-
Notifications
You must be signed in to change notification settings - Fork 24
feat(dgw): RDP proxy Kerberos credentials-injection #1631
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Let maintainers know that an action is required on their side
|
686e0a3 to
f38f965
Compare
f38f965 to
967bb3f
Compare
|
@CBenoit, I re-tested this branch after merging all PRs. Everything works well (see demo videos in PR description). The PR is ready for review. |
| "pcap-file", | ||
| "picky", | ||
| "picky-krb 0.11.0", | ||
| "picky-krb 0.12.0", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks like picky-krb is duplicated 🤔
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@CBenoit, The problem is in the kdc crate. It uses the latest picky-krb version (https://github.com/Devolutions/sspi-rs/blob/82d8bba2a84bba54a6efb3abc0153cc160bf29aa/Cargo.toml#L76). Whereas ironrdp-* crates use sspi version that, in turn, uses picky-krb = 0.11.
I think this duplication will be removed automatically when we update ironrdp-* crates.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Okay, no need to worry then! Thank you
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Awesome work! This is looking pretty good to me 💯
Can you just see what can be done for the duplicated dependencies? If it’s not trivial, we’ll just fix that via follow up PRs instead 🙂
sure. I will look into it |
CBenoit
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM!
Hi,
This PR consists of the following intermediate PRs:
Kerberosclient hostname #1634All together provide RDP proxy Kerberos credentials-injection support.
Configuring
Here is an example of my configuration:
disable_token_validationis set only for testing purposes.enable_unstableflag must be set. The Kerberos credentials-injection will not work if this option is not enabled.{gateway id}.jet.kdc_urlfield is optional: thesspicrate can resolve the real KDC via DNS, environment variables, etc.krbtgt_keyandticket_decryption_keymust be random 32-byte arrays.Demo
FreeRDP
freerdp_rdp_proxy_demo.mp4
mstsc
mstscex_rdp_proxy_demo.mp4