error
event is emitted when an error occurs during the connection process. This could be due to issues with the
WebSocket connection, problems during the handshake with guacd
, or any other exceptions that arise. Handling this
event
is crucial for robust error logging and debugging.
One common use case for the open
and close
events is to notify a backend system about the user's connection status.
This can be particularly useful for session management, such as performing cleanup tasks on the remote machine after a
user logs out or transferring session recordings for storage.
When the open
event is triggered, indicating that a new session has started, a notification can be sent to the backend
server:
guacServer.on('open', (clientConnection) => {
const url = `http://our-backend-server/api/connection/open?userId=${clientConnection.connectionSettings['userId']}`;
http.request(url).end();
});
Similarly, when the close
event is emitted, it can signal the end of a session. This is an opportune moment to perform
any necessary cleanup or handle session recordings:
guacServer.on('close', (clientConnection, error) => {
const url = `http://our-backend-server/api/connection/close?userId=${clientConnection.connectionSettings['userId']}&error=${encodeURIComponent(error.message)}`;
http.request(url).end();
// Additional logic for handling session recordings, if applicable...
});
The error
event can be used to log errors or notify the backend system of any issues that occurred during the session:
guacServer.on('error', (clientConnection, error) => {
console.error(`Error on connection ID: ${clientConnection.connectionId}`, error);
// Additional error handling logic...
});
Each event provides the ClientConnection
object as a parameter, which contains the connection settings, including the
user ID. This object can be used to access detailed information about the connection for logging or other purposes.
The close
and error
events also receive an error object that contains the reason for the disconnection, which can be
useful for debugging and auditing.
By leveraging these events, developers can ensure that their systems remain informed about the state of remote desktop sessions and can react accordingly to maintain a seamless user experience.
Integrating guacamole-lite
with other Node.js frameworks can enhance its capabilities and allow it to fit seamlessly
into a broader application ecosystem. When integrating guacamole-lite
, it's important to consider how it will interact
with the existing framework's routing, middleware, and server setup.
- Routing: Determine how
guacamole-lite
will fit into your application's routing structure. You may need to set up specific routes to handle WebSocket connections or to serve the client-side assets required forguacamole-lite
. - Middleware: If your application uses middleware for tasks like authentication, logging, or CORS handling, ensure
that these are compatible with
guacamole-lite
and do not interfere with its operation. - Server Configuration:
guacamole-lite
needs to be attached to an HTTP or HTTPS server instance. Ensure that the server configuration aligns withguacamole-lite
's requirements and that there are no conflicts with other server instances within the framework.
Express.js is a popular web application framework for Node.js known for its simplicity and flexibility. Below is an
example of how to integrate guacamole-lite
with an Express.js application:
#!/usr/bin/env node
const GuacamoleLite = require('guacamole-lite');
const express = require('express');
const http = require('http');
// Create an Express application
const app = express();
// Create an HTTP server and attach the Express application to it
const server = http.createServer(app);
// Define `guacd` connection options
const guacdOptions = {
port: 4822 // The port on which `guacd` is listening
};
// Define client options, including encryption settings
const clientOptions = {
crypt: {
cypher: 'AES-256-CBC',
key: 'MySuperSecretKeyForParamsToken12'
}
};
// Create a new instance of GuacamoleLite and attach it to the HTTP server
const guacServer = new GuacamoleLite(
{server}, // Pass the server instance to GuacamoleLite
guacdOptions,
clientOptions
);
// Start listening for connections on port 8080
server.listen(8080, () => {
console.log('Express and guacamole-lite server running on port 8080');
});
In this example, guacamole-lite
is integrated into the Express.js application by creating an HTTP server instance and
passing it to the GuacamoleLite
constructor. This setup allows guacamole-lite
to handle WebSocket connections while
the Express application can continue to serve other routes and middleware as usual.
By following this pattern, you can integrate guacamole-lite
into your Node.js application built with Express.js or a
similar framework, allowing you to leverage the full capabilities of both guacamole-lite
and the framework.
For developers looking to dive deeper into the practical implementation of guacamole-lite
, the project's examples
directory provides a wealth of resources. These examples cover a range of scenarios, from basic server setup to advanced
configuration, and include scripts for encrypting tokens in various programming languages.
The examples
directory within the guacamole-lite
project contains the following files:
- advanced_configuration.js: Demonstrates how to set up
guacamole-lite
with advanced options, including custom connection settings and callbacks. - basic_server.js: Provides a simple example of how to get a
guacamole-lite
server up and running with minimal configuration. - encrypt_token.js: Shows how to encrypt a connection token using Node.js, ensuring secure transmission of connection parameters.
- encrypt_token.php: A PHP script for encrypting the connection token, useful for applications with a PHP backend.
- encrypt_token.py: A Python example for token encryption, catering to systems where Python is the server-side language of choice.
- expressjs.js: Illustrates how to integrate
guacamole-lite
with an Express.js application, combining web server functionality with remote desktop capabilities.
These examples are designed to be informative and easily adaptable to your specific use case. Whether you're just
getting started with guacamole-lite
or looking to implement more complex features, the examples directory is a
valuable resource.